D(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:08 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:08 executing program 1: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYRES32], 0xffffffee) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x2003e8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x800) ioctl$DRM_IOCTL_GET_UNIQUE(r5, 0xc0106401, &(0x7f0000000740)={0xe2, &(0x7f00000002c0)=""/226}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r7 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r7, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r6, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x9, 0x3, 0x2c0, 0x128, 0x128, 0x128, 0x128, 0x128, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, &(0x7f0000000200), {[{{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@common=@inet=@set2={0x28, 'set\x00', 0x2, {{0xfffffffffffffffe, 0x100, 0xb06}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0x723, 0x200, 0x1, '\x00', 'syz1\x00', 0x10000}}}, {{@uncond, 0x0, 0x98, 0x100}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x4, 0x1, 0x757, 0x6, 'pptp\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x320) 19:35:08 executing program 3: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$alg(0x26, 0x5, 0x0) write$binfmt_script(r1, &(0x7f0000000000)=ANY=[@ANYRES32], 0xffffffee) bind$alg(r2, &(0x7f00000000c0)={0x26, 'hash\x00', 0x0, 0x0, 'sha224-ssse3\x00'}, 0x58) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = accept4$alg(r3, 0x0, 0x0, 0x0) splice(r0, 0x0, r4, 0x0, 0x2003e8, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x800) ioctl$DRM_IOCTL_GET_UNIQUE(r5, 0xc0106401, &(0x7f0000000740)={0xe2, &(0x7f00000002c0)=""/226}) r6 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r7 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r7, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r6, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) setsockopt$IPT_SO_SET_REPLACE(r7, 0x0, 0x40, &(0x7f0000000400)=@raw={'raw\x00', 0x9, 0x3, 0x2c0, 0x128, 0x128, 0x128, 0x128, 0x128, 0x228, 0x228, 0x228, 0x228, 0x228, 0x3, &(0x7f0000000200), {[{{@uncond, 0x0, 0xc0, 0x128, 0x0, {}, [@common=@inet=@set2={0x28, 'set\x00', 0x2, {{0xfffffffffffffffe, 0x100, 0xb06}}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x1, 0x723, 0x200, 0x1, '\x00', 'syz1\x00', 0x10000}}}, {{@uncond, 0x0, 0x98, 0x100}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x4, 0x1, 0x757, 0x6, 'pptp\x00', 'syz0\x00'}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x320) 19:35:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3053.217986][T26569] device team0 left promiscuous mode 19:35:08 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3053.279262][T26569] device team_slave_0 left promiscuous mode 19:35:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3053.340292][T26569] device team_slave_1 left promiscuous mode 19:35:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:09 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3053.540232][T26643] device team0 entered promiscuous mode [ 3053.602500][T26643] device team_slave_0 entered promiscuous mode [ 3053.646028][T26643] device team_slave_1 entered promiscuous mode [ 3053.703718][T26643] 8021q: adding VLAN 0 to HW filter on device team0 [ 3053.796594][T26610] device team0 left promiscuous mode [ 3053.816155][T26610] device team_slave_0 left promiscuous mode [ 3053.876949][T26610] device team_slave_1 left promiscuous mode [ 3054.156259][T26649] device team0 entered promiscuous mode [ 3054.163200][T26649] device team_slave_0 entered promiscuous mode [ 3054.172178][T26649] device team_slave_1 entered promiscuous mode [ 3054.186100][T26649] 8021q: adding VLAN 0 to HW filter on device team0 [ 3054.217650][T26569] device team0 left promiscuous mode [ 3054.223875][T26569] device team_slave_0 left promiscuous mode [ 3054.230361][T26569] device team_slave_1 left promiscuous mode [ 3054.237942][T26635] device team0 entered promiscuous mode [ 3054.243678][T26635] device team_slave_0 entered promiscuous mode [ 3054.250308][T26635] device team_slave_1 entered promiscuous mode [ 3054.257380][T26635] 8021q: adding VLAN 0 to HW filter on device team0 19:35:10 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) ioctl$BINDER_THREAD_EXIT(r0, 0x40046208, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000200)={'team0\x00\xfd\xbeO\xff\xc0\x00\x03\x00\x02\xff', 0x20004bfd}) 19:35:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x17\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:10 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3054.417461][T26781] device team0 left promiscuous mode [ 3054.455906][T26781] device team_slave_0 left promiscuous mode 19:35:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x18\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3054.509604][T26781] device team_slave_1 left promiscuous mode 19:35:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x9a\x1d\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3054.653734][T26827] device team0 entered promiscuous mode [ 3054.676370][T26827] device team_slave_0 entered promiscuous mode [ 3054.733788][T26827] device team_slave_1 entered promiscuous mode [ 3054.775682][T26827] 8021q: adding VLAN 0 to HW filter on device team0 [ 3054.953080][T26781] device team0 left promiscuous mode [ 3054.959021][T26781] device team_slave_0 left promiscuous mode [ 3054.994957][T26781] device team_slave_1 left promiscuous mode [ 3055.037827][T26827] device team0 entered promiscuous mode [ 3055.088092][T26827] device team_slave_0 entered promiscuous mode [ 3055.133489][T26827] device team_slave_1 entered promiscuous mode [ 3055.173692][T26827] 8021q: adding VLAN 0 to HW filter on device team0 19:35:11 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000200)={0x0, 0xffffffff}, 0x0) semget$private(0x0, 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x58000, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000500)={r0, @in6={{0xa, 0x4e23, 0x0, @remote, 0x9}}, 0xffffffffffffff75, 0x5, 0xfffffffffffffffe, 0xffffffffffff0e70}, 0x98) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000480)='/dev/sequencer\x00', 0x400, 0x0) fstat(r1, &(0x7f00000005c0)) fcntl$setlease(r2, 0x400, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000380)={0xffffffffffffffff}) ioctl$FS_IOC_FSSETXATTR(r1, 0x401c5820, &(0x7f0000000800)={0x1, 0xfffffffffffffff9, 0xfffffffffffffff9, 0xfff, 0x7}) setsockopt$CAIFSO_REQ_PARAM(r3, 0x116, 0x80, &(0x7f00000003c0)="47f9294848dbd9c927f573c704ee3b48c48eef8898f934e25372cf1a283ad4e6945b89b5159ceed4efc209f5c5c194066216916e75daffdb2c84f4ba0d40d5c69baee3e4c5fdc33e4e0d1566ba8c37314ad7f614d6ebb19e2720935bb4db99f172d9e5fca4f88382bc88906d4342e4dfa8299cab20d665a53378b29239b566ba2d347e12ebab32b811da84e27eb5ae32145fdc", 0x93) r4 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000280)=0x4) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x40, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_STATUS(r6, 0xc0385720, &(0x7f00000007c0)={0x1, {0x0, 0x1c9c380}, 0x800, 0x800}) r7 = socket(0x11, 0x801, 0x400) getsockopt$ARPT_SO_GET_ENTRIES(r7, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000006200000019f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984fdb8f2bef441c7448261b263d18e403a895b1b69621e2ee0000000044bede60a7339501edd007b9eb3eac0db7fb97cd000000000000000000"], 0x0) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'rose0\x00'}) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000640)={{{@in6=@mcast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@dev}}, &(0x7f0000000740)=0xe8) bind$xdp(r7, &(0x7f0000000780)={0x2c, 0x4, r8, 0x1e, r7}, 0x10) setsockopt$inet6_buf(r5, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, 0x0, 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:11 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:11 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00>\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:11 executing program 1: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000200), 0x4) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) getsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000280)=""/174, &(0x7f0000000340)=0xae) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:11 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, 0x0, 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:11 executing program 5: r0 = syz_open_dev$amidi(&(0x7f0000000280)='/dev/amidi#\x00', 0x8001, 0xc040) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000002c0)={0x0, 0x140000000}, &(0x7f0000000300)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000003c0)={r1, 0x425}, 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r4 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r4, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r3, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000200)={r2, 0x8000}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 3055.835682][T27280] device team0 left promiscuous mode 19:35:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3055.938703][T27280] device team_slave_0 left promiscuous mode [ 3055.970007][T27280] device team_slave_1 left promiscuous mode 19:35:11 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01:X\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)`\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x017h\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff\xff\xff\x7f\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3057.156567][T27291] device team0 entered promiscuous mode [ 3057.184498][T27291] device team_slave_0 entered promiscuous mode [ 3057.210885][T27291] device team_slave_1 entered promiscuous mode [ 3057.240048][T27291] 8021q: adding VLAN 0 to HW filter on device team0 [ 3057.261600][T27305] device team0 left promiscuous mode [ 3057.280516][T27305] device team_slave_0 left promiscuous mode 19:35:13 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:13 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:13 executing program 1: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000200), 0x4) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) getsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000280)=""/174, &(0x7f0000000340)=0xae) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 3057.303713][T27305] device team_slave_1 left promiscuous mode [ 3057.335264][T27307] device team0 entered promiscuous mode [ 3057.354250][T27307] device team_slave_0 entered promiscuous mode [ 3057.393079][T27307] device team_slave_1 entered promiscuous mode 19:35:13 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*\xa8\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3057.421094][T27307] 8021q: adding VLAN 0 to HW filter on device team0 [ 3057.482858][T27418] device team0 left promiscuous mode [ 3057.519525][T27418] device team_slave_0 left promiscuous mode [ 3057.525595][T27418] device team_slave_1 left promiscuous mode [ 3057.565417][T27417] device team0 entered promiscuous mode [ 3057.600680][T27417] device team_slave_0 entered promiscuous mode [ 3057.640101][T27417] device team_slave_1 entered promiscuous mode [ 3057.682047][T27417] 8021q: adding VLAN 0 to HW filter on device team0 [ 3057.722643][T27440] device team0 left promiscuous mode [ 3057.744291][T27440] device team_slave_0 left promiscuous mode [ 3057.790829][T27440] device team_slave_1 left promiscuous mode [ 3058.425305][T27452] device team0 entered promiscuous mode [ 3058.434562][T27452] device team_slave_0 entered promiscuous mode [ 3058.446371][T27452] device team_slave_1 entered promiscuous mode [ 3058.465514][T27452] 8021q: adding VLAN 0 to HW filter on device team0 19:35:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, 0x0, 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:14 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0)={0x0}, 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200800000000000000000000000000000000000000000000000006200000019f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000040)={r0, 0x1000}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:14 executing program 1: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000200), 0x4) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) getsockopt$packet_buf(r0, 0x107, 0x6, &(0x7f0000000280)=""/174, &(0x7f0000000340)=0xae) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 3058.627770][T27482] device team0 left promiscuous mode 19:35:14 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3058.648849][T27482] device team_slave_0 left promiscuous mode [ 3058.657839][T27482] device team_slave_1 left promiscuous mode 19:35:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xe4\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\xd8\xe8\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3058.859281][T27491] device team0 entered promiscuous mode [ 3058.899870][T27491] device team_slave_0 entered promiscuous mode [ 3058.918933][T27491] device team_slave_1 entered promiscuous mode 19:35:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf4\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3058.965467][T27491] 8021q: adding VLAN 0 to HW filter on device team0 [ 3059.019569][T27490] device team0 left promiscuous mode [ 3059.032691][T27490] device team_slave_0 left promiscuous mode [ 3059.073179][T27490] device team_slave_1 left promiscuous mode 19:35:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf5\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3059.834456][T27545] device team0 entered promiscuous mode [ 3059.843004][T27545] device team_slave_0 entered promiscuous mode [ 3059.855156][T27545] device team_slave_1 entered promiscuous mode [ 3059.874416][T27545] 8021q: adding VLAN 0 to HW filter on device team0 [ 3059.933696][T27491] device team0 left promiscuous mode [ 3059.952129][T27491] device team_slave_0 left promiscuous mode [ 3059.993010][T27491] device team_slave_1 left promiscuous mode [ 3060.041299][T27482] device team0 entered promiscuous mode [ 3060.058564][T27482] device team_slave_0 entered promiscuous mode [ 3060.066376][T27482] device team_slave_1 entered promiscuous mode [ 3060.092131][T27482] 8021q: adding VLAN 0 to HW filter on device team0 19:35:15 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) ioctl$VHOST_GET_VRING_ENDIAN(r0, 0x4008af14, &(0x7f00000002c0)={0x2, 0x48000}) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:15 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:15 executing program 1: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000280)=""/112, &(0x7f0000000300)=0x70) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3060.330780][T27751] device team0 left promiscuous mode 19:35:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3060.398005][T27751] device team_slave_0 left promiscuous mode [ 3060.467569][T27751] device team_slave_1 left promiscuous mode 19:35:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xff\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xff\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3061.349090][T27763] device team0 entered promiscuous mode [ 3061.354768][T27763] device team_slave_0 entered promiscuous mode [ 3061.368624][T27763] device team_slave_1 entered promiscuous mode [ 3061.378091][T27763] 8021q: adding VLAN 0 to HW filter on device team0 19:35:17 executing program 1: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000280)=""/112, &(0x7f0000000300)=0x70) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 3061.401135][T27766] device team0 left promiscuous mode [ 3061.408914][T27766] device team_slave_0 left promiscuous mode [ 3061.432043][T27766] device team_slave_1 left promiscuous mode [ 3061.468563][T27815] device team0 entered promiscuous mode [ 3061.487235][T27815] device team_slave_0 entered promiscuous mode [ 3061.512498][T27815] device team_slave_1 entered promiscuous mode [ 3061.524420][T27815] 8021q: adding VLAN 0 to HW filter on device team0 [ 3061.537164][T27989] device team0 left promiscuous mode [ 3061.550542][T27989] device team_slave_0 left promiscuous mode [ 3061.557401][T27989] device team_slave_1 left promiscuous mode [ 3061.607735][T28003] device team0 left promiscuous mode 19:35:17 executing program 5: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000200)='/dev/audio\x00', 0x200000, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_IRQ_BUSID(r0, 0xc0106403, &(0x7f0000000300)={0x9, 0x6, 0x2}) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000280)={'TPROXY\x00'}, &(0x7f00000002c0)=0x1e) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') 19:35:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3061.662535][T28003] device team_slave_0 left promiscuous mode [ 3061.701075][T28003] device team_slave_1 left promiscuous mode 19:35:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3062.412541][T28005] device team0 entered promiscuous mode [ 3062.421949][T28005] device team_slave_0 entered promiscuous mode [ 3062.431388][T28005] device team_slave_1 entered promiscuous mode [ 3062.448356][T28005] 8021q: adding VLAN 0 to HW filter on device team0 [ 3062.466916][T28028] device team0 entered promiscuous mode [ 3062.485556][T28028] device team_slave_0 entered promiscuous mode [ 3062.506930][T28028] device team_slave_1 entered promiscuous mode [ 3062.532606][T28028] 8021q: adding VLAN 0 to HW filter on device team0 19:35:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, 0x0) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') 19:35:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:18 executing program 1: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x74, &(0x7f0000000280)=""/112, &(0x7f0000000300)=0x70) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 3062.579789][T28140] device team0 left promiscuous mode [ 3062.600955][T28140] device team_slave_0 left promiscuous mode 19:35:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3062.713243][T28140] device team_slave_1 left promiscuous mode [ 3062.806898][T28148] device team0 left promiscuous mode 19:35:18 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:18 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000002c0)={0x0}, 0x0) semget$private(0x0, 0xffffffffffffffff, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000280)={0x1f, {0x4, 0x5, 0x90, 0x80000000, 0xe01, 0x2000000000000000}}, 0x8) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) ioctl$sock_inet_SIOCDARP(r1, 0x8953, &(0x7f0000000140)={{0x2, 0x4e23, @rand_addr=0xfffffffffffffffa}, {0x1}, 0x28, {0x2, 0x4e20, @multicast2}, 'bridge_slave_0\x00'}) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 3062.838654][T28148] device team_slave_0 left promiscuous mode 19:35:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3062.899999][T28148] device team_slave_1 left promiscuous mode 19:35:18 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0)={0x0}, 0x0) semget$private(0x0, 0x0, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = dup(r1) r3 = accept$packet(r1, &(0x7f0000000640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000680)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000700)={@loopback, 0x65, r4}) r5 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r5, 0x0, 0x61, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000001740)={0x10, 0xfffffffffffffff5, 0x8}, 0x10) preadv(r3, &(0x7f0000002b40)=[{&(0x7f0000000300)=""/77, 0x4d}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000001740)}, {&(0x7f0000001780)=""/212, 0xd4}, {&(0x7f0000001880)=""/255, 0xff}, {&(0x7f0000001980)=""/90, 0x5a}, {&(0x7f0000001a00)=""/7, 0x7}, {&(0x7f0000001a40)=""/245, 0xf5}, {&(0x7f0000001b40)=""/4096, 0x1000}], 0x9, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) ioctl$EVIOCGID(r1, 0x80084502, &(0x7f00000006c0)=""/5) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000280)={r0, 0x2b, "b6d2cfa1c26b2bd3362e5ef4ca6c1edf8276ad5494b7efeac04f8d9a1c9adeb6c0239aace29a5f10914d0a"}, &(0x7f00000002c0)=0x33) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000180), &(0x7f00000001c0)=0x4) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000480), &(0x7f00000004c0)=0x4) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000400)={0x5, 0x8, 0x2, 0xe5, 0x7, 0xfff}) fcntl$getflags(r1, 0xb) ioctl$SIOCRSGCAUSE(r1, 0x89e0, &(0x7f0000000140)) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$SIOCX25CALLACCPTAPPRV(r1, 0x89e8) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000380)=0xc) ptrace$pokeuser(0x6, r6, 0x6, 0xfff) 19:35:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3063.619973][T28156] device team0 entered promiscuous mode [ 3063.631306][T28156] device team_slave_0 entered promiscuous mode [ 3063.659290][T28156] device team_slave_1 entered promiscuous mode [ 3063.681410][T28156] 8021q: adding VLAN 0 to HW filter on device team0 [ 3063.738157][T28277] device team0 entered promiscuous mode [ 3063.745567][T28277] device team_slave_0 entered promiscuous mode [ 3063.773445][T28277] device team_slave_1 entered promiscuous mode [ 3063.802069][T28277] 8021q: adding VLAN 0 to HW filter on device team0 19:35:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, 0x0) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3063.929496][T28274] device team0 left promiscuous mode [ 3063.978109][T28274] device team_slave_0 left promiscuous mode [ 3064.021420][T28274] device team_slave_1 left promiscuous mode [ 3064.037381][T28277] device team0 entered promiscuous mode [ 3064.075718][T28277] device team_slave_0 entered promiscuous mode [ 3064.107530][T28277] device team_slave_1 entered promiscuous mode 19:35:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') 19:35:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:19 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {0x0}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3064.144387][T28277] 8021q: adding VLAN 0 to HW filter on device team0 19:35:20 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/mixer\x00', 0x200, 0x0) bind$pptp(r0, &(0x7f00000002c0)={0x18, 0x2, {0x3}}, 0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) ioctl$UI_BEGIN_FF_ERASE(r1, 0xc00c55ca, &(0x7f0000000240)={0x4, 0x3, 0x7fffffff}) ioctl$UI_DEV_SETUP(r0, 0x405c5503, &(0x7f0000000300)={{0x7, 0x40, 0x8, 0x4}, 'syz1\x00', 0x51}) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0xfffffffffffffd87, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000200)={'gretap0\x00', 0x4bfb}) 19:35:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {0x0}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, 0x0) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:20 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3064.658743][T28414] device team0 left promiscuous mode 19:35:20 executing program 3 (fault-call:5 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) [ 3064.735813][T28414] device team_slave_0 left promiscuous mode 19:35:20 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {0x0}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3064.792368][T28414] device team_slave_1 left promiscuous mode [ 3064.874745][T28464] device gretap0 entered promiscuous mode 19:35:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3064.958718][T28565] FAULT_INJECTION: forcing a failure. [ 3064.958718][T28565] name failslab, interval 1, probability 0, space 0, times 0 [ 3065.065099][T28565] CPU: 1 PID: 28565 Comm: syz-executor.3 Not tainted 5.1.0-rc1 #28 [ 3065.073053][T28565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3065.083120][T28565] Call Trace: [ 3065.086431][T28565] dump_stack+0x172/0x1f0 [ 3065.090785][T28565] should_fail.cold+0xa/0x15 [ 3065.095398][T28565] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3065.101227][T28565] ? ___might_sleep+0x163/0x280 [ 3065.106095][T28565] __should_failslab+0x121/0x190 [ 3065.111057][T28565] should_failslab+0x9/0x14 [ 3065.115572][T28565] kmem_cache_alloc_node_trace+0x270/0x720 [ 3065.121412][T28565] ? mutex_trylock+0x1e0/0x1e0 [ 3065.126207][T28565] __kmalloc_node+0x3d/0x70 [ 3065.130734][T28565] kvmalloc_node+0x68/0x100 [ 3065.135253][T28565] alloc_netdev_mqs+0x98/0xd30 [ 3065.140123][T28565] ? sl_free_netdev+0x70/0x70 [ 3065.144825][T28565] slip_open+0x38e/0x1138 [ 3065.149178][T28565] ? sl_uninit+0x20/0x20 [ 3065.153431][T28565] ? lock_downgrade+0x880/0x880 [ 3065.158303][T28565] ? sl_uninit+0x20/0x20 [ 3065.162563][T28565] tty_ldisc_open.isra.0+0x8b/0xe0 [ 3065.167694][T28565] tty_set_ldisc+0x2d7/0x690 [ 3065.172314][T28565] tty_ioctl+0xe69/0x14d0 [ 3065.176698][T28565] ? tty_register_device+0x40/0x40 [ 3065.181815][T28565] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3065.188069][T28565] ? tomoyo_init_request_info+0x105/0x1d0 [ 3065.193910][T28565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3065.200169][T28565] ? tomoyo_path_number_perm+0x263/0x520 [ 3065.205996][T28565] ? find_held_lock+0x35/0x130 [ 3065.210776][T28565] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 3065.216608][T28565] ? __fget+0x35a/0x550 [ 3065.228347][T28565] ? tty_register_device+0x40/0x40 [ 3065.233485][T28565] do_vfs_ioctl+0xd6e/0x1390 [ 3065.238119][T28565] ? ioctl_preallocate+0x210/0x210 [ 3065.243245][T28565] ? smack_file_ioctl+0x196/0x310 [ 3065.248285][T28565] ? smack_inode_rename+0x2d0/0x2d0 [ 3065.253598][T28565] ? fput_many+0x12c/0x1a0 [ 3065.258035][T28565] ? tomoyo_file_ioctl+0x23/0x30 [ 3065.262990][T28565] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3065.269250][T28565] ? security_file_ioctl+0x93/0xc0 [ 3065.274381][T28565] ksys_ioctl+0xab/0xd0 [ 3065.278561][T28565] __x64_sys_ioctl+0x73/0xb0 [ 3065.283166][T28565] do_syscall_64+0x103/0x610 [ 3065.287774][T28565] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3065.293692][T28565] RIP: 0033:0x458079 19:35:21 executing program 1 (fault-call:7 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3065.297695][T28565] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3065.317326][T28565] RSP: 002b:00007f0ddff8fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3065.325759][T28565] RAX: ffffffffffffffda RBX: 00007f0ddff8fc90 RCX: 0000000000458079 [ 3065.333741][T28565] RDX: 0000000020000100 RSI: 0000000000005423 RDI: 0000000000000004 [ 3065.342237][T28565] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3065.350221][T28565] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f0ddff906d4 [ 3065.358202][T28565] R13: 00000000004c22d2 R14: 00000000004d4c70 R15: 0000000000000005 19:35:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:21 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)=0x0) getpriority(0x1, r0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x12000, 0x0) r2 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="7f696c74657200000000000000000000000000000000000000000000000000006200000019f3cb2f0e62a1b86dbbdb0adf56ef5434c4b53961e5365c489034f650cbc393f618267211f17f47d0f8036f48c716a0fc11350024984f5b8f2bef401c7448261b263d18e403a895b598f6799fee9dac70368aa56c3b0b2f46c6e0a00c21d15d50af4e6564bede60a7339501edd007"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) getpeername$unix(r1, &(0x7f0000000180)=@abs, &(0x7f0000000040)=0x6e) 19:35:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00>\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3065.913956][T28716] device team0 entered promiscuous mode [ 3065.998770][T28716] device team_slave_0 entered promiscuous mode [ 3066.032112][T28716] device team_slave_1 entered promiscuous mode 19:35:21 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000140)={0x0, 0x6}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000001400)={r3, @in6={{0xa, 0x4e21, 0xfffffffffffffffa, @local, 0x9}}}, &(0x7f0000000380)=0x84) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) [ 3066.303387][T28716] 8021q: adding VLAN 0 to HW filter on device team0 19:35:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000001400)=ANY=[@ANYRES32=r2, @ANYBLOB="019739dd2b3f850000000100205301a8a86752103d8add4f78bd094d5851b296b0f52c83d6ac23765e5b22c496e41ebc7870341ab4d347a6e8016c56e27db2f450ce09897bb68d9b77160d20aea66c0324e2cd5948642cb9a7c8717d155f8b23e3836f9d6d031f4e38ed223419969efe8589738f57a36a63e529f2e84de6e65dff77dd801de0c7e1e0560114af1bbb5d086b996ae8dc566eb6a47d2f03c9cc54a1d58f96942cf0f7fff9a30de7a7bb1c17379aece70c8d1b217edd97a995a3bc747e9b23c01d9c090f949d464c2e5fea7ad683cba1a48c2a94f72f3af2"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3066.485201][T28743] device team0 left promiscuous mode [ 3066.530057][T28743] device team_slave_0 left promiscuous mode [ 3066.536141][T28743] device team_slave_1 left promiscuous mode 19:35:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x18\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f00000003c0)='nfs4\x00', &(0x7f0000001580)='./file1\x00', 0xffffffffffffffc4, 0xa, &(0x7f0000002b40)=[{&(0x7f00000015c0)="63c97d022986e0a5776051eb6263c66791c60d361d18b8d9f79819c3518c7216fb9a0b2b5e601c093585901010ef50f87cb954ee9d3824d17383611adee97a178aff48d41465448872bdc6ef9fcdc8ddf90c507c81355099be349a663a877936f5550fe9ce0b8c4f255b814bb4b2bd48ef82a69fce1f09f9c4df5ebe64d3b89c98a0569bb2f34fa58338abecaa5d8e1d8b0bd8fcb677cfd0f4f43e51e9c256c7ca1187d40d6416c04894eb4fc7cd776ba76da1bad27e137f45", 0xb9, 0x80000001}, {&(0x7f0000001680)="5efbd029584890483f6240e532b428a7cc1543627a544bdb6d9c4ab22e7b2f987cc2f9340d4d6ce7efd592743d40067f6579c77ca538151e2bb2415ae42807783d9ecc261b563b43af5c0a44", 0x4c, 0x80000000}, {&(0x7f0000001800)="14bf0eff4f70ecd656bf3430711c470aa026de7f77c2c969f233dc62ec0cb46130b85140ed197c88bae0590fc3a541b654d43c50b6bcb37811abb6ef3fd30d08526f1a78e306d667b4c505996b9dff13e74354d756dab9239df613f119f862a8d39c53bb6cc58b3689e9930ed134c64e44ebbd68c1ee543f35719428a9ed1f6ae1476ea25a03fab807eabff0c6407486798c43992f38477aae70661914cb9fa4050ffa2f682a45a27e", 0xa9, 0x4}, {&(0x7f00000018c0)="15e8126574f85f0379d588d157257ab49dd50b837bd66bdbf2273a23ea91a66e72fe2ec4874a082a326749d230dd049d2298bb0cad38f8ed14a8e327a30704bd7b512750e1a6a9b6d22b22135d768a5759c5b4792dda832497cb192b1024cacb9f639ee04049d2679c8bda45631212d173de071f25ab", 0x76, 0x3ff}, {&(0x7f0000001940)="1bd9ef676db805e83b9cccc57e6e6d7e679a790e631195856ddbda28b918c6b4b380b2c0", 0x24, 0x8}, {&(0x7f0000001a00)="d23cb78355d80a805c1728e24ccf1e37013e5079146cde582c64cb5c1683b2423e82ab095997c2c84dd847aa696bc934b9693c0e32a7dd9e0d5d4128cbd7b1143a3b71fb900e45ae27a9d4b6b27d7003804fe81f58efc9619146e41ae78d9100cb65ef18186d3af447d1c947b1fb9b1a2b23844a752037d681f7", 0x7a, 0x4}, {&(0x7f0000001a80)="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", 0x1000, 0x5}, {&(0x7f0000001980), 0x0, 0x4e01897f}, {&(0x7f0000002a80)="eca0a0f4dd54c47d5d017aa862eaa3627007cb727ed490654f9ab0ee58b92798008c331fc243a5bf6a0841c2c3a954d3dd867baa34c79b3268a3dae10998eb7094a7e5c56b076c649803", 0x4a, 0x1}, {&(0x7f0000002b00)="b55f63ab94c9e61f20e66fc02416987351d9ee601e39a8dfea068c89ce57d37dfbad7693e1a4ba87dff5", 0x2a, 0x1}], 0x4, &(0x7f0000002c40)='ppp1\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001400)=@gettaction={0xd0, 0x32, 0x301, 0x70bd29, 0x25dfdbfb, {}, [@action_gd=@TCA_ACT_TAB={0x80, 0x1, [{0x14, 0x1, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x13, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x14, 0xc, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x10, 0x16, @TCA_ACT_INDEX={0x8, 0x3, 0x1f}}, {0x14, 0x1c, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x10, 0x1, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}, {0x10, 0x7, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}]}, @action_dump_flags=@TCA_ROOT_FLAGS={0xc, 0x2, {0x1}}, @action_gd=@TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x1b, @TCA_ACT_KIND={0xc, 0x1, 'mirred\x00'}}]}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x1000}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x1a}, @action_dump_flags=@TCA_ROOT_TIME_DELTA={0x8, 0x4, 0x80000001}]}, 0xd0}}, 0x1) [ 3066.719330][T28725] device team0 entered promiscuous mode [ 3066.751072][T28725] device team_slave_0 entered promiscuous mode [ 3066.816406][T28725] device team_slave_1 entered promiscuous mode [ 3066.885100][T28725] 8021q: adding VLAN 0 to HW filter on device team0 19:35:22 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000006200000019f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8039148c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv\xa4\xc8QC\xee\xba\x85\xca\x87v4/vs/conn_r\xc1OI0\x14S4)j\xca)\xa7\x89S\x03\x96\x87R\xda\'\x95\xe35\xbe\xda\xc1\x8fE\xf6i\no\xa5\xf49\x06\x12x\xa6\xdf.J\xffA\n\x89d\xe2\x9b\nk\xcf\xd5\x1a\xe0k5v\x80\xaeKM!\x1c\xe0v$\'$t\xb7~}!\x12\x9b5z\xa4?\xc5\x8e\xd8\xe4\xcc{\x87\x05\xef$\x9c\xe1\x99\xf0}E\x17\xbc*/\x02\x13\x92\x99\xad\xec\xa0\xe2\xc6\xe0xkf\xcb\xbaaC9\x9c', 0x2, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000180)=0x1) 19:35:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:22 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000001400)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000010020531e51b296b0f52c83d6ac7b68a4993354bc204ac0b64a566f8fcdb3ee5dde2d2dcdf4e5eb36eaf1bb9900000862ad3f8d293cfb39422bbebbdafc843d9431dd8a87451b19b5c5ca996d3d60333fb191d1f61a568ff53f85787baaf8d7e7571e1df7229f7f52f3f9150019475b0d1522725ae604a657d9a29018dcb6e0204b781ba5c7abbee77e41cf8ed9fab44518ae224386845fb8b43517707f7152b4e789b207b9805a1396bbebf726794fd6bd7364273ef88f21525e134d03f5982e522f639f414a5d4a46245ecae63b4bf6ed59fb85111cd4b6e255c0f28b3a2ba4a6ae60c1145dcd3d51b38b"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x04\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3067.306871][T28892] device team0 left promiscuous mode 19:35:23 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nfc_llcp(r0, &(0x7f0000001980)={&(0x7f0000001580)={0x27, 0x0, 0x0, 0x5, 0x8, 0x40, "1b5903795aa50a2b80dd4913b5cdb201b65a18b5bd3e199c6f2da2fe303081bf428afe5d1e2e419234c289c653e732d6ca490d9fda5768945f8c1599fc8695", 0x19}, 0x60, &(0x7f0000001ac0)=[{&(0x7f0000001600)="17becd81fa79b40cf7df93676d6ebd662c6de65bc4485844123d5a7f10f11a5c195c188013aeaad4859f8054425a146e1ef0ddfd21afa9638bf137c26a666daabe8a36d160462b59baee2054691c6a29d2dca9d9545da4bf9bb957c0829b89bea46bccf5eef685a4fd41cb4ab2303c7894b647ec28d583f8466cc2a5778102009d2fdbe4f93a3de4b744b882e4abe19a8b5c04d1bab0e74d0f5ce6f8c962f5c14daf55e6c18a71a64a90f508c9c3cacaa34c9d9a443f1de7afc51fb7ddfdf8134eb16428d41ba392671e79", 0xcb}, {&(0x7f0000001800)="c3981795e5347148f0108c8138ab8c0ffd5a12d35465e70dad3ac6c3f7a707adb8cd5a861bfadf3522cd1f95095d1723651415e242d13c52ec491cd07559bedb572c", 0x42}, {&(0x7f0000001880)="46f5f4af1330de0ac4fb69d2a55eea7a7de77a91e4eed757eb10a1b27ecef7f30ed2923e4285cfa99dda0ea3aca6b14520be45fc3d776c9b9c83357d22159345235c3041d2aaf69dd336d3c49a7afcc366aa5253c86455ffaf6da254b29773edaaa9a725953012feade47555566e39b9d99f68c1f5dd15dd131208f9d636cadfafb56bf085ae320a44d430c8dd23183846cfb39fe3bd509eb2f3ae0cad492aef2828df0353b9e10d0ed5c3e62d5da8ebc01683052f96be80b5c2b821d81875363b3e7bda582997a4118706d8866d9520317c7d0df0ac3e253cd7672061b80b3be3", 0xe1}, {&(0x7f0000000100)="6979ec37fa7e4616d9c64e1cfa56b28719ae85c07b76b17eb1656bb75e2b3fcc47ee27fcf53708ef0cf983a497a00ea96d51497b79f19e6802d6e0", 0x3b}, {&(0x7f00000003c0)}, {&(0x7f0000001a00)="132f698cae9a67066501cebe58df321999ed64082aefa89f323c22c6904d5e2dbbc23837bbde0094e1e315409c103c39b13d5d0a41f33af008615787af02976606bed410a088fe6d0eaff40158537bab34b1664108f8e373464b36da8948cc4ce715d747797fb3b8616d9c3ff5e1c4aa73ce8774613e5a9ab9ccf28ca374723b9d1410214d7c6cb118151fdd1fae830095842cbf3e123b7ae4a4941396997c4b9b5863f837c5b9bf07f4592f757b60", 0xaf}], 0x6, 0x0, 0x0, 0x40}, 0x44) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000001400)=ANY=[@ANYRES32=r2, @ANYBLOB="0100ff07007f9040b14af6ff00003d8aff7cf543943233c7c596b0f549830000b56bd4baec8acffba6513baeb3e26aa7305129e7bdd0fef624a4b94657ad1fb929d9cf82ddb4b92f108b14bce299c32519f5a50292b240eb72e5cf70506c9177321035d3352cb0d4d172b547c97ac68c514c1cfc888ddb42fef8effb6f4141cbfae4a9b787dc3fd3411d79e212967d18ccf9236392059e237b3fc511af0ebb010bda24ce052685d615a6beb497308697939796c300000000000000000000000000000000"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000001b40)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000002c0)={0x0, 0x54, 0xc4c00000, 0x8000}, 0x10) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f00000000c0)={0x0, 0xec, 0x80000001}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000001d40)={r3, @in={{0x2, 0x4e21, @multicast1}}, 0x10001, 0x9, 0x5, 0xd72, 0x1}, &(0x7f0000000380)=0x98) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000001b80)={0x0, @in={{0x2, 0x4e23, @empty}}}, &(0x7f00000003c0)=0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000001c40)={r4, @in6={{0xa, 0x4e20, 0x3, @local, 0x7}}, 0x40, 0x4, 0x3f, 0x9, 0xf5}, &(0x7f0000001d00)=0x98) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3067.385945][T28892] device team_slave_0 left promiscuous mode [ 3067.475075][T28892] device team_slave_1 left promiscuous mode 19:35:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:23 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="01000000010020531e3d8add4f78bd094d5851b296b0002d83d6ac7b68a499"]) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$sock_inet_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000380)={'veth1_to_hsr\x00', {0x2, 0x4e24}}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000001400)={0x0, 0xfb, 0x96, 0x7, 0x8, "5327fccc0979a37111810e9cc30f3493", "cb7414c6cd6ea951b187110d970d061f9a89aa0656b851412e11a97b515f7a945cd6701ec12daa40692939d2389ee5c585a3fa26530003200453db5aca19deb974b79336f4f8dd166f798440e624d9f0fbb5a7ea587f19596cce33c017a7c6b12feee0e67931f84bd7c64752fc437fb34106f2ba6e3a7c8b83ac60e72d08ad7065"}, 0x96, 0x3) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r2) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3067.680330][T28933] device team0 entered promiscuous mode 19:35:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cachefiles\x00', 0x400, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000200)={r1, 0x1, 0x80000001, "2f0f16aeadcff34b1daecb6ee2d0b0485dfad51decf2364a808a803e96091bea299762e6dbbf0e16678789aa2fa2de587ebb9ea19e61d1ed797a0a729cf009b8250f"}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x4, 0xffffffffffffffff, 0x0) [ 3067.744840][T28933] device team_slave_0 entered promiscuous mode [ 3067.814316][T28933] device team_slave_1 entered promiscuous mode [ 3067.840758][T28933] 8021q: adding VLAN 0 to HW filter on device team0 [ 3067.965285][T29035] device team0 left promiscuous mode [ 3068.006727][T29035] device team_slave_0 left promiscuous mode [ 3068.099472][T29035] device team_slave_1 left promiscuous mode [ 3068.153594][T28933] device team0 entered promiscuous mode [ 3068.218554][T28933] device team_slave_0 entered promiscuous mode [ 3068.224913][T28933] device team_slave_1 entered promiscuous mode [ 3068.349968][T28933] 8021q: adding VLAN 0 to HW filter on device team0 19:35:24 executing program 5: perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x16}, 0x59, r1}) setsockopt$inet6_int(r0, 0x29, 0x1000000f9, &(0x7f0000000540)=0x7, 0xfffffffffffffeef) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x28c, 0x3ef, 0x200000000000000, 0x30c, 0x0, 0x0, 0xe003, 0x33c, 0x0, 0x0, 0x3603, 0x252, 0x8]}, 0x75, r2}) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r2}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYBLOB="210000004dc3bff6a3d819d4caffffff7f27b369c0cc545640afff9af97288ee0bb983881a4d5271b477a12a56b815752b2332869f8df76ac8a5cffba513d97cc2d108efcf86b462af492933a098526f"], &(0x7f0000000880)=0x1) rename(&(0x7f0000000780)='./file0\x00', &(0x7f0000000a80)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r5, 0x1000) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000240)='./bus\x00', 0x105000, 0x0) sendfile(r5, r6, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6(0xa, 0x3, 0x8001000000002b) connect$inet6(r7, &(0x7f00000000c0), 0x1c) sendmsg(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) 19:35:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r2, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') ioctl$KDGETMODE(r0, 0x4b3b, &(0x7f0000000140)) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:24 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x6685) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:24 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:24 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="010000000100669a981749bf2a13790f7b592f8c1923531e3d8add4f78bd09"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) socket$inet(0x2, 0x800, 0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x1c}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001900)=[{&(0x7f0000000380)=""/87}, {&(0x7f00000002c0)=""/16}, {&(0x7f0000001400)=""/209}, {&(0x7f0000001580)=""/122}, {&(0x7f0000001600)=""/229}, {&(0x7f0000001800)=""/230}], 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000140)={0x20000000}) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f0000001980), &(0x7f0000001a00)=0x4) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000280)={r0, 0x81, 0x5, "6e17cbddfb3e62e707a48cebb0af99e4608ba1c935e2cbf5d2d1ebc287bf0c17e7875dd4909c420fa3642d7aa56fe3c6312ca45ad19528cedca706d3d5db9206e100"}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x400040, 0x0) r2 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000180)={r2, 0x4dc905af, 0x0, "5df8e8bed608b60ec0873f1e60f47299c4581e6dd64cc4626b7aad86fca9626eadc7531ac2762ca6b1cb0d9d7a57185de20480a0667f308dd30a895dd77e4a22303bab661addac9da80e660bc5587dbed570b1833124abb7692cb76d51ef1423bf4244d4d13b418102ab32c1284a45743a46e312a5d360b52c10ab927e17f74d5b7e2e55d14ca6b2a4437d938fc1a077e09605ebe65bb32c201902086bbe99d886c2d05e076c2723973b34aa88db31725d1074b480100a37241bec"}) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3068.995151][ T26] audit: type=1804 audit(1552937724.689:116): pid=29194 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir340090139/syzkaller.Qy7SL2/9503/bus" dev="sda1" ino=16595 res=1 19:35:24 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3069.188551][ T26] audit: type=1800 audit(1552937724.699:117): pid=29194 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16595 res=0 19:35:25 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000280)={0x1f, 0x97, 0x8, 'queue1\x00', 0x1}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000010020531e3d000000000100000051b296b0f52c83d6ac7b68a499"]) fchdir(r1) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3069.423354][ T26] audit: type=1804 audit(1552937724.829:118): pid=29246 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir340090139/syzkaller.Qy7SL2/9503/bus" dev="sda1" ino=16595 res=1 19:35:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x0, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x40000, 0x0) setsockopt$sock_void(r1, 0x1, 0x3f, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) setsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000180)={0x80, 0x6}, 0x2) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3069.681614][ T26] audit: type=1804 audit(1552937724.849:119): pid=29246 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir340090139/syzkaller.Qy7SL2/9503/bus" dev="sda1" ino=16595 res=1 19:35:25 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3069.747355][T29446] device team0 left promiscuous mode 19:35:25 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={r1, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)='security.ima\x00', &(0x7f0000000380)=@v2={0x3, 0x2, 0x2, 0x9, 0x45, "4dc246d66b1c792c1a8822af588ff74b1cf165152c062486fc9ba03e4a5eb70c90753f71e09cb0b2026c56b4ba25e6aea32c3b61e1988e028c5df921943cdb977c35a3ed1f"}, 0x4f, 0x1) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000001580)='/dev/snd/pcmC#D#c\x00', 0xfffffffffffffffe, 0x80) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000015c0)={0x0, 0x68}, &(0x7f0000001600)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000001640)={0x5, 0x6, 0x0, 0x2, 0x8, 0x4, 0xfffffffffffffff9, 0x9, r3}, &(0x7f0000001680)=0x20) setsockopt$inet6_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, &(0x7f0000001400), 0x4) sendto$netrom(r0, &(0x7f0000001440)="d4f9912aa01327baebb6f4ce58eb6000e33676aa64e04e75a96b05d54cbb53d6f27f39392d73e1e677b9a4d6a012140baf64f694ebec700bf42187486f6916376d79b8f9eff46828a6d2ae12653279cfb83d388ecc9f2f6ce6346662d670cfafa687f23f8528dc058abcc579096935a3dffea7572210bbdf000d0de3d0770016ed90681b412e25b1efd1f1fa89bd499edf081e0c44523f5f9eac9976ead1a24aa19ea1a085fb33a0d11c", 0xaa, 0x800, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(0xffffffffffffffff, 0x8905, &(0x7f00000002c0)) [ 3069.774345][T29446] device team_slave_0 left promiscuous mode [ 3069.834938][T29446] device team_slave_1 left promiscuous mode 19:35:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3069.900770][ T26] audit: type=1800 audit(1552937724.849:120): pid=29246 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=16595 res=0 19:35:25 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) perf_event_open(&(0x7f0000000180)={0x6, 0x70, 0xfffffffffffffe01, 0x2, 0x2c0e, 0xffffffffffff8000, 0x0, 0x4, 0x200, 0xb, 0x0, 0x80000001, 0xca6, 0x7ff, 0x5e8862e3, 0x9, 0x0, 0xffffffff80000000, 0x9, 0x1b, 0x200, 0xffffffffc116a14c, 0x4, 0x75e, 0x8b8, 0xe68, 0x9, 0x6, 0x3, 0x8, 0x5, 0x100, 0x7fff, 0x3, 0x0, 0x4, 0x9, 0x4a5b, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000140), 0xa}, 0x10, 0x3e, 0x0, 0x8, 0x100000000, 0x7fffffff, 0x4}, 0x0, 0x9, r0, 0x2) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ubi_ctrl\x00', 0x208000, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r2, 0x4040ae72, &(0x7f0000000440)={0x67, 0x8001, 0xff, 0x4}) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='cpuacct.stat\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000280)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r3, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10002208}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x94, r4, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x60, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x100000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3ff}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7fffffff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x604}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x80000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80000001}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x1f24}]}, @TIPC_NLA_NET={0x4}, @TIPC_NLA_NET={0x1c, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffff6a7}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4004}, 0x90) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="0100000001003e531e3d8add91022c83d6ac7b68a499000000000000000000"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140)={0x7fff, 0x7a0, 0x8001, 0x80, 0x5}, 0x14) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3070.818630][T29450] device team0 entered promiscuous mode [ 3070.826169][T29450] device team_slave_0 entered promiscuous mode [ 3070.841251][T29450] device team_slave_1 entered promiscuous mode [ 3070.853295][T29450] 8021q: adding VLAN 0 to HW filter on device team0 [ 3070.889926][T29678] device team0 left promiscuous mode [ 3070.896499][T29678] device team_slave_0 left promiscuous mode [ 3070.908924][T29678] device team_slave_1 left promiscuous mode 19:35:26 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:26 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000007f, 0x0, 0xfffffffffffffffd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x3) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x0, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xfffffe57) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:27 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)={r3, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) fcntl$getown(r3, 0x9) getpid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={0xffffffffffffffff, r0, 0x0, 0x1, &(0x7f0000000140)='\x00'}, 0x30) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0xffffffffffffffff, r0, 0x0, 0xa, &(0x7f0000000380)='/dev/ptmx\x00'}, 0x30) r4 = getpgid(0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000001400)=0x0) kcmp$KCMP_EPOLL_TFD(r5, r4, 0x7, r2, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r2) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3071.417734][T29721] device team0 entered promiscuous mode 19:35:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x0, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:27 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3071.462265][T29721] device team_slave_0 entered promiscuous mode 19:35:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3071.518899][T29721] device team_slave_1 entered promiscuous mode 19:35:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="010001000000"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x20000, 0x0) getpeername$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, &(0x7f00000001c0)=0x1c) [ 3071.629797][T29721] 8021q: adding VLAN 0 to HW filter on device team0 19:35:27 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x17\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3071.849005][T29853] device team0 left promiscuous mode [ 3071.877750][T29853] device team_slave_0 left promiscuous mode [ 3071.946532][T29853] device team_slave_1 left promiscuous mode [ 3072.419158][T29852] device team0 entered promiscuous mode [ 3072.440466][T29852] device team_slave_0 entered promiscuous mode [ 3072.446801][T29852] device team_slave_1 entered promiscuous mode [ 3072.520062][T29852] 8021q: adding VLAN 0 to HW filter on device team0 19:35:28 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000280)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000006200000019f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211ff7f27d0f8036f488e5515f11a6807c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x22a480, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000140)=0x0) process_vm_readv(r3, &(0x7f0000001500)=[{&(0x7f00000003c0)=""/31, 0x1f}, {&(0x7f0000002a00)=""/4096, 0x1000}, {&(0x7f0000001400)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xfdf9}], 0x139, &(0x7f0000000380), 0x0, 0x0) close(r1) set_tid_address(&(0x7f0000000000)) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:28 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x18\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) set_thread_area(&(0x7f0000000140)={0x7ff3, 0x20000800, 0x0, 0x8, 0x81, 0x400, 0xbe, 0x3, 0x200, 0xb757}) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="000010001000"]) r1 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x4000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r1, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x500}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x5c, r2, 0xa28, 0x0, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x28, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@loopback}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syz_tun\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x82dad0e80000}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x81}, 0x80) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x400, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r3, &(0x7f00000001c0)="b11d5973523d5c9943275b654063008e3bcdad214ce568815c", &(0x7f0000000200)=""/200}, 0x18) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:28 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3072.790827][T29986] device team0 left promiscuous mode 19:35:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = accept$ax25(0xffffffffffffff9c, &(0x7f0000000380)={{0x3, @null}, [@rose, @default, @rose, @remote, @rose, @null, @null, @null]}, &(0x7f00000002c0)=0x48) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000001400)=""/18, &(0x7f0000001440)=0x12) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)={r3, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) r4 = syz_open_dev$video(&(0x7f0000000140)='/dev/video#\x00', 0xfffffffffffffff8, 0x20000) close(r4) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f0000001480)=0x40) [ 3072.855106][T29986] device team_slave_0 left promiscuous mode 19:35:28 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`)\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3072.931423][T29986] device team_slave_1 left promiscuous mode 19:35:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x1}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000001580)=ANY=[@ANYRES32=r2, @ANYBLOB="01f3fe00010000001e3d8add4f78bd074d5851b296b024330d81c0f52c83d6ac7b68a49885cd599d68c3982af5302269e2b3ac905642c6068e86816152ba04a172305a46185da55ae6e123f8bb5fc62269ed08664bdc896d1c75b2a08b645138254b0d53eb33bbd0fdf4673753d517ac9bf4722f78a8f029ad65768fe43a811073"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r2, 0x12, 0x2, &(0x7f0000001400)=""/134, &(0x7f00000002c0)=0x86) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) r3 = semget$private(0x0, 0x4, 0x1) stat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r1, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000016c0)=0x0, &(0x7f0000001880), &(0x7f00000018c0)) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000001900)={{0x6, r4, r5, r6, r7, 0x0, 0x7}, 0x0, 0xfffffffffffffe9b, 0x6}) 19:35:28 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa8*\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:29 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00>\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3074.065493][T30063] device team0 entered promiscuous mode [ 3074.073518][T30063] device team_slave_0 entered promiscuous mode [ 3074.091371][T30063] device team_slave_1 entered promiscuous mode [ 3074.120112][T30063] 8021q: adding VLAN 0 to HW filter on device team0 [ 3074.143210][T30128] device team0 left promiscuous mode [ 3074.158662][T30128] device team_slave_0 left promiscuous mode [ 3074.180050][T30128] device team_slave_1 left promiscuous mode [ 3074.396459][T30129] device team0 entered promiscuous mode [ 3074.415520][T30129] device team_slave_0 entered promiscuous mode [ 3074.431212][T30129] device team_slave_1 entered promiscuous mode [ 3074.446840][T30129] 8021q: adding VLAN 0 to HW filter on device team0 19:35:30 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) r0 = dup(0xffffffffffffffff) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000200)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000740)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f0000000f80)) dup(r2) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000006200000019f3cb2fa7310f6a4772a6d8a4935516520e93f618267211f17f27d0f8036f48c716a0fc113500249800000000ef441c7448261b263d18e003a895b598f6799fee2f46c6e0ac1521d15d50af4e650000de60a7339500000000000000000000000000"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) sendmmsg$alg(r0, &(0x7f0000000ec0)=[{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000280)="dd6a16b812db11a850ed1844a7275392b57668b8874a80955e2ed33c23298b4b5fcc04b373750280f87d00f3e7d73f59c60ad32a54f6c11b76997ae89968656af96a4f2e443b133faf4b682be33c39c62b79ca99f2ddb74bbc101373062ac6c9afd1bcae385b7bdddcf3eff3c4ac66260b2d12e193e5", 0x76}, {&(0x7f0000000300)="ffb2bb5d19cc32f35a6a6062154bab7518d1ec14a905c1944e40e64dcf58c501f55d3d3d549e32c529caf547b85c483439975b689cd1039eb8faba1184c77a1ca7b30b2a65b05cdabc7cd1a6a93d6ca6365d84d21a973e80a9ddf35c15eeb5a6a7dd29292b266f262487fb3ce2", 0x6d}, {&(0x7f0000000380)="8863767c2c2f1da532c116fe7245604943211902b74811a3de6213511302ffe9dac57d1b765c886d46fac00c524b9a1c68", 0x31}, {&(0x7f0000000400)="eb7e2e59593dd0b1b378951c4770097e3bfb9184630bc82ad094adfec5f342f041daecbeeb861279025021b07629e049b0c2f4fcc76fe69c45ee6b0d71fdb8a1ac63f2ad1900df5028f2f2eb5709e6473c48086361b69ab0d4b906d791a3b88ca725a935da245d2bcf0c673ebbff47d77e71443d8fed6216c060daf173c47798ff363fa62f5f4813", 0x88}, {&(0x7f00000004c0)="59d337f44c081fd9cc7f26039def4fa5fef383", 0x13}, {&(0x7f0000000500)="650e07b657e5e99e70e754aaab0aa07eb80d7f62310494ac1b0e404817cb4da6da95398422cd4ed408d55fb5ed55c014ba7c84173ef003c40efc1fd125d7c124adf311931f771c10d45a62d12168fad08503b33bbbe9bb83226d465b809d21aecb72f02f6885dfec9b065abdb2d7eda9a969b7bcae8e069fb759a0f866715e8d3df1572852c3", 0x86}, {&(0x7f00000005c0)="629a4a56cce522260a89087b86e7d257fb13a286f5ba4526a05e138082c2aeee3f5926b6a5dff53e196816d18729d1bd5121be932c0fd387a8d467142a10b354b183d7848b8fcb01ecb309047854eceb8200b8a498af3de96aae8dbe329d29ff1025599fa8b4d1c661b870c95125cb7144236c473e1e12d2cfaa892e5f5f18cd2b98ede7482556ac713c1a98ebcb5cbadee7076608246cb0ac68e9c29319df57912712342c7553676fe4796b6f9da79a09cabdf32aaa5f467fa54f0c86a85f0c4335b72c8d7493284cac0c4d30fce48bf10116dc4ccdaa2d5fc02f0c6192f8efc9a4a3e053b8b9ec4b1ccd", 0xeb}], 0x7, &(0x7f0000000fc0)=ANY=[@ANYBLOB="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"], 0x430, 0x40000}, {0x0, 0x0, &(0x7f0000000bc0)=[{&(0x7f0000000b80)="ab5e695527ad429df02449c8bb266a0297e5e872eaed3706ff6566cd11", 0x1d}], 0x1, &(0x7f0000000c00)=[@iv={0xf0, 0x117, 0x2, 0xda, "5f4fd160b1c20001bb7118443aafcd709e72c3f3c1c847c880b9e658f638cef2815e93173780c3095ef16f165ae301740ae0676b82437c72c2d46edfed7a0f5d974d8713387a61af081f2711e080d30e9e5f39833c50e61f275e6741849444caa51d7c8690efd445476d4569e57d34651514bd495cd70ecff49fe895836421a0d4d3e2d7268ce7178f0e51ef1c33231b33baafdbfae66700cb602e521751e9ae0ab1079c5fed090b4a0349c9b287afaf417dfe9b20e6682ef05f0bf3bdc01a2c3d75687543ab3521778fcb45c1b299cc514959aae099af6a9831"}, @assoc={0x18}, @op={0x18}], 0x120, 0x4008080}, {0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000d40)="24a15b5de97889e47721e477eadcba7e7a39361b8566cfc2d9f30dfdded3860586cc67a53a53c8d406698bb19f40f62d769f98b046994eb05b4201d4991bd2e605e2335e9d6e528dcfaf8cf34bf46625e316c02af08d57b52c4bc5988a8aa37b3526c6184470655f810af5413a88daddf59909623e7c251d26956bb1d8b58979bb23f478a8296460a3c162c0566b5660752783dacc662c", 0x97}, {&(0x7f0000000e00)="cd92c4d79dfbd83473cb94e51492b56b00cc93430a7e4fe4a467060e79d7bc0141f7905e1905cf9860146c2464bb8b194a0aabcfbe39626b79ea396564a6758eba41f3d4975ead1ddee80a0c816e94cc0ce74d2a5ce7d9", 0x57}], 0x2, 0x0, 0x0, 0x24000040}], 0x3, 0x80) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="01008328d158920c61025647fd0000010020531e3d8add4f78bd094d5851b2"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000002c0)={0x0, 0x3c, &(0x7f0000000140)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x19}}, @in6={0xa, 0x4e24, 0x8, @local, 0x2}, @in={0x2, 0x4e20, @loopback}]}, &(0x7f0000000380)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f00000003c0)={r3, 0x4, 0x30}, &(0x7f0000001400)=0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:30 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:30 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000001c0)={0x0, 0x0, 0x2, 0x8}) r2 = getpid() ptrace$setsig(0x4203, r2, 0x8, &(0x7f0000000140)={0x34, 0x1f, 0x8}) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:30 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_DEASSIGN_PCI_DEVICE(r0, 0x4040ae72, &(0x7f0000000140)={0xb0fb, 0x4, 0xdd, 0x2, 0xfffffffffffffffc}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f00000002c0)={0x8, [0x3f, 0x3af06b46, 0x3068, 0x40, 0xa9, 0x9, 0x20, 0xfc]}, 0x14) [ 3074.770588][T30163] device team0 left promiscuous mode [ 3074.839303][T30163] device team_slave_0 left promiscuous mode 19:35:30 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)`\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3074.921940][T30163] device team_slave_1 left promiscuous mode 19:35:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x10000}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000001a80)={r2, 0x4000000000002}, &(0x7f0000001940)=0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000001880)=ANY=[@ANYRES32=r3, @ANYBLOB="01000000010020531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499529bc648c54a54b32175f7e1bd5b2fe7ff5317492233b66d033e9e543079bdbdc078a8f392287bd7d8d2e70c665b7fc4e2e831debad1340e3254a0eb01307f5cf01dd29f67a43c989a9fd209adff7019431f3b81bbeaf6fa2d999e0000"]) getsockname$inet6(r0, &(0x7f0000000140), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000001980)='./file0\x00', &(0x7f0000001a00)='trusted.overlay.origin\x00', &(0x7f0000001a40)='y\x00', 0x2, 0x3) close(r1) ioctl$KDDELIO(r0, 0x4b35, 0x100000000) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') r4 = syz_genetlink_get_family_id$nbd(&(0x7f00000000c0)='nbd\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001580)={{{@in6=@mcast1, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@local}}, &(0x7f0000001480)=0xe8) stat(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ATTR(r0, &(0x7f0000001800)={0x78, 0xfffffffffffffff5, 0x8, {0xfffffffffffffffb, 0x6, 0x0, {0x0, 0x3, 0xffffffffffff8980, 0x4, 0x80000000, 0x100000001, 0x4, 0x3, 0x7, 0x87, 0x1ff, r5, r6, 0x200, 0x8}}}, 0x78) sendmsg$NBD_CMD_CONNECT(r0, &(0x7f0000001440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000001400)={&(0x7f00000002c0)={0x1c, r4, 0x300, 0x2, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:30 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x80\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:30 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x20001, 0x0) recvfrom$inet(r1, &(0x7f0000001580)=""/191, 0xbf, 0x40010000, &(0x7f00000014c0)={0x2, 0x4e22, @multicast1}, 0x10) r2 = openat$audio(0xffffffffffffff9c, 0x0, 0x20000000000, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000001400)=ANY=[@ANYRES32=r4, @ANYBLOB="01000000010020531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a4990619ce07de7043186248fe7b37bdfae53e18a0ce776c6c8bd1bf105a78a73a2bfc3808f683ee79a1d3ac6bbebdaa4b25d31b35b4920358440253b113a6a3f41009e0c4626ee8c8400ed71948872417694683d1e9edf259eb53c1d2e0b48abdabcfdb03ae708cb034"]) getsockname$inet6(r2, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r2, 0x800442d3, &(0x7f0000000140)={0x9, 0x1000, 0x4, @local, 'bond_slave_1\x00'}) fcntl$getownex(r3, 0x10, &(0x7f00000002c0)={0x0, 0x0}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000001640)={0x0, 0x4}, &(0x7f0000001680)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000016c0)={r6, 0xff}, &(0x7f0000001800)=0x8) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000003c0)={0x0, r0, 0x0, 0x7, &(0x7f0000000380)='TIPCv2\x00'}, 0x30) kcmp$KCMP_EPOLL_TFD(r7, r5, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r3) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r2, 0x4, 0x20, r2, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3075.839247][T30169] device team0 entered promiscuous mode [ 3075.880290][T30169] device team_slave_0 entered promiscuous mode [ 3075.898819][T30169] device team_slave_1 entered promiscuous mode [ 3075.913619][T30169] 8021q: adding VLAN 0 to HW filter on device team0 [ 3075.993559][T30308] device team0 left promiscuous mode [ 3076.012534][T30308] device team_slave_0 left promiscuous mode [ 3076.037591][T30308] device team_slave_1 left promiscuous mode 19:35:32 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000200)={0x2e, @multicast1, 0x4e20, 0x0, 'dh\x00', 0x22, 0x3, 0x3f}, 0x2c) 19:35:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*\xa8\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:32 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32=r3, @ANYBLOB="010000e8ad04472f696af94e6369bc6f04c4dc09000020531e3d8add4f78bd094d5851b296b0f52c95905d8668a499"]) sendfile(r0, r0, &(0x7f00000003c0), 0x1) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000000c0)={0x0, @multicast1, @broadcast}, &(0x7f00000002c0)=0xc) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000380)={@initdev={0xfe, 0x88, [], 0x1, 0x0}, r4}, 0x14) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r2) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r1 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x3b3, 0x66c2f25b90632efe) bind$netlink(r1, &(0x7f0000000180)={0x10, 0x0, 0x25dfdbfb, 0x1000000}, 0xc) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) prctl$PR_GET_PDEATHSIG(0x2, &(0x7f00000002c0)) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='TIPCv2\x00') kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3076.533212][T30342] device team0 entered promiscuous mode [ 3076.566720][T30342] device team_slave_0 entered promiscuous mode [ 3076.658158][T30342] device team_slave_1 entered promiscuous mode 19:35:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3076.816428][T30342] 8021q: adding VLAN 0 to HW filter on device team0 19:35:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') ioctl$NBD_SET_SOCK(r0, 0xab00, r0) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001400)={{{@in6=@initdev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@multicast1}}, &(0x7f0000000140)=0xe8) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000380)={@empty, @loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x5049, 0x1f, 0x6, 0x100, 0x8, 0x200, r3}) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3077.011265][T30480] device team0 left promiscuous mode [ 3077.016649][T30480] device team_slave_0 left promiscuous mode 19:35:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3077.089826][T30480] device team_slave_1 left promiscuous mode [ 3077.519198][T30470] device team0 entered promiscuous mode [ 3077.549369][T30470] device team_slave_0 entered promiscuous mode [ 3077.585026][T30470] device team_slave_1 entered promiscuous mode [ 3077.626064][T30470] 8021q: adding VLAN 0 to HW filter on device team0 19:35:33 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000006200000019f3cb2f0e62a1b86dbbdb0adf27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd00000000000000000000000000"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000200)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) getpeername$packet(r1, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) 19:35:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) fanotify_init(0x20, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:33 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h7\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:33 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000140)={0x0, 0x0, 0xfffffffffffffff9, 0x7ff, 0x80000000}, &(0x7f0000000180)=0x14) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={r2, 0x2b, "5ca37767d6bbb73d890c5bf58bbd4d22095e791e5cc4c0a1204f166ff3503cd896a4a68f8ff391b25b8f14"}, &(0x7f0000000200)=0x33) r3 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x1, 0x40) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)=0x0) ioctl$TUNSETGROUP(r3, 0x400454ce, r4) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:33 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:33 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00X:\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3078.053086][T30523] device team0 left promiscuous mode [ 3078.094693][T30523] device team_slave_0 left promiscuous mode 19:35:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001400)={0x0, 0x94, "7aaff6fb09cbb912b09e645a6f3569e116e0c63e38fd1f1465343b6f517473c1beed727e38147d41bf50b4a7c09cf01b04c4408b8c7d9ccb7f6f328f03bc4f150e517000f7c02362c484796c5abdd5806d8e9b89a84a0bd0f6bc298080531807fa2d85a195265e14f83df9faf8288dd2fbb0cc4fc5471fdc438bb030ea81d7d8545292d6eab74a39cb9027749849ad638ed5f1ca"}, &(0x7f0000000140)=0x9c) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={r3, 0x3f}, &(0x7f0000000380)=0x8) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3078.143921][T30523] device team_slave_1 left promiscuous mode 19:35:34 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="0100003d8af44f78bd094d5851b296b0f52c83d6ac7b68a499000000000000"]) getsockname$inet6(r0, &(0x7f0000000140), &(0x7f00000002c0)=0x1) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000001440)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r0, &(0x7f0000001580)={&(0x7f0000001400), 0xc, &(0x7f00000014c0)={&(0x7f0000001480)={0x30, r3, 0x302, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x80000001, 0x7303, 0x0, 0x80000001}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4}, 0x4000) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) mount(&(0x7f0000000040)=@sg0='/dev/sg0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000380)='securityfs\x00', 0x21000, &(0x7f00000003c0)='em0-\x00') getpeername$packet(r0, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001d00)=0x14) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000001d40)={@empty, @local, @loopback, 0x5, 0x60000, 0x9, 0x100, 0x0, 0x100, r4}) 19:35:34 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x9a\x02\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) setns(r2, 0x20000) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) socket$inet6(0xa, 0x807, 0x0) [ 3078.960004][T30530] device team0 entered promiscuous mode [ 3078.969274][T30530] device team_slave_0 entered promiscuous mode [ 3078.991848][T30530] device team_slave_1 entered promiscuous mode [ 3079.004052][T30530] 8021q: adding VLAN 0 to HW filter on device team0 [ 3079.165604][T30532] device team0 left promiscuous mode [ 3079.188538][T30532] device team_slave_0 left promiscuous mode [ 3079.194635][T30532] device team_slave_1 left promiscuous mode [ 3079.544336][T30655] device team0 entered promiscuous mode [ 3079.558724][T30655] device team_slave_0 entered promiscuous mode [ 3079.594031][T30655] device team_slave_1 entered promiscuous mode [ 3079.650013][T30655] 8021q: adding VLAN 0 to HW filter on device team0 19:35:35 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) r2 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x14000, 0x0) connect$ax25(r2, &(0x7f0000000280)={{0x3, @default, 0x8}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x48) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:35 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:35 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(r0) accept$packet(r1, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f00000002c0)=0x14) r2 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f00000000c0)={r4, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r2, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r2, 0x4, 0x20, r2, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x200000) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:35 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x40000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3080.129556][T30710] device team0 left promiscuous mode [ 3080.183964][T30710] device team_slave_0 left promiscuous mode [ 3080.253534][T30710] device team_slave_1 left promiscuous mode 19:35:36 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe8\xd8\x14\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) accept$ax25(r0, &(0x7f0000000380)={{0x3, @netrom}, [@netrom, @null, @netrom, @null, @bcast, @bcast, @null, @default]}, &(0x7f0000000140)=0x48) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:36 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)={r2, 0x1, 0x80800001, "20531e3d8add72be8a6d6351229796b0f52c83d6ac7b689a99"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(r0, 0x541b, 0x0) [ 3081.090214][T30719] device team0 entered promiscuous mode [ 3081.095833][T30719] device team_slave_0 entered promiscuous mode [ 3081.108723][T30719] device team_slave_1 entered promiscuous mode [ 3081.129074][T30719] 8021q: adding VLAN 0 to HW filter on device team0 [ 3081.293968][T30853] device team0 left promiscuous mode [ 3081.304104][T30853] device team_slave_0 left promiscuous mode [ 3081.310938][T30853] device team_slave_1 left promiscuous mode [ 3081.464318][T30854] device team0 entered promiscuous mode [ 3081.469980][T30854] device team_slave_0 entered promiscuous mode [ 3081.476370][T30854] device team_slave_1 entered promiscuous mode [ 3081.525281][T30854] 8021q: adding VLAN 0 to HW filter on device team0 19:35:37 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000002c0), &(0x7f0000000300)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0xe3b, 0x8101) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:37 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7f, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffff9b, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0xb) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0x9}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000380)={r3, 0x7fffffff}, 0x8) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000001580)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') mkdir(&(0x7f00000003c0)='./file0\x00', 0x4) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:37 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000140), &(0x7f0000000180)=0x4) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x15e) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) ioctl$TIOCEXCL(r1, 0x540c) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:37 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e24, @multicast1}, 0x10) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3081.832079][T30891] device team0 left promiscuous mode [ 3081.837804][T30891] device team_slave_0 left promiscuous mode [ 3081.918240][T30891] device team_slave_1 left promiscuous mode 19:35:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:37 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xc, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x80000001, 0x0) ioctl$VIDIOC_LOG_STATUS(r1, 0x5646, 0x0) ioctl$VIDIOC_REQBUFS(r1, 0xc0145608, &(0x7f00000002c0)={0xfffffffffffffffc, 0x1, 0x1}) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00']) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) getsockname$netrom(r1, &(0x7f0000000200)={{0x3, @null}, [@remote, @default, @default, @remote, @default, @default, @remote, @null]}, &(0x7f0000000280)=0x48) syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0xfffffffffffffffa, 0x153040) epoll_create1(0x80000) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vga_arbiter\x00', 0x40680, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x100, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) ioctl$KVM_SET_CPUID(r0, 0x4008ae8a, &(0x7f0000001400)={0x3, 0x0, [{0x4, 0x6, 0x800, 0x8, 0x8}, {0x80000000, 0x400000000000000, 0x800, 0x9, 0x7fffffff}, {0x4, 0x7, 0x2, 0x80, 0x80000001}]}) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000010020531e438afb4f78bd094d580000000000005bd3ac7b68a499"]) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/attr/exec\x00', 0x2, 0x0) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f0000000140)=@sack_info={0x0, 0x9, 0xfff}, &(0x7f00000002c0)=0xc) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f0000000380)={r3, 0x6}, 0x8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000001480)={0x3, 0xa1, 0x0, 0x200}, 0x8) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) ioctl$IMADDTIMER(r0, 0x80044940, &(0x7f00000014c0)) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3082.709499][T30974] device team0 entered promiscuous mode [ 3082.724755][T30974] device team_slave_0 entered promiscuous mode [ 3082.734422][T30974] device team_slave_1 entered promiscuous mode [ 3082.746479][T30974] 8021q: adding VLAN 0 to HW filter on device team0 [ 3082.780001][T31134] device team0 left promiscuous mode [ 3082.801992][T31134] device team_slave_0 left promiscuous mode [ 3082.808069][T31134] device team_slave_1 left promiscuous mode 19:35:38 executing program 5: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readlinkat(r0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/207, 0xcf) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:38 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="9da058fbc7a7651b8763610660"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syslog(0x1, &(0x7f0000000140)=""/152, 0x98) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$PIO_UNIMAPCLR(r1, 0x4b68, &(0x7f0000000140)={0x1bb0, 0x4, 0xe17}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3083.150471][T31160] device team0 entered promiscuous mode [ 3083.172870][T31160] device team_slave_0 entered promiscuous mode 19:35:38 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3083.203056][T31160] device team_slave_1 entered promiscuous mode 19:35:38 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0xc6, 0x200000) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f00000002c0)=@get={0x1, &(0x7f0000001400)=""/187, 0x1}) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="01000000010020531e3d8add4f78bd094d580900000000000000ac7b68a4f8"]) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r2) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3083.376131][T31160] 8021q: adding VLAN 0 to HW filter on device team0 19:35:39 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3083.564709][T31327] device team0 left promiscuous mode [ 3083.617073][T31327] device team_slave_0 left promiscuous mode [ 3083.685042][T31327] device team_slave_1 left promiscuous mode 19:35:39 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000280)={'bond_slave_0\x00', 0x4bfd}) 19:35:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="0d00e7ff0100"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/ipv6_route\x00') getsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:39 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000140), 0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:39 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3084.191306][T31326] device team0 entered promiscuous mode [ 3084.196892][T31326] device team_slave_0 entered promiscuous mode [ 3084.205580][T31326] device team_slave_1 entered promiscuous mode [ 3084.220333][T31326] 8021q: adding VLAN 0 to HW filter on device team0 19:35:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:40 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000001400)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000010020531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a4991f6f0c2a15665248ecb5c736c590003ab6ee0b4f2b17cd17c44bc7ccef218562676bef219c054d651c1c4bb101f85ed6b161d822f620458af2230ecf97f536598e03c9b2c2ff7e17718917bb6876e5b3eac450b3b8ba68c1128e0cee142eed20985f550e3699d9094108b7f623da918d3d"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r3 = syz_genetlink_get_family_id$nbd(&(0x7f0000000380)='nbd\x00') sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000001580)={&(0x7f00000002c0), 0xc, &(0x7f00000014c0)={&(0x7f00000003c0)={0x38, r3, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x8}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$VIDIOC_G_STD(r0, 0x80085617, &(0x7f00000000c0)=0x0) ioctl$VIDIOC_S_STD(r0, 0x40085618, &(0x7f0000000140)=r4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) write$P9_RWSTAT(r0, &(0x7f00000015c0)={0x7, 0x7f, 0x2}, 0x7) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3084.496080][T31389] device team0 left promiscuous mode [ 3084.516002][T31389] device team_slave_0 left promiscuous mode [ 3084.557787][T31389] device team_slave_1 left promiscuous mode 19:35:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000140)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) ioctl$SIOCX25SDTEFACILITIES(r0, 0x89eb, &(0x7f0000000180)={0x0, 0x5, 0x10001, 0x7, 0xe34a, 0x9, 0x20, "1a6f723db34ea23207b0dfb9c7067f12e4fbed29", "3948aaa0136ae8718b4e1c1ea9a186b6a9a025fb"}) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000001400)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000010020531e3d8add4f78bd093c5851b296b0f52c83d6ac7b68a4993716f8af765aa3fe5a69232e49a843bdaa003511cded8d657c31d8c0ce723ca577fcf8c7dfed34d8d5305dbab8f444ab74ccdfbc952d8c4b2925c4a13136aa1918b6e982ff21a6fe6e7f4db8a7b705aefce5344ab99ea38f4d580161888adcfb83f8198dd7bad49a0000"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:40 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3085.373566][T31426] device bond_slave_0 entered promiscuous mode 19:35:41 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x0, 0x400800) getpeername$llc(r0, &(0x7f0000000280), &(0x7f00000002c0)=0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x3ff, 0x6000) r2 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000001400)=ANY=[@ANYRES32=r2, @ANYBLOB="010000000100209f531e3d8add4f78bd09443851b296b0f52c83d6ac7968a4997d2ed483c3a44d340d4618626e2d90c4b45fbf21c55fb3828c16d2f728c7e9364704e3546354bdacb09048382cdc1e6015102cc9a691eafa03c85ecf3d6ac5e868fdffde58aba03379a293ff7523a81a1ac896494c5cba1fb8ce863d8ff3bb2f24414a785bf4758aa7671928be2637ab75fc2c915b133dcb674575f111c007ef20dc1712efad47455c0011e0fa12e879c629560cf41776a8305b48dad1"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) getsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000140), &(0x7f00000002c0)=0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x5, 0x6080) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r1, &(0x7f0000000180)="867de4bb56a9cb56cbd546bf8ec88b332e0f68aacdbffde85253", &(0x7f00000001c0)=""/56}, 0x18) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:41 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:41 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="0100005de674e1531e3d7f1a0db59dee3b2b51b296b0f5aea6d6aca30ca49dd23ed3c03d67b10875068a3eb8aeef3797959651b03c493b4f38facd829ffb4e38c9"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000ff9000/0x7000)=nil, 0x7000) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) r3 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_INFO(r3, 0xe, &(0x7f0000001400)=""/243) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) accept$inet(r0, &(0x7f0000000140)={0x2, 0x0, @loopback}, &(0x7f00000002c0)=0x10) [ 3085.624603][T31740] device team0 entered promiscuous mode 19:35:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3085.681272][T31740] device team_slave_0 entered promiscuous mode [ 3085.711864][T31740] device team_slave_1 entered promiscuous mode 19:35:41 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000200)={0x20000, 0x1, {0x0, 0x1, 0x80000000, 0x0, 0x1}}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x3, 0x2) ioctl$BLKZEROOUT(r2, 0x127f, &(0x7f0000000180)={0x8, 0x7fffffff}) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) setsockopt$RXRPC_SECURITY_KEY(r2, 0x110, 0x1, &(0x7f0000000280)='-#,ppp1/\x00', 0x9) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xffffffffffffff4f) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') uname(&(0x7f0000001a00)=""/4096) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:41 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3085.876180][T31740] 8021q: adding VLAN 0 to HW filter on device team0 [ 3085.917749][T31854] QAT: Invalid ioctl [ 3086.060267][T31740] device team0 left promiscuous mode [ 3086.098518][T31740] device team_slave_0 left promiscuous mode [ 3086.138285][T31740] device team_slave_1 left promiscuous mode [ 3086.552677][T31860] device team0 entered promiscuous mode [ 3086.588044][T31860] device team_slave_0 entered promiscuous mode [ 3086.608966][T31860] device team_slave_1 entered promiscuous mode [ 3086.649230][T31860] 8021q: adding VLAN 0 to HW filter on device team0 19:35:42 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000006200000019f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8031c48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0xfffffffff7ffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) ioctl$VT_OPENQRY(r0, 0x5600, &(0x7f0000000140)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB="170000b7df446f2aacae0a0ac3b550c1f80061c5f1cb521daffcfb328c3bc6"]) ioctl$RTC_VL_CLR(r0, 0x7014) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x105201, 0x0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) 19:35:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3086.964421][T31996] device team0 left promiscuous mode [ 3086.974126][T31996] device team_slave_0 left promiscuous mode 19:35:42 executing program 1: r0 = perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="01000000010020531e3d8addcf78bd094d5851b296b0f52683d6ac7b68a499"]) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_SIGNAL_MSI(r1, 0x4020aea5, &(0x7f0000000140)={0x4, 0x10f000, 0xfffffffffffff800, 0x4, 0x1e74200}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) ioctl$NBD_DISCONNECT(r1, 0xab08) close(r2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000001400)={0x0, @in6={{0xa, 0x4e22, 0x0, @loopback, 0x400}}, 0x7fffffff, 0x10001, 0x2, 0x8}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f00000014c0)={r4, 0xb0, &(0x7f0000001580)=[@in6={0xa, 0x4e22, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xfffffffffffffffc}, @in={0x2, 0x4e23}, @in6={0xa, 0x4e20, 0x20, @empty, 0x6}, @in6={0xa, 0x4e20, 0x80000000, @mcast2, 0x2}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in={0x2, 0x4e21, @multicast1}, @in6={0xa, 0x80000001, 0xffff, @mcast2, 0x3590}, @in={0x2, 0x4e24, @broadcast}]}, &(0x7f0000001640)=0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:42 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3087.029510][T31996] device team_slave_1 left promiscuous mode 19:35:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) ioctl$KDENABIO(r0, 0x4b36) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000010020531e3d8add4f78bd094d58432c63d051b296b0f52c83d6ac7b68a49970849d012dbdc28494cc8e81aac20c4af95fc6255ef9064da0e7eba669b7956c22c0b01ae4e0453a9ee2"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3087.850160][T32040] device team0 entered promiscuous mode [ 3087.855980][T32040] device team_slave_0 entered promiscuous mode [ 3087.868616][T32040] device team_slave_1 entered promiscuous mode [ 3087.876505][T32040] 8021q: adding VLAN 0 to HW filter on device team0 [ 3087.907132][T32231] device team0 left promiscuous mode [ 3087.938734][T32231] device team_slave_0 left promiscuous mode [ 3087.955178][T32231] device team_slave_1 left promiscuous mode [ 3088.049187][T32232] device team0 entered promiscuous mode [ 3088.061582][T32232] device team_slave_0 entered promiscuous mode [ 3088.074966][T32232] device team_slave_1 entered promiscuous mode [ 3088.090723][T32232] 8021q: adding VLAN 0 to HW filter on device team0 19:35:43 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:43 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') seccomp(0x0, 0x0, &(0x7f00000002c0)={0x1, &(0x7f0000000140)=[{0x4, 0x6, 0x8, 0x400}]}) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') mount$bpf(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='bpf\x00', 0x28, &(0x7f0000001400)={[{@mode={'mode', 0x3d, 0x3}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x1}}, {@mode={'mode', 0x3d, 0x4b}}, {@mode={'mode', 0x3d, 0x4}}], [{@seclabel='seclabel'}]}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8) 19:35:44 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x17\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0xfffffffffffffdd1}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3088.438318][T32256] device team0 left promiscuous mode 19:35:44 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x18\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3088.521606][T32256] device team_slave_0 left promiscuous mode [ 3088.561069][T32256] device team_slave_1 left promiscuous mode 19:35:44 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000001400)=ANY=[@ANYRES32=r3, @ANYBLOB="01000000010020531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499b3beb84e3cc4b0d49f680256c15b7123687400056730a29d9a017379f19610a2ed4e9588430b364d6f626ff161be190a401ce2c66704a06e4161827f6ff1cba4f4d33c51be677d65dc811926d1936950eb8dd91324446e40d9cafe1d88fdcda93d8ca77dcfffa706b544882c94c0ed4d32a28051eacc6be7412c466b16249f516bcb40925b2d5ff9d6004126b74e4f10"]) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:44 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x9a\x1d\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3089.559501][T32380] device team0 entered promiscuous mode [ 3089.565104][T32380] device team_slave_0 entered promiscuous mode [ 3089.571568][T32380] device team_slave_1 entered promiscuous mode [ 3089.579144][T32380] 8021q: adding VLAN 0 to HW filter on device team0 [ 3089.592894][T32401] device team0 left promiscuous mode [ 3089.598312][T32401] device team_slave_0 left promiscuous mode [ 3089.604793][T32401] device team_slave_1 left promiscuous mode 19:35:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000002c0)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000010020531e3d8add4f789c126d74a303d657c72851e9be20c0f52c83d6ac7b68a499a5cd46af80c68995dacd6973cebfd2949307bc"]) statfs(&(0x7f00000014c0)='./file0\x00', &(0x7f0000001680)=""/65) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x2c) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000001400)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x3, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000001a00)="7722fbebb99fe72a56ffb2a2845decde57d85e3e69c5167fd081204b1e3e5fc0e16028e84f4b56018d236bdf00160904b6f1a600c469618977126e6041b298afe9a69125fbb6a5e5d83c5133c876739b44c3fdeb7e69a938cdaf8a142117ab08c5e1c21f30ef7e9202300cc396b41172330ea3dd10d460068f8cf0455535a640d65cc87d9bbbc9947b2d78e1a09743b4753c2cf6e4a2afb269bd30955d44eb7f723d3d0427177541592c625c45a4662d6aa3b84edae04031b6a4522ef02af9837546ce718b5da6bace92edbfd3aea6b7372ee9304890cc9233a1097b8612bf9d09b048ef46b98fe3386b97352e24bee7b69d05f4022b5e91a205407494ddc3f669ede8b2ba5008883ab52a7447c108eb31b8f0d8663290a0270f96e889892077a3e1ab4e977862d6815d3fbc528d1719cf2b94c79e5967e31d5f5bb40137be584405b0b7d6f038614430ae61eb277add7e1bdbb046dfd435626e95f8439ba5395dd49365e62ef6f4d8daed9899bdcb2270e672d9c9bfe33dfedeaaeb010e2b65677ea3177fe308955442001bf814edf47d9a0c9c1c04bd1f55d79f9b491598481ca5dec991e51628a3ffced283acd973c27d748b73898766a317466c9d61872c956e4426903b63c0a0a86ff623c4664a41ddc3334e0c76cd8b61fc3eab6087badb7b9d2a0a128fea1b306fb2b812ba3d6c08574fa48b42bc77f858e567d1a50fd28308ec362f71c9a7c6a591df5f1e5552964de189bb912f4089043b1ad13b7550ce34f2234fa3255fa936e282c799ca73f241793711f9380194cbb46056636ee5264bc93b865be11cc025fd73cd6b004ffb03c25d7633fa58eee3084bfa24f1ff7a06944f2e092b34151119552f7afc12bb13fc2bfcadc676f8260cd7f87eac8398cec12420c1706069beaa020b12e2570e7f6881e06d7fa8c3a341cd91c3d79b0ec00853c2e9955ca60a6712bdb1dd0b19915c333a1ee3d82d14f0ea2fb49f55859da47af11b8996afdbdc20aed4ba3b384c54faf041f24c91eec52cc9043ca60a5a5fee17a1f2fb04439cd6ee14fcf6077282cdb9c4f9a84cc6ccf7a3922c7baa0c7e6619cc9be8da559e89cdff10b28ad2e3cd7660286efaf596bcd8e3949c2008d93e307560c12e48d7e9c08872a33aff7c82f0e2d6c76825bcf44264a27bbbe18733c7f531a499c9fad91e3e1a0bea1b4df49a18fee75d34b9db36c4d4ee37aebe1266fe6daf83632aca54e656a9f0526dc7dfce313acafd9aa376a71ddebd09aa758dd22f24b6b57999ee124ed817606c1b8c04ded0bc1ebfe1c16456e707c55559ba41b2b057258e69476f42f276bf07e827f74c04f19f4e03b8f60eb29e7f778a2a2ff6bec6c6aeadb5512586c75f67645d2f1a67419addea4b143c39df50cb38038696344dade6d91abe81d7b3a77663ac37f7c99a9f8db26f3730a1d5d10367e3e268f8761e4978d01754aaef358008ee7f6fb32e46f20011fa947ff6b1631e313601d1ddf0185a222325715f5456e6b5fd01c2bd6df437707b64ee4065098e12dafe07361adecfaf7fd1aad30b851275846d2afd7e31cc7e2e109e14d7517c6664c0c58cee1419fa8c166b3b19377aa4953ff6b4be7dfb05c93724dde275bc6b052ddb70ac80623c411a0f1f3741bc6ec6d3c3f06a15cffd5cf87423e09cf3776e219ff5b9918d4dc1b351eaca23cb8db49aa0946070898d396fbcf90a0e35f1532b61160af57d7db509cac59baa7338f0a5efe4d29da62b61d4be5489848726ce908425ec9ce9fd2e6b4ab847d1aca6822f59d88f7a789df1599098bcfa394d42939dd402b24b634c424a3331053e86c7ba950d6608782d706dda4893b0722478161e8f0b67a1d4cc35cdcb4bac5360248392bfa31ce25f5fc92fcbbf436e87a7f905055a43e24c6d726c61c332c3530b824acd03118261dbfa7bb752729edf116c477f9b08ffcb8fe19a71f7a5c8dd8fd2baba23abedfd8e283774145867f004566d3f8ba83e84786c71245965659e41cd96002da1c2c7debdd6f1a76b08b2a06a6d8dea43340d1768e29071d5360c76557ed4af94c75121afeb00a9dc89cafa641d04be2ac46fe3e25f0f66d2ee04238df65fb0ae6c259b93c6d37010374667155ba45d6c8bb97a3aeb1ec1a5118b059f4ca2e5ce5d4d531573100ea18ced5833867f67f8c2e7e0e3d04f9fa422309946853d22066b4172fee1c9aabb2f6e7d85815cbb14bdca52f63539aff70da23ee057b96df6b2b61005151d9684afdaf759d140a67c36a0e0377dd64223efa67e7193a5930db2197c0f473d642a16a5bc04f968177be29ab686eab1385a601e4fc59b8e729b1af95f0ed84bd416d7ffde60b0abd37dcd102200888ccbfb0d65f1c614db33c318b9e867add72ee878409d4904b1dffc5041988990e176bae18c1fca67ebbeb6c2621db57cbae2ee3b9bcc3be26de8c98e54688dea053723801f0af119dc81ba308da607c04284233df432fffea3df13eaad40abb3fe152d7efe1a2a05c6ba2c69e8b1ee5dccbbb51d7faca4940533731b1f01a5003d33da2e4188f9c7e7eff085fb569cddda5ed496755cfb5c9032a084204a3cc37d731ef420136c6953f962401f9e104bbfbd361ddc32c206435556f3e0215bbe5cef432a3209513160ba1e1a28fa71cf39d07c70313a1c459658de70ff5cc7427843a3b1de5f52115f718fa9520790ce7d61ab7ed8346e55a6f5146fe62f2cd923f82777fb83711f53c8b5dc2dda51cc47cf3982b55ef7cb6f1e160f852b54c8700af13c83c3e71607c3615e2c3c1440e253149af2f9674902f4bd825143b8267460aacccb6d87f50518d6c61d7ca001ff5d9e1384757831a484c03ea8fa182c1aa8eac17fc2c8002c44a1dac96b169c5b691ddf1e6987b7f00aef398051947fcfa2f2c193d42b78449afbc53dceeca5a91abda528a6a6fd8611b46068deb6ab43ad4dd9b903525a0d3e9ec51fb41110348dab645b366f11c6bf841cba598a2f0c64cec2237c7e64ec11b3a447f6946bccfd7b31826690d098587d06fa0bcac16fddf2ac0978bf59679cc31fe2fd3e90ed3472112e63e0aecd742e5afb493cca7d756f4dbcb98b27c29da8ca80ec444a70a8a7026e5454b2c6d0fe56bd6558270f6abfe00126f29c5f7cd1308c9473922d9b2096f887bc4f2d83a5fb15b326c5793db432e9b894f5bc9e0eb7e1601b04fa8a37aaab2b1d32c983e6e7e81e042cccfb6a04054b8a5365679d792710a8ef5a02202b5ec8c679df2995e37352fbf812154aaafee9d07276a7cd515736cd4f61bddd8d8eceb698610d294f2dcab9f1ddcd9adcaf1abf827f40414107709ef93066ea420bb902f53a20294c05cb681025610caa7e863b36ccf3286dcea9b757eac1814d6fc71184985f2cd2a5ecf6d29fa72cbdb97b2d77c088dd785d97e8a5204473680805d54f8c0720e36a1ec1bb040b2893259acd34a72fb44df80c94fc87b4934b807fbfce7d199089ebdcaba139b3d3d90bc086b46ce5ea27502f3491f78bdbf01a1d6c88f53dedd18c53d7ebd5d04dfef64a991cc0bd2cf802a581a42624bb8d66570d3bead00ef5e70e393ffc2201332d1d4b70fa7e6013c239ea4cfb067d1f62fc17fa717b7723a57bd819f94b3fa4ee46dece3c4087c1208793dd4c27b03da46532d36633291f950f5d42af0c89a9fa15c4bcb038d346ccceccb94f7be01f52274b63063f7fea3c1f9cb8a11a286904d3b92e3adcfbf2b71c67c37943402b13053d2c40bb2ca9be622886f9dd8314229a3f551e94246aa19292a0ec5c4c55635f79b48974e9455613422c526e1d2d6b5b60e28e2bcd40987c2ef549b07083c995ac93f42c4b6ea7833ba1605577b6c7ffe4abe031bdd77f8047779fb5e4553f9c911e0de9ebe5321bf1a36fea38e569da77d425b85dcfcecbe4c42048e27b62d6f86690ef1728413f6fff1a95727846f27fcfd8929b8ee12c59a9e8a325708882cf1140f9d51e781a61f9b7bae67f465499767743ab03b7190e05b51ae1372bab960c51e23b9c74474d0c1a005a99f5385bee7175eb0b7fb11357cce7b634d418488d409620bc64d0fa98b4b980e56add7ab1cba4b9a6fae40ff6bbc2468731cb4d9858cfc06e44b3157ad9c4ed3f14e378b4d30d0c84df8cb28943d76a11e3d933a16348e452355a846f6d8638fb6f22e2f8f4cab6f0b5f50d73933cb128e66e509a03b778d30c008c5457565aef0905cb78861d9919175eda2662e2a3e67dd8837c0a0c0363c47552e61ecb729ed16d1351a7ea62487c1bc011e7e25340ea3e2904db469cc7ee9087e9d048dc07162f0ba096443d1034d63bf7b4ade1f2f805c0fde9691b876a8dcd925dbb7d30300e373bf62b20264dadac598592ab019db2dd8eb3641538568f05e4d60218d782c4c857c97edb3e42f6eb7331d68dc1f1027445bf806ad21ab8f00f7ace1ae4512089430ca0aae2f54f1df59f32d9e2e181d7ec2c42c75f22d3fe0841fa6635cd10998ad8e091e0f6d89061a2890191a447b7dfe8fd2ca1933cce6196cd806527a795e3d9368eb0200113d3eb4da68a22bb86e93774b5f20f51aeae8ebba6b6fc9f9d8b77ffa930f073c3069798826ef547310b33b3c6587c40e4d403e5f7c581bd2ea2112f76a4f557163f426a20d5fe4a219cc59030b95cbf4812800410bf9c4a21b830a98734441d86d19940cca59cc2c3ffcde2b3e59470779c4d2b64a9f1dcb0a02ea6419b07b2046d484211bdccc12c4425e21053413e511b43bd7715db148602461034e3043b53252db87d7bae7b2b5846e0a71c7db2f60509a34fd3b371d24dd85a0e4cfe7362d8b39f3ea2662031ca3de1be23fd5649d4b085b120367bf74e30d8467f7830d8b322233292e0631ceb6d137d052844e5ab62fc22f7caff362954d308ac52a7949a494c02547d6f35d57af9f3f3811b9ac88d6b3310679d6c518df01ab0d71e486971d443d7814a37f55a376eeee305ee9cca84d796526efb05194038a6e42eca28ab6df7da9eb45f91ebf582abff7ac683c57b6690f7e04216677b80e6ae6932db4f312df62dede5256fa87d9334d071dd27f430d6aa683b4a1c67fccb436e96da7ef011e2817559bbad320a06115a982338bae0e22be013d42f872b8d6f015038fe96fe615305196249e2d822748b24236e09c094aaba1bc19d84f1dcf3b9a9aab3ea9547d9746ebbb6f4e179d9cc06bf9430d06fb19d5c28f55e080bd0a9afce665b874ed31409abb345119c0e7d14afb53bfbb557a8bae56a4852c0fc13b71682f0bd14f93e45f6a9bfa5236443b70f686430537407b3417625dce8439e1039fa664d15923f899994544f3c83d5278a64d70910e81bd410d5eb1864c774679025cc167cde094de40346e1cbe3b29060f62bd31e81349839c879a5a3ad124db2d16c06884b7dca7a8a1d6e90385c18c197f5e72996ca785c2519d96d07f7d60875a962251edc746efde3bf780b28439ac076b693a0b0186aea24d6005d2799db8e5990df2d4c7cd9646040874cb814d13d0e559aac75bd490cd0161c40fa5dbe643bae5d576db9e9a35169854c6a56f6d51793872389149d62f88fe92bde394e02a5ed9d31dde2810a06b2494a22c5f38cdd7062635a164fbbe72915d761a2426833b6aa30820101c61265cf72f319c1b9d1c47085cc8c1d50b80ba496c61c6aafa7069774a6d1f0233449d93f8c72c1bfac8784908a8eb971dbd3c76c5c894aad976aea740407412453f140a9ac20c98d48c3e07c1433a2b70bf23473784d") ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00>\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:45 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000200)={0x7, 0x4}) 19:35:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x141000, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:45 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)={r3, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) write(r0, &(0x7f0000001580)="0adc625d2f57782a87b63ddd4cf55841f880380fa4b1c5cf80d5416b1a0fadaf5164acb9e1501bd70a2b619febb68448de95beadf8ce31da86b96da3c91ebee1fee5d490016d563735471adad5d28ae0380a7d05107de9c7d67ccb5d7d35068aeaee01c3767e4c09402b5aea949b4d00eec046cbf66a41c3b94e2e15ba2f353900b5b90f1828d5377d054b9d7a9ac615e72fe7a66c5bc8dda090cc99c2b565fa1d16724abddfda5f6c98d1e025eb3a25c6c93048b04998febaea4cf9861ecf1e35", 0xc1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r2) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) r5 = geteuid() getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000001800)={{{@in=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@dev}}, &(0x7f0000001680)=0xe8) mount$bpf(0x0, &(0x7f00000003c0)='./file0\x00', &(0x7f00000014c0)='bpf\x00', 0x10010, &(0x7f0000001a00)={[{@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x101}}, {@mode={'mode', 0x3d, 0x7}}, {@mode={'mode', 0x3d, 0xffffffffffff106d}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0xfff}}, {@mode={'mode', 0x3d, 0xffffffffffff8000}}, {@mode={'mode'}}, {@mode={'mode', 0x3d, 0x9}}, {@mode={'mode', 0x3d, 0x8}}], [{@appraise='appraise'}, {@measure='measure'}, {@dont_appraise='dont_appraise'}, {@euid_gt={'euid>', r5}}, {@uid_lt={'uid<', r6}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}]}) sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001400)={0xa0, r4, 0xb00, 0x70bd28, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x50, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x50c9}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x34}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}]}, @TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_NODE={0x30, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1f}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xffffffffffff0000}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x80}, 0x20040800) [ 3090.218949][T32441] device team0 entered promiscuous mode [ 3090.253053][T32441] device team_slave_0 entered promiscuous mode [ 3090.315743][T32441] device team_slave_1 entered promiscuous mode 19:35:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:46 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f00000002c0), 0x4) [ 3090.412436][T32441] 8021q: adding VLAN 0 to HW filter on device team0 19:35:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) r1 = socket(0xd, 0x6, 0x3) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_MEDIA_NAMES(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x44000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x100, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x8001) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) [ 3090.572152][T32567] device team0 left promiscuous mode 19:35:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3090.687844][T32567] device team_slave_0 left promiscuous mode 19:35:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:35:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)={r2, 0xffffffffffffffff, 0x4080000001, "4e4a18c7afed43b2bf"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3090.828850][T32567] device team_slave_1 left promiscuous mode [ 3091.249609][T32554] device team0 entered promiscuous mode [ 3091.290438][T32554] device team_slave_0 entered promiscuous mode [ 3091.318754][T32554] device team_slave_1 entered promiscuous mode [ 3091.352753][T32554] 8021q: adding VLAN 0 to HW filter on device team0 19:35:47 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc37211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50e750bd8ebcc0c8fc339501edd007b9eb3eac0db7fb97cd00000000"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:47 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01:X\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x0, 0x2000) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, r2, 0x2, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x6de6}]}]}, 0x20}}, 0x800) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:47 executing program 1: r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x80000000000802, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x0, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000001400)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x7fff, @remote, 0x6}, {0xa, 0x4e23, 0x81, @mcast1, 0x1}, r1, 0x5}}, 0x48) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000001580)=ANY=[@ANYRES32=r4, @ANYBLOB="01000000010020531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499cfa17f3bcecb8d1ba0d710eef18ec6537362a4452fb673fdaa916bf08147f59b6cd39911ad857c238944cf7c6845b761c6d0b8e4a6610e8d1d8fa5fd1479fb0800023df55e5d5feda4073ecde613201e3d9f6d594fc0a48215287b6a9cf19e459ae35f9b5878533f3a8e0e741f25fd0a3ef475f1ded84fdba391304c1cba44e58fd2ea658d882f48fe9c3fedb008f7336e4060936e7da2d212954cad3565ae55ef085503eb280c10b7e035733786b79f991e599871b1ae6c9699844afdd561b5bfb282398d8986b13dae94a1"]) getsockname$inet6(r2, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r3) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r2, 0x4, 0x20, r2, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:47 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)`\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f00000002c0)={&(0x7f0000000140)='./file0\x00', r0}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000010020531e3d8add4f78bd094d5851b240643696b0f52d83d6ac7b68a499"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3091.969130][ T379] device team0 left promiscuous mode [ 3091.974613][ T379] device team_slave_0 left promiscuous mode [ 3092.040031][ T379] device team_slave_1 left promiscuous mode 19:35:47 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x017h\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:47 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="0100fbff000020531e2f8add4f78bd094d5851b296b0f52c83d6ac7b68a499"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:48 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*\xa8\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3092.919268][ T419] device team0 entered promiscuous mode [ 3092.926154][ T419] device team_slave_0 entered promiscuous mode [ 3092.941941][ T419] device team_slave_1 entered promiscuous mode [ 3092.962929][ T419] 8021q: adding VLAN 0 to HW filter on device team0 [ 3093.041782][ T499] device team0 left promiscuous mode [ 3093.051687][ T499] device team_slave_0 left promiscuous mode [ 3093.075915][ T499] device team_slave_1 left promiscuous mode [ 3093.379346][ T500] device team0 entered promiscuous mode [ 3093.406061][ T500] device team_slave_0 entered promiscuous mode [ 3093.435898][ T500] device team_slave_1 entered promiscuous mode [ 3093.468986][ T500] 8021q: adding VLAN 0 to HW filter on device team0 19:35:49 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0)={0x0}, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x82000, 0x0) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f0000000200)={0x84, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0x2, 'sh\x00', 0x0, 0x8, 0x72}, 0x2c) semget$private(0x0, 0x0, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000080)={'NETMAP\x00'}, &(0x7f0000000100)=0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000240)={[{0x2b, 'pids'}]}, 0x6) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x400, 0x0) r3 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r3, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c7465726800002200000000000000000000000000000000000000000019f3cb2f0e62a1b80000db0adf34f64fdcc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd0000000000"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00', 0x1}) setsockopt$inet6_buf(r1, 0x29, 0x3f, &(0x7f0000000580)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xfffffffffffffd23) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f00000002c0)={r0, 0x200}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000340)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x1002}) 19:35:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:49 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = accept4$vsock_stream(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x80000) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x2, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f00000002c0)={@in6={{0xa, 0x4e22, 0x1, @dev={0xfe, 0x80, [], 0x11}}}, 0x0, 0x5, 0x0, "b02b05cd87d6ab9d60de0a93dfa140b9047fb00e9f435890a83cf9747bd3fffbf8fbfcc180e28b09b1fdc061a41bbe83d57021fe36d6897c4cdf64c84851cb54dfaa924d04f9322b113ced59add31366"}, 0xd8) ioctl$VIDIOC_STREAMOFF(r0, 0x40045613, &(0x7f0000000240)) accept4$vsock_stream(r1, &(0x7f0000000180)={0x28, 0x0, 0xffffffff, @host}, 0x10, 0x80000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000001c0)) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r3) socket$pppoe(0x18, 0x1, 0x0) syz_genetlink_get_family_id$tipc2(0x0) r4 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000200)='/dev/cachefiles\x00', 0x420601, 0x0) fanotify_mark(r4, 0x4, 0x2000009, 0xffffffffffffffff, 0x0) 19:35:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) [ 3093.763617][ T541] device team0 left promiscuous mode 19:35:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xe4\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:49 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000380)='+posix_acl_access/usermd5sumselfposix_acl_access/\x00', 0xfffffffffffffffe) keyctl$clear(0x7, r4) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)={r3, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) open_by_handle_at(r0, &(0x7f0000001400)={0xb6, 0x8, "932c56e2b58cd1b2c0578102bf817fb024ba69dc19427650e799625414e63cd234a4b794354c2dacd69dcaad644eda282e851cac5046f2b3bc027a0e90c3cbca1ec200c0ff519964db4b8c411eed970ce9f891026fabc17ab4feef63056296ac0916addc8bf6f812953ed781777cfa2a5049715121a7d9feef644aaf3f9936994a769f46aca1dbbf81f0eae70cb45dabc7fc5a214c88d7a14d6128f1475e33988f21cb9b8b99122400e8385b83a8"}, 0x82) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r2) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3093.834510][ T541] device team_slave_0 left promiscuous mode [ 3093.909939][ T541] device team_slave_1 left promiscuous mode 19:35:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\xd8\xe8\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000001a00)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000400)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000440)) recvmsg(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0xa, 0x522000000003, 0x11) r5 = openat$cgroup(0xffffffffffffff9c, &(0x7f00000000c0)='syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM(0x2, 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000340)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) openat$cgroup_ro(r5, &(0x7f0000000380)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000000c0)="2e0000003e0081", 0x7}], 0x1}, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x60a) socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r6, 0x400454d8, &(0x7f0000000080)=0x82) recvmsg(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f00000007c0)=""/229, 0xe5}, {&(0x7f0000000100)=""/18, 0x12}, {&(0x7f0000000240)}, {&(0x7f00000008c0)=""/209, 0xd1}], 0x4, &(0x7f00000009c0)=""/4096, 0x1000}, 0x2) openat$cgroup(0xffffffffffffffff, &(0x7f00000003c0)='syz0\x00', 0x200002, 0x0) 19:35:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:49 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) sendmsg$nfc_llcp(r1, &(0x7f0000000980)={&(0x7f0000000280)={0x27, 0x0, 0x2, 0x6, 0x9, 0x1, "4b37c7a17a44a1e4ac414570f43b27aeb799bea10a75baf1ce92dab07775561d64a47dfccf6c64f734b8a70386053978932947fed94504ccacd5136b15a49c", 0x2c}, 0x60, &(0x7f00000008c0)=[{&(0x7f0000000300)="1f271c9a7623d8e8659439f71fa022cb189555ff69608c4773bf1fe2debe26b566841b5ea172a804acde4001f4388b2e51e463faa9d0712363cb8bf2f81b0097a319199f6bd096852819543cba2d17d49ad78586c0dc913fa1c6bdbe9831ebd5d85fc6de5162cccd7d7a917b5bc644f73ddf6efced2f82b268a8c683a9b77adca42ab9d86f63fddf5eca500a8dd962911ee016955ad6cb68982189fde7ee9b1785bb84c2a03cb7", 0xa7}, {&(0x7f0000000400)="33300c4d1ef8a188cbfdfcb97e130b7dfd1b29ca51f2940d0e40ee698d45f8b8b793ff945f961dafc4c0c45db4a67ec5fd59f65616c132f2cc555939493d38ff5d4d4c15ee4d391969392d830d0748c6b8eee8f9eef53d04864f3dd5a49ce6bad412692eccc55a632deb5533a4669b1e3d53800551d28d24849f454a287d5c9ad8ba9e7283e0ceb3db6b3c9593fb60ea410b1ff180f6d09f2d9826290fa24b86859e9cad6f94fc4ebdcf024413f55cb581e163db1839d8ddbe4d9a49a43a78852d00b3b1b79a00a8ee43b77a4efc08715dad9a390003e02929587aea67fd9978b91d06aa497631ed", 0xe8}, {&(0x7f0000000200)="7ba2771a8f94fdcb9f6858eeef21cae41da4339ffe0c9af44817b3ea0630ceb028", 0x21}, {&(0x7f0000000500)="38f2285e56c716cfefe46a505bad38acb62b2107616343f6c2cdf2bf52aee66b7c8c8b6437f39c77b9afb9dc20eeef3c8063be3405b516c46e285e2d094e46b03dfaa497ae2274d89107eedc3eca3e77613ff6810bbc7483e94fbe16de4fe93ecb661558d92307ed081bc7aaf73d1a218dedcf2e317dc728aa89291d421a95e154cf9162a1f88919464605b23b6fd8ff2c96171f8a0625926f231663f5c3cedc7a10113a01548ebc18e833f3db2c788a95", 0xb1}, {&(0x7f00000005c0)="86a630cf2edd28ae269117fa98680cbfd9671e1e1c078fb6607efadb497352e5256751e74423d229eb0ecac9256ab1380641ec904b8dda3eb701ca906fcc4f2be374022f7376e1a6765d45f95dbda4cbe01def12b0e582317cf56b3b43b34eefa34d05f53debd29ad30e15e0723ad5d8813e086db09a3d56bd310db1bc861a65c6", 0x81}, {&(0x7f0000000680)="8e4f0a8fa8898710c67d4badd01d3bd14831c99be490222fe46e06f1b5a7c3fca38f03a85a51d6bb757c68c0d3fe5082922a3e28a42447a2f65e65a9b87041b7b1c9df245e9dbce01fe6e32645f3afb9f500e262668052943ea11ba751ee31a3827f7489bf43b79fb81a7e110d80442919bf60ec0892a988b08d794006", 0x7d}, {&(0x7f0000000700)="e9043e669842c897c7e92ea6d358345553ce2372d7a3edb2d352067e42ba35d1fa8843254a5bdee41c549244661b37f114dd4afb388e59514fc3065ea89b3e3b4d1b901f51ad5d801250302a431d4de0eec1102a4ab1d6cb275e7156837a1e9800f49cfc7f78fedd99f14d87efa62e2e1f9666bc01d0a78e9990417f22f86ff5dd1dbcb8f8344c9c45ba52b9ce1eb7029e58332733db28851c607293c48307410217e1f189a5415b220dcc5cb8cc76b2e10ddf5f5593fe8de69684ca2416f5125084ea91d68a8fc42f81c29d9d54e7fa666ba600134dda3c44dd1be9dc5bb81ee1542eecb0ad31908ee238cac9c6c6c3aa71", 0xf2}, {&(0x7f0000000800)="febb19dfae9c8acd82032d79d7d63e3bf2d175efc5e553640db4b80eb0ae35a4b263558497175f239a81dfde7deb668c6c85418264b5a877ccd37b17ff3a7f94225b0b7b34741d4a8cada7142b4040bf076ad361", 0x54}, {&(0x7f0000000880)="b337585623800e6b", 0x8}], 0x9, 0x0, 0x0, 0x40000}, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="010008000100"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) msgget$private(0x0, 0x268) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf4\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf5\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) write(r0, &(0x7f0000000140)="220000002000070700be00e2081007010a00001e00003c0000a0b6b819fb04040500", 0x22) 19:35:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="0100ffff000020531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) sysfs$2(0x2, 0x20, &(0x7f0000000380)=""/84) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000140)='vegas\x00', 0x6) 19:35:51 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:51 executing program 1: prctl$PR_GET_TIMERSLACK(0x1e) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f00000002c0)={0x0, 0x816}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f00000003c0)={r1, 0xe5, 0x115, 0x3f, 0x78cb, 0x2}, 0x14) r2 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RSTATFS(r2, &(0x7f0000001640)={0x43, 0x9, 0x2, {0x0, 0x7fffffff, 0x7, 0x8, 0x8000, 0x3, 0x973c, 0x20, 0x6}}, 0x43) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000001600)={0x200, 0x17, 0x200, 0x5, "ad29252dbe700db24c05539f0c4b08dcfa70dbf44369e83f1175cc47d9ee5158"}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000001400)=ANY=[@ANYRES32=r4, @ANYBLOB="ff0100a8506b84ecb5865cdd4f78bd094d5851b296b0f52c83d6ac7b68a499150627b00588d99b1fcfa196e3f285095e12148f6b256f3266639a99aaef26f6be1637a7bded0c859abc7218f2701f90f79148c6e0e0f9539b4db71ab38b03829a2fb503d900ebe2bde9ce6fee543f239bd3e23ccb9c556b0000021bd1240d17ac628c13a7b3ded5338765d6ac2dd3c2ff7fb6a548086b012374bde409eb8c2f79fd28e89042"]) getsockname$inet6(r2, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r3) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000001580)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000014c0)={0xffffffffffffffff}, 0xb58279b8bd83ffa4, 0x7}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000015c0)={0x13, 0x10, 0xfa00, {&(0x7f0000001a00), r5, 0x3}}, 0x18) fanotify_mark(r2, 0x4, 0x20, r2, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) write$P9_RXATTRWALK(r2, &(0x7f00000000c0)={0xf, 0x1f, 0x2}, 0xf) 19:35:51 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3095.810203][ T705] device team0 entered promiscuous mode [ 3095.816075][ T705] device team_slave_0 entered promiscuous mode [ 3095.830565][ T705] device team_slave_1 entered promiscuous mode [ 3095.844315][ T705] 8021q: adding VLAN 0 to HW filter on device team0 [ 3095.856897][ T823] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.4'. [ 3095.884812][ T828] device team0 left promiscuous mode [ 3095.898739][ T828] device team_slave_0 left promiscuous mode [ 3095.904798][ T828] device team_slave_1 left promiscuous mode 19:35:51 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66836c74650000000000000000000000006200000019f3cf2f0e62a1b86dbbdb0adf34f650cbc393f618260000f17f27d0f8036f48c716a0fc11350024984fef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd000000"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:51 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x101000, 0x0) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:51 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:51 executing program 4: 19:35:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYBLOB="00000000003c32e3f58a1a3c1ceac0822c78462b4ae8cce51fbfddea8ad82cd9e7ce85d785354e202ab4b45f1d793ac9267f427e1f6b80ff1d2f815e207bcfa14ae05e933a1b29396db1eba83d5e8f1a5c1618c5c0963501a924131be5c1bd28c526fb195fbb2f4f70127a478d4f406039089e9cd0101a22ea9c9bd8579beb57ffd3a8517ee81e3c0ea5da495b5975aafbe71e1354d4a9b4a45605a3fad8b56cba590f0837079815ac220050f8cdce93aad1f10ea5a93db4a2b83d6fab887e9ac3e702396503646b2c2d71f05277e7a4c8699a15"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r1 = getpid() process_vm_writev(r1, &(0x7f00000000c0)=[{&(0x7f00000002c0)=""/212, 0xd4}, {&(0x7f00000003c0)=""/246, 0xf6}, {&(0x7f00000004c0)=""/180, 0xb4}, {&(0x7f0000000140)=""/79, 0x4f}], 0x4, &(0x7f00000019c0)=[{&(0x7f0000000580)=""/152, 0x98}, {&(0x7f0000000640)=""/61, 0x3d}, {&(0x7f0000000680)=""/4096, 0x1000}, {&(0x7f0000001680)=""/55, 0x37}, {&(0x7f00000016c0)=""/63, 0x3f}, {&(0x7f0000001700)=""/225, 0xe1}, {&(0x7f0000001800)=""/16, 0x10}, {&(0x7f0000001840)=""/16, 0x10}, {&(0x7f0000001880)=""/93, 0x5d}, {&(0x7f0000001900)=""/129, 0x81}], 0xa, 0x0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:51 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:51 executing program 4: 19:35:52 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)={r3, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r2) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:52 executing program 4: [ 3096.321753][ T877] device team0 entered promiscuous mode [ 3096.354055][ T877] device team_slave_0 entered promiscuous mode 19:35:52 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe4\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.redirect\x00', &(0x7f00000001c0)='./file0\x00', 0x8, 0x1) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) [ 3096.421105][ T877] device team_slave_1 entered promiscuous mode [ 3096.550185][ T877] 8021q: adding VLAN 0 to HW filter on device team0 [ 3096.696895][ T1102] device team0 left promiscuous mode [ 3096.709114][ T1102] device team_slave_0 left promiscuous mode [ 3096.761718][ T1102] device team_slave_1 left promiscuous mode [ 3097.294503][ T1111] device team0 entered promiscuous mode [ 3097.300298][ T1111] device team_slave_0 entered promiscuous mode [ 3097.313416][ T1111] device team_slave_1 entered promiscuous mode [ 3097.340950][ T1111] 8021q: adding VLAN 0 to HW filter on device team0 19:35:53 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_LINK_STATS(r1, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10020}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x30, r2, 0x0, 0x70bd2a, 0x25dfdbfb, {{}, 0x0, 0xb, 0x0, {0x14, 0x14, 'broadcast-link\x00'}}, ["", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x48840) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:53 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="01ffffffff00000000000000000000006412"]) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r2) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000001400)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000002c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r0, &(0x7f0000001440)={0x4, 0x8, 0xfa00, {r4, 0x6}}, 0x10) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r2, 0x800443d2, &(0x7f0000000140)={0x6, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}]}) 19:35:53 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf4\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:53 executing program 4: 19:35:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = creat(&(0x7f0000001380)='./file0\x00', 0x80) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f00000013c0)={@broadcast, @local, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000004c0)=ANY=[@ANYRES32, @ANYBLOB="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"]) getsockname$tipc(r1, &(0x7f00000000c0), &(0x7f0000000180)=0x10) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000140)={r1, 0x1, 0x1000000, 0x8000}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:53 executing program 4: 19:35:53 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf5\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3097.626209][ T1139] device team0 left promiscuous mode [ 3097.655793][ T1139] device team_slave_0 left promiscuous mode 19:35:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000140)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:53 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000180)=""/104, 0xfffffffffffffe9a, 0x0) [ 3097.695747][ T1139] device team_slave_1 left promiscuous mode 19:35:53 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:53 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000140)={0x100000000000, 0x0, {0x9, 0x33, 0x6, 0x12, 0x6, 0x3ff, 0x1, 0xc7, 0xffffffffffffffff}}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3098.551053][ T1148] device team0 entered promiscuous mode [ 3098.556746][ T1148] device team_slave_0 entered promiscuous mode [ 3098.583049][ T1148] device team_slave_1 entered promiscuous mode [ 3098.597511][ T1148] 8021q: adding VLAN 0 to HW filter on device team0 [ 3098.633240][ T1274] device team0 left promiscuous mode [ 3098.672433][ T1274] device team_slave_0 left promiscuous mode [ 3098.703736][ T1274] device team_slave_1 left promiscuous mode [ 3098.912420][ T1275] device team0 entered promiscuous mode [ 3098.944304][ T1275] device team_slave_0 entered promiscuous mode [ 3098.968710][ T1275] device team_slave_1 entered promiscuous mode [ 3098.979811][ T1275] 8021q: adding VLAN 0 to HW filter on device team0 19:35:54 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) modify_ldt$read(0x0, &(0x7f0000000280)=""/202, 0xca) syz_execute_func(&(0x7f0000000200)="c462ad9b3166367df2c483c568129466430f156ea245c26556460f0f84ec970000009ac4a11059f20f8d000000006466420f381011c441fa7ef6") ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:54 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:54 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x20000000000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB="010000000100c7ea02e2dcdfc596658ca2e9207dd2a498dfd5beca5c5d7f22a32680b6962677a8f4cddba9d512be8f3f9e1bb3fcce9bde1a9d6c861c790ffa6c90b0fbe63d2dddd228cfd100b47eb421aa2697"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000240)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:55 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x0f\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000010020531e3d8add4f78bd09ab581030ccfda42024482b27bbdd6cbf4d5851b296b0f52c83d6ac7b68a499"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3099.344140][ T1313] device team0 left promiscuous mode [ 3099.400549][ T1313] device team_slave_0 left promiscuous mode 19:35:55 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x80\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:55 executing program 4: [ 3099.469766][ T1313] device team_slave_1 left promiscuous mode 19:35:55 executing program 4: 19:35:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) r3 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x400000, 0x0) getsockopt$inet6_tcp_int(r3, 0x6, 0x11, &(0x7f00000002c0), &(0x7f0000000380)=0x4) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:55 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:56 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$ax25(0x3, 0x0, 0xc4) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:56 executing program 4: 19:35:56 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x40200, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="010000000000000000068add4f78bd094d5851b296b0f52c83d6ac7b68a499ea65326c291d789815faa8b1ff2c8a022e2d9a0c96dd27c2ebc8ea0fc052195a9141"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) bind$netlink(r0, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfc, 0xa0000002}, 0xc) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="011d00000000"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:56 executing program 4: 19:35:56 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000140)={0x1000, 0x7fff, 0x4, 0x9, 0x1, 0x4, 0xb29b, 0x2de, 0x0}, &(0x7f00000002c0)=0x20) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000380)={r1, 0x4, 0xffff}, 0x8) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r3, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r4 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) getsockopt$sock_int(r4, 0x1, 0x20, &(0x7f00000003c0), &(0x7f0000001400)=0x4) close(r2) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:56 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff\xff\a\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:56 executing program 4: [ 3101.044130][ T1520] device team0 entered promiscuous mode [ 3101.063298][ T1520] device team_slave_0 entered promiscuous mode [ 3101.126705][ T1520] device team_slave_1 entered promiscuous mode [ 3101.160465][ T1520] 8021q: adding VLAN 0 to HW filter on device team0 19:35:56 executing program 4: 19:35:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x10000, 0x0) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f0000000180)={0xb, @capture={0x1000, 0x1, {0x3, 0x9}, 0x40, 0xfffffffffffffff8}}) [ 3101.287248][ T1609] device team0 left promiscuous mode [ 3101.319132][ T1609] device team_slave_0 left promiscuous mode [ 3101.393459][ T1609] device team_slave_1 left promiscuous mode [ 3101.749240][ T1610] device team0 entered promiscuous mode [ 3101.783955][ T1610] device team_slave_0 entered promiscuous mode [ 3101.818722][ T1610] device team_slave_1 entered promiscuous mode [ 3101.869842][ T1610] 8021q: adding VLAN 0 to HW filter on device team0 19:35:57 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:57 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0xffffffffffffff1b) r3 = socket$nl_route(0x10, 0x3, 0x0) fsetxattr$security_smack_transmute(r3, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f00000002c0)='TRUE', 0x4, 0x3) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)={r3, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) write$P9_RLOPEN(r1, &(0x7f0000000380)={0x18, 0xd, 0x1, {{0x0, 0x4, 0x6}}}, 0x18) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:57 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x41009432, &(0x7f0000000280)="3d8e2633a2509cedf8df241ce890ffa972e3ff4ad6d613d6ad221744d80c99bf29537bb13bec88ab495b5b44fce4b418afced04d95acc380c7d7e5d37a765cf9ec15d8ece04a0470a98315fa0d01083b92ff782261c36a46d3dc108181069d03b6a71db270ce7d982e2ab2207a012d234f6f0e592f18319c79b8be2e0023cbf28dbbe73fa478320d6f4a03b7a0c61a1293867e30541a424ad705f247c34996f10cf3aba02bd127eee85aad9cd660585199b80af136cb0eae8fff186f8fa61c68d5cd5e6c19c7573fddf87d65a1c2c2841204a1bd2f9f3db3533ba4de7fe0462e0612851b39f209978b59116ae597f3bb7c3f90e5a9bd354815b360eb97e376e2") ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:57 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x200000, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000040)='security.ima\x00', &(0x7f0000000080)=@v1={0x2, "77800c9837d20f242b6ba42680a8"}, 0xf, 0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x400000, 0x0) ioctl$PERF_EVENT_IOC_ID(0xffffffffffffffff, 0x80082407, 0x0) time(&(0x7f0000000180)) request_key(&(0x7f00000001c0)='.request_key_auth\x00', 0x0, &(0x7f0000000240)='$eth0\x87)+\x00', 0xfffffffffffffffe) lsetxattr(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=@random={'user.', 'nodevmime_type\x00'}, &(0x7f0000000300)='keyringem1posix_acl_access\\\x00', 0x1c, 0x0) ioctl$sock_SIOCSPGRP(r1, 0x8902, &(0x7f0000000340)) ioctl$KDSETKEYCODE(r1, 0x4b4d, &(0x7f0000000380)={0x0, 0x7}) waitid(0x1, 0x0, 0x0, 0x0, &(0x7f0000000440)) fsetxattr(0xffffffffffffffff, &(0x7f0000000500)=@known='trusted.overlay.redirect\x00', 0x0, 0x0, 0x2) ioctl$VT_GETMODE(r1, 0x5601, 0x0) io_setup(0x10001, &(0x7f00000005c0)) lsetxattr$trusted_overlay_nlink(&(0x7f0000000600)='./file0\x00', &(0x7f0000000640)='trusted.overlay.nlink\x00', 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000006c0)) write$P9_RREADLINK(r1, &(0x7f0000000940)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) fstatfs(0xffffffffffffffff, 0x0) openat$zero(0xffffffffffffff9c, 0x0, 0x400, 0x0) name_to_handle_at(0xffffffffffffffff, 0x0, &(0x7f0000000ac0)={0x65, 0xffffffff80000001, "5eddc903004c857839a2213d2c43c1c19d437be2d0c27cdee93eb451030b668bb207a2c1ed5931151625534257eb445c56ead5248cbd002e549f777c52392b5c8878db5c9fa89fe305fac661306771ca89c5d07da3a1bc0c7810d6c320"}, 0x0, 0x0) 19:35:57 executing program 4: 19:35:57 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:57 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r2, 0x660c) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000140)) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3102.180807][ T1746] device team0 left promiscuous mode [ 3102.242687][ T1746] device team_slave_0 left promiscuous mode [ 3102.271211][ T1746] device team_slave_1 left promiscuous mode 19:35:58 executing program 4: 19:35:58 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000380)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000010020531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499a39134a6988abae3b86480215192b7fc86823a4d40f1c448b645d2ba3a8a601578ea135357afed5b08656afb4b5040d5afff4e5bac730689fa25050780969f2cd136c0203e"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x1) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:58 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000680)=ANY=[@ANYRES32, @ANYBLOB="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"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) r2 = syz_open_dev$swradio(&(0x7f0000000140)='/dev/swradio#\x00', 0x1, 0x2) ioctl$LOOP_SET_STATUS(r2, 0x4c02, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x9777, 0x2, 0x18, 0x10, "268b5a86d1a0be20763e05d02872071bafe827f8daaf7696909425e63038f2d2767ae434e61a382a8b8c761cf2697f6f4c700d6ad690d90b4bbb3c5f0a444a2a", "99d2e8be32b13bc08f6488e59b99b8923c681bcf04b8e6762e48274510e655c8", [0x1f, 0x1000]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) fanotify_mark(r2, 0x86, 0x1, r2, &(0x7f00000000c0)='./file0\x00') syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 19:35:58 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x400000011, 0x0, &(0x7f0000000100)) 19:35:58 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$VIDIOC_DBG_G_REGISTER(r1, 0xc0385650, &(0x7f0000000040)={{0x4, @addr=0x3ff}, 0x8, 0x1f, 0x4}) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000140)) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="ac58205f0100fc000918"]) getsockname$inet6(r1, &(0x7f0000001440), &(0x7f00000003c0)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r2) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3103.072822][ T1749] device team0 entered promiscuous mode [ 3103.084490][ T1749] device team_slave_0 entered promiscuous mode [ 3103.099106][ T1749] device team_slave_1 entered promiscuous mode [ 3103.108717][ T1749] 8021q: adding VLAN 0 to HW filter on device team0 19:35:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3103.192389][ T1776] device team0 left promiscuous mode [ 3103.232005][ T1776] device team_slave_0 left promiscuous mode [ 3103.254937][ T1776] device team_slave_1 left promiscuous mode 19:35:59 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0)={0x0}, 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000634a17b200000000006200000019f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0d"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x1f, &(0x7f0000000280)={r0, @in6={{0xa, 0x4e21, 0xfffffffffffffff8, @mcast1, 0x93}}, 0x5, 0x400}, &(0x7f0000000200)=0x90) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:35:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:59 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, 0x0, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x400000011, 0x0, &(0x7f0000000100)) 19:35:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x10135) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') r3 = getpgid(0x0) capget(&(0x7f0000000140)={0x20071026, r3}, &(0x7f00000002c0)={0x7, 0x80000000, 0x4, 0x5, 0x7, 0x7fff}) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SVE_SET_VL(0x32, 0x30a3f) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYBLOB="040000004f94799c6075b9470249aa0100e923cfc29514869f12d68bc0bfae33914a31a52a17cde05a20d18ecda99f55b2fcdabdf93b799f78ee754fb68c1cce4d82bce719222b43acea078188b50ea29777ab3d8f3fe9caa9ce9ab50d0ea70db9863e62b4cc86bcbe240a39e05ab4cd270a5381ecb61463c74651c0b2d93182a438575e19d71577dc0a6d291d9794cb8ad15964edde6df40165daf29f8b14bddddff7b90d20c7db1e1e6629534a0368b5eb4b1e05c35f23d32889f062aad4338be62d3b"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) pipe(&(0x7f0000003600)={0xffffffffffffffff}) getpeername$packet(0xffffffffffffff9c, &(0x7f0000003640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003680)=0x14) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f00000036c0)={@loopback, @local, @rand_addr="38b20e6ffabd1a30735c4f6a27e510bc", 0x4, 0x2e5, 0x401, 0x100, 0x8, 0x0, r2}) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:35:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\xff\xff\xff\xf0\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f00000002c0)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$TUNGETIFF(r2, 0x800454d2, &(0x7f0000000140)) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:59 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = request_key(&(0x7f0000000140)='blacklist\x00', &(0x7f00000002c0)={'syz', 0x0}, &(0x7f0000000380)='+posix_acl_access/usermd5sumselfposix_acl_access/\x00', 0xfffffffffffffffe) keyctl$clear(0x7, r4) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)={r3, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) open_by_handle_at(r0, &(0x7f0000001400)={0xb6, 0x8, "932c56e2b58cd1b2c0578102bf817fb024ba69dc19427650e799625414e63cd234a4b794354c2dacd69dcaad644eda282e851cac5046f2b3bc027a0e90c3cbca1ec200c0ff519964db4b8c411eed970ce9f891026fabc17ab4feef63056296ac0916addc8bf6f812953ed781777cfa2a5049715121a7d9feef644aaf3f9936994a769f46aca1dbbf81f0eae70cb45dabc7fc5a214c88d7a14d6128f1475e33988f21cb9b8b99122400e8385b83a8"}, 0x82) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r2) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r1, 0x4, 0x20, r1, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3103.845653][ T1930] device team0 entered promiscuous mode [ 3103.915171][ T1930] device team_slave_0 entered promiscuous mode [ 3103.962938][ T1930] device team_slave_1 entered promiscuous mode 19:35:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000011320531e3d8add4f78bd094d3051b296b0f52c83d6ac7b68a499501570444bbab990b404823a2a5377144db56765a419aa0863"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:35:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:35:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3104.142888][ T1930] 8021q: adding VLAN 0 to HW filter on device team0 [ 3104.375542][ T2053] device team0 left promiscuous mode [ 3104.403420][ T2053] device team_slave_0 left promiscuous mode [ 3104.427216][ T2053] device team_slave_1 left promiscuous mode [ 3104.711009][ T2057] device team0 entered promiscuous mode [ 3104.729421][ T2057] device team_slave_0 entered promiscuous mode [ 3104.738563][ T2057] device team_slave_1 entered promiscuous mode [ 3104.746326][ T2057] 8021q: adding VLAN 0 to HW filter on device team0 19:36:00 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x8, 0x80002) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f00000002c0)=0x5, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000006200000019f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee0400c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000300)=0x401, 0x4) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000340)='/dev/udmabuf\x00', 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:36:00 executing program 4: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000200)={0x7, 0x4}) 19:36:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x111000, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r1, &(0x7f0000000180)={0x1, 0x9}, 0x2) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000001440)='/dev/ptmx\x00', 0x4, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3104.964386][ T2081] device team0 left promiscuous mode [ 3104.973944][ T2081] device team_slave_0 left promiscuous mode 19:36:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="01e5ffff00002053826ddf4a5e10393c03d6ac7b68a499"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) ioctl$KDGKBMETA(r1, 0x4b62, 0xfffffffffffffffd) [ 3105.013565][ T2081] device team_slave_1 left promiscuous mode [ 3105.154039][ T2084] device team0 left promiscuous mode [ 3105.171653][ T2084] device team_slave_0 left promiscuous mode 19:36:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0xfffefffffffffffe, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="0100000001002009000000dd4f78bd094d5851b296b0f52c83d6ac0100000065e28f6c6498f82d3efb2af6dc35bac6cbfa6220ab378216a88979"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) fstat(r0, &(0x7f0000000380)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3105.226777][ T2084] device team_slave_1 left promiscuous mode 19:36:01 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:01 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000380), &(0x7f00000000c0)=0x68) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000002c0)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000010020585e3c3cf2c7f051b296b0f52c83d6ac7b68a49900000000000000000000"]) ioctl$RTC_PIE_ON(r0, 0x7005) ioctl$VIDIOC_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000001400)={0x0, 0x0, [], @raw_data=[0x2, 0x3ff, 0x0, 0x80000001, 0x8001, 0x5, 0x3, 0x7, 0xff, 0xf693, 0x4, 0x7, 0x0, 0x8, 0x0, 0xcbc, 0xf59, 0x9, 0x2, 0x9, 0x56, 0x1000, 0x2, 0x0, 0x7fffffff, 0x4, 0x100000001, 0x80000001, 0x5, 0xd8c, 0xfffffffffffffff8, 0x6]}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r0, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001580)={r0, 0x28, &(0x7f00000014c0)}, 0x10) ioctl$PPPIOCSMRRU(r0, 0x4004743b, &(0x7f0000000140)=0x8) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3105.997802][ T2136] device team0 entered promiscuous mode [ 3106.007143][ T2136] device team_slave_0 entered promiscuous mode [ 3106.020436][ T2136] device team_slave_1 entered promiscuous mode [ 3106.035701][ T2136] 8021q: adding VLAN 0 to HW filter on device team0 [ 3106.049863][ T2090] device team0 entered promiscuous mode [ 3106.057917][ T2090] device team_slave_0 entered promiscuous mode [ 3106.074124][ T2090] device team_slave_1 entered promiscuous mode [ 3106.086591][ T2090] 8021q: adding VLAN 0 to HW filter on device team0 [ 3106.175948][ T2218] device team0 left promiscuous mode [ 3106.188573][ T2218] device team_slave_0 left promiscuous mode [ 3106.194638][ T2218] device team_slave_1 left promiscuous mode [ 3106.413727][ T2219] device team0 entered promiscuous mode [ 3106.434417][ T2219] device team_slave_0 entered promiscuous mode [ 3106.454191][ T2219] device team_slave_1 entered promiscuous mode [ 3106.480109][ T2219] 8021q: adding VLAN 0 to HW filter on device team0 19:36:02 executing program 5: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000280)={0x5, &(0x7f0000000200)=[{}, {}, {}, {}, {}]}) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:36:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x8801, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="015851b296b08a1d83d6ac7b68a4990000f4ea3d62cd513187000000000000000000000000"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r3 = getpgrp(0xffffffffffffffff) kcmp$KCMP_EPOLL_TFD(r3, 0x0, 0x7, r2, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:02 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x3, 0x100) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000180)=ANY=[@ANYBLOB="060000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b77dd6f400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) syz_emit_ethernet(0x2, &(0x7f0000000080)=ANY=[@ANYRESHEX, @ANYRESDEC], 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000080)={0x0, 'veth0_to_bridge\x00'}, 0x3c) ioctl(r3, 0x800000000008982, &(0x7f0000000080)) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="010900000000"]) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCLINUX6(r2, 0x541c, &(0x7f0000000280)={0x6, 0x4}) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r2) fcntl$setflags(r0, 0x2, 0x1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:02 executing program 4: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) ioctl$IOC_PR_RELEASE(r0, 0x401070ca, &(0x7f0000000200)={0x7, 0x4}) 19:36:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r0, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3106.647339][ T2246] device team0 left promiscuous mode [ 3106.667362][ T2246] device team_slave_0 left promiscuous mode [ 3106.688236][ T2246] device team_slave_1 left promiscuous mode 19:36:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) ioctl$PPPIOCGFLAGS(r0, 0x8004745a, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3106.762304][ T2250] device team0 left promiscuous mode 19:36:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:02 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="01736c3bfadba6563d60c9d0000000010020531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3106.789163][ T2250] device team_slave_0 left promiscuous mode [ 3106.809736][ T2250] device team_slave_1 left promiscuous mode [ 3107.197168][ T2252] device team0 entered promiscuous mode [ 3107.208913][ T2252] device team_slave_0 entered promiscuous mode [ 3107.227926][ T2252] device team_slave_1 entered promiscuous mode [ 3107.266204][ T2252] 8021q: adding VLAN 0 to HW filter on device team0 [ 3107.290382][ T2254] device team0 entered promiscuous mode [ 3107.296002][ T2254] device team_slave_0 entered promiscuous mode [ 3107.319550][ T2254] device team_slave_1 entered promiscuous mode [ 3107.326899][ T2254] 8021q: adding VLAN 0 to HW filter on device team0 [ 3107.365402][ T2250] device team0 left promiscuous mode [ 3107.371141][ T2250] device team_slave_0 left promiscuous mode [ 3107.380866][ T2250] device team_slave_1 left promiscuous mode [ 3107.479188][ T2254] device team0 entered promiscuous mode [ 3107.484791][ T2254] device team_slave_0 entered promiscuous mode [ 3107.518627][ T2254] device team_slave_1 entered promiscuous mode [ 3107.526410][ T2254] 8021q: adding VLAN 0 to HW filter on device team0 19:36:03 executing program 5: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:03 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f00000003c0), &(0x7f0000001400)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:03 executing program 4: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000280)='/dev/bus/usb/00#/00#\x00', 0x8, 0x80002) setsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f00000002c0)=0x5, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000140)=ANY=[@ANYBLOB="66696c74657200000000000000000000000000000000000000000000000000006200000019f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee0400c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, &(0x7f0000000300)=0x401, 0x4) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000340)='/dev/udmabuf\x00', 0x2) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:36:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x100, 0x0) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000180)={0x43c8, 0x7fff, 0x1}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:03 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3107.769366][ T2392] device team0 left promiscuous mode [ 3107.775115][ T2392] device team_slave_0 left promiscuous mode 19:36:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3107.834717][ T2392] device team_slave_1 left promiscuous mode 19:36:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) prctl$PR_GET_FP_MODE(0x2e) getsockname$inet6(r0, &(0x7f00000002c0), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x1) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x0, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000180)='/dev/cachefiles\x00', 0x4000, 0x0) setsockopt$inet_udp_int(r2, 0x11, 0xb, &(0x7f0000000340)=0xa488, 0x4) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm_plock\x00', 0x400201, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f00000003c0)={0x3, &(0x7f0000000380)=[{0x1f, 0x6}, {0xaf, 0x7fffffff}, {0x3f, 0xd5e9}]}) getsockname$inet6(r3, &(0x7f0000000040), &(0x7f00000001c0)=0x12) bind$rose(r2, &(0x7f0000000100)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0x3, [@bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x40) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0x16) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) r4 = getpid() sendmsg$nl_generic(r1, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, 0x26, 0x204, 0x70bd25, 0x25dfdbff, {0x15}, [@typed={0x8, 0x8e, @pid=r4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x44) fcntl$setsig(r3, 0xa, 0x3f) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:03 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3107.999246][ T2450] device team0 entered promiscuous mode [ 3108.066378][ T2450] device team_slave_0 entered promiscuous mode [ 3108.163905][ T2450] device team_slave_1 entered promiscuous mode [ 3108.204267][ T2450] 8021q: adding VLAN 0 to HW filter on device team0 19:36:04 executing program 5: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readlinkat(r0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/207, 0xcf) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:36:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="01f125f22ee0a5974c58000000010020531e3d8add4f78bd094d5851b296b0"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$VIDIOC_DBG_G_CHIP_INFO(r0, 0xc0c85666, &(0x7f0000001400)={{0x1, @addr=0x4}, "88aa8877aef01cb928d747d2af176d8a3baa2cc385b5db7e065008cf06fdd707", 0x1}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$KVM_SET_XCRS(r0, 0x4188aea7, &(0x7f0000000380)={0x4, 0x5, [{0x0, 0x0, 0x2d3}, {0x0, 0x0, 0x1}, {0x200, 0x0, 0x4000000000000000}, {0xffffffff, 0x0, 0x3}]}) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000140)={{0x2, 0x9}, 0x10}, 0x10) 19:36:04 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:04 executing program 4: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f00000002c0), &(0x7f0000000300)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) syz_open_dev$video4linux(&(0x7f0000000200)='/dev/v4l-subdev#\x00', 0xe3b, 0x8101) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:36:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="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"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_GPARAMS(r0, 0x40485404, &(0x7f0000000380)={{0xffffffffffffffff, 0x3, 0x9, 0x1, 0x400}, 0xff, 0x15}) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3108.522999][ T2686] device team0 left promiscuous mode [ 3108.547687][ T2686] device team_slave_0 left promiscuous mode 19:36:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3108.577590][ T2686] device team_slave_1 left promiscuous mode 19:36:04 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f0000001400)={&(0x7f0000000140), 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x24, r3, 0xf00, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x8}}, ["", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x841}, 0x4000) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000001480)='TIPCv2\x00') sendmsg$TIPC_NL_MON_GET(r0, &(0x7f00000016c0)={&(0x7f0000001440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000014c0)={&(0x7f0000001580)={0x13c, r4, 0x200, 0x70bd2c, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x104, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x713}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xdcaf}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x400}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb4e}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x619}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x4}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xdce11d6}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x8080}, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:04 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x17\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:04 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000180)='/dev/full\x00', 0x101000, 0x0) ioctl$VIDIOC_ENCODER_CMD(r2, 0xc028564d, &(0x7f00000001c0)={0x2, 0x0, [0x2, 0xd24, 0x3, 0x100000001, 0x1, 0x5, 0x20, 0x5]}) connect$vsock_stream(r2, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x480080, 0x0) ioctl$UI_SET_ABSBIT(r3, 0x40045567, 0x1) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) [ 3108.742798][ T2678] device team0 left promiscuous mode [ 3108.775432][ T2678] device team_slave_0 left promiscuous mode [ 3108.813641][ T2678] device team_slave_1 left promiscuous mode [ 3109.329562][ T2788] device team0 entered promiscuous mode [ 3109.335285][ T2788] device team_slave_0 entered promiscuous mode [ 3109.348249][ T2788] device team_slave_1 entered promiscuous mode [ 3109.358378][ T2788] 8021q: adding VLAN 0 to HW filter on device team0 [ 3109.372041][ T2808] device team0 entered promiscuous mode 19:36:05 executing program 5: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) readlinkat(r0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/207, 0xcf) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x400000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r2 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r2, 0x0, 0x61, &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r1, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 19:36:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) ioctl$TIOCGSID(r1, 0x5429, &(0x7f00000002c0)=0x0) write$cgroup_pid(r0, &(0x7f00000014c0)=r3, 0x12) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000001400)={0x0, @bt={0x1f, 0x0, 0x1, 0x3, 0x6, 0x5, 0xffffffffffffff01, 0x2ef0, 0x3, 0x5, 0x8, 0x3, 0x400, 0x8, 0x4, 0x20}}) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x21, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000380)={0x1, 0x0, 0x4, 0xf0000, {}, {0x2, 0xc, 0x4, 0x1, 0x2, 0x1, '^JE;'}, 0x8ae, 0x5, @planes=&(0x7f0000000140)={0x40, 0x0, @fd=0xffffffffffffff9c, 0x7}, 0x4}) [ 3109.377640][ T2808] device team_slave_0 entered promiscuous mode [ 3109.385447][ T2808] device team_slave_1 entered promiscuous mode [ 3109.400283][ T2808] 8021q: adding VLAN 0 to HW filter on device team0 19:36:05 executing program 4: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000200)={0x2e, @multicast1, 0x4e20, 0x0, 'dh\x00', 0x22, 0x3, 0x3f}, 0x2c) 19:36:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x18\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$udambuf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/udmabuf\x00', 0x2) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="01000000010032b31b15be160cf7b1fe59957b801df127cc095503f7518afd594cacd35882edf1e82e41ef14baa8952ebf6605e0859bf6db8ec709b1ab"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x139000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000001400)=ANY=[@ANYRES32=r2, @ANYBLOB="01000000010020531e3d8add4f38bd094d5851b294b0f52c83baad7b68a49907f0c0f104251b27070c4a8a1335364f454adf29c0a2c8e3b608335c1742270e712bfed22edc12679ed294682626c775ecb1252e5155708f27ca9f500c5de7d4e8f1ca77be0ae2dc53a2423b4eb136ede4aaf0023bb584e818a2b93de2b55bde242ec1e46f88ff64e3137043b8de49d1ccfe0a35daf77a7b53f8bb902d008000059bb7012575b7d128063ab11c6961f9ed3286409c16ebb41c2ab6eb4cda3c7b"]) getsockname$inet6(r0, &(0x7f00000003c0), &(0x7f0000001580)=0xfffffffffffffd98) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) ppoll(&(0x7f0000000140)=[{r1, 0x4}, {r0, 0x400}], 0x2, &(0x7f00000002c0)={0x0, 0x989680}, &(0x7f0000000380)={0xe6}, 0x8) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3109.521178][ T2999] device team0 left promiscuous mode [ 3109.534664][ T2999] device team_slave_0 left promiscuous mode [ 3109.572032][ T2999] device team_slave_1 left promiscuous mode 19:36:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x9a\x1d\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:05 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$VIDIOC_G_CROP(r0, 0xc014563b, &(0x7f0000000140)={0x3, {0xfffffffffffffffe, 0x10001, 0x6, 0x6}}) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00>\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3110.131441][ T3010] device team0 entered promiscuous mode [ 3110.137055][ T3010] device team_slave_0 entered promiscuous mode [ 3110.198780][ T3010] device team_slave_1 entered promiscuous mode [ 3110.215749][ T3010] 8021q: adding VLAN 0 to HW filter on device team0 [ 3110.234270][ T3011] device team0 left promiscuous mode [ 3110.241768][ T3011] device team_slave_0 left promiscuous mode 19:36:06 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:06 executing program 1: fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f00000002c0)={0x0, 0x0}) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000380)=0x0) r2 = accept4$netrom(0xffffffffffffff9c, &(0x7f0000001400)={{0x3, @null}, [@netrom, @remote, @remote, @remote, @bcast, @netrom, @rose]}, &(0x7f00000003c0)=0x48, 0x80000) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000001480)='/dev/vga_arbiter\x00', 0x4000, 0x0) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000014c0)='/dev/ubi_ctrl\x00', 0x10000, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000001580)={r3, r4, 0x7fc20000000}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r5, 0x400442c8, &(0x7f00000000c0)={r7, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r5, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r6, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r6) r8 = getpgrp(0x0) fcntl$lock(r5, 0x6, &(0x7f0000000140)={0x3, 0x1, 0x3, 0x1, r8}) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r5, 0x4, 0x20, r5, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3110.266036][ T3011] device team_slave_1 left promiscuous mode [ 3110.395206][ T3081] device team0 entered promiscuous mode [ 3110.418625][ T3081] device team_slave_0 entered promiscuous mode [ 3110.424945][ T3081] device team_slave_1 entered promiscuous mode [ 3110.451428][ T3081] 8021q: adding VLAN 0 to HW filter on device team0 19:36:06 executing program 4: getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) r1 = socket(0x11, 0x802, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(r1, 0x0, 0x61, &(0x7f0000000140)={'filter\x00', 0x62, "19f3cb2f0e62a1b86dbbdb0adf34f650cbc393f618267211f17f27d0f8036f48c716a0fc11350024984f5b8f2bef441c7448261b263d18e403a895b598f6799fee2f46c6e0a01521d15d50af4e6564bede60a7339501edd007b9eb3eac0db7fb97cd"}, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00\x00\x00z\x00\x00`\x00'}) setsockopt$inet6_buf(r0, 0x29, 0x0, &(0x7f0000000080)="10187aa1e735c4dc9ad1ac9e30fbd5b8adbabd647fc3886306a78378223164af6511b891487d949c87c67bfb0bdef5f95c13c6f5abf1a509d995b76d429c9eadcc97df4f49c059ad2ae0fd2b280e9540999f650b4d873d597e2021a70e51951216e8092959c451082535b334442032621fb20128dd60244fbafcb83de82a3a924d3c4b15d13de4c44cbc57a1384033a62717e60aaa63c9a35f87165f2952bdf2accabf17769d42ae", 0xa8) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000240)={'team0\x00\xfd\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000200)={0x2e, @multicast1, 0x4e20, 0x0, 'dh\x00', 0x22, 0x3, 0x3f}, 0x2c) 19:36:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r3 = getpid() process_vm_readv(r3, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x4}, {&(0x7f0000001700)=""/221, 0xdd}], 0x6f567f222be149f7, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:06 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x203f, 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000140)={&(0x7f0000000000)='./file0\x00', 0x0, 0x10}, 0x10) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x1) ioctl$VIDIOC_QUERYSTD(r0, 0x8008563f, &(0x7f0000000200)=0x0) ioctl$VIDIOC_S_STD(r2, 0x40085618, &(0x7f0000000240)=r3) close(r1) syz_genetlink_get_family_id$tipc2(0x0) socket$nl_crypto(0x10, 0x3, 0x15) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:06 executing program 5: perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x16}, 0x59, r1}) setsockopt$inet6_int(r0, 0x29, 0x1000000f9, &(0x7f0000000540)=0x7, 0xfffffffffffffeef) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x28c, 0x3ef, 0x200000000000000, 0x30c, 0x0, 0x0, 0xe003, 0x33c, 0x0, 0x0, 0x3603, 0x252, 0x8]}, 0x75, r2}) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r2}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYBLOB="210000004dc3bff6a3d819d4caffffff7f27b369c0cc545640afff9af97288ee0bb983881a4d5271b477a12a56b815752b2332869f8df76ac8a5cffba513d97cc2d108efcf86b462af492933a098526f"], &(0x7f0000000880)=0x1) rename(&(0x7f0000000780)='./file0\x00', &(0x7f0000000a80)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r5, 0x1000) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000240)='./bus\x00', 0x105000, 0x0) sendfile(r5, r6, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6(0xa, 0x3, 0x8001000000002b) connect$inet6(r7, &(0x7f00000000c0), 0x1c) sendmsg(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) 19:36:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x7a0592b30bf561ce, 0x4) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3110.834027][ T3206] device team0 left promiscuous mode 19:36:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3110.948699][ T3206] device team_slave_0 left promiscuous mode [ 3110.981273][ T3206] device team_slave_1 left promiscuous mode 19:36:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01:X\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:06 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) munmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="01000004010020531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_LOG_STATUS(r0, 0x5646, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x1f}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3111.133488][ T26] audit: type=1804 audit(1552937766.839:121): pid=3361 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir340090139/syzkaller.Qy7SL2/9533/bus" dev="sda1" ino=17875 res=1 [ 3111.364108][ T26] audit: type=1800 audit(1552937766.839:122): pid=3361 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=17875 res=0 19:36:07 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)`\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:07 executing program 4 (fault-call:4 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00']) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) r1 = syz_open_dev$media(&(0x7f0000000240)='/dev/media#\x00', 0x7, 0x200) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000280)='/dev/rtc0\x00', 0x20000, 0x0) setsockopt$ALG_SET_AEAD_AUTHSIZE(r1, 0x117, 0x5, 0x0, 0x20) fanotify_mark(r2, 0x4, 0x5, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x40, 0x0) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r4, 0x114, 0xa, &(0x7f0000000200)={0x3, "e072dc"}, 0x4) getsockopt$IP6T_SO_GET_REVISION_MATCH(r3, 0x29, 0x44, &(0x7f0000000140)={'HL\x00'}, &(0x7f0000000180)=0x1e) 19:36:07 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$EXT4_IOC_MIGRATE(r2, 0x6609) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x1, 0x80000001, "20531e3d8add4f78bd094d5851b296b0f52c83d6ac7b68a499"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f0000001500)=[{&(0x7f00000001c0)=""/31, 0x184}, {&(0x7f0000000400)=""/4096, 0x1000}, {&(0x7f0000000200)=""/134, 0x86}, {&(0x7f0000000300)=""/117, 0x75}, {&(0x7f0000001700)=""/221, 0xdd}], 0x5, &(0x7f0000001980), 0x0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000140)) fanotify_mark(r0, 0x4, 0x20, r0, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3111.638832][ T3385] FAULT_INJECTION: forcing a failure. [ 3111.638832][ T3385] name failslab, interval 1, probability 0, space 0, times 0 [ 3111.669303][ T3385] CPU: 0 PID: 3385 Comm: syz-executor.4 Not tainted 5.1.0-rc1 #28 [ 3111.677155][ T3385] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3111.687222][ T3385] Call Trace: [ 3111.690541][ T3385] dump_stack+0x172/0x1f0 [ 3111.694893][ T3385] should_fail.cold+0xa/0x15 [ 3111.699508][ T3385] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3111.705341][ T3385] ? ___might_sleep+0x163/0x280 [ 3111.710230][ T3385] __should_failslab+0x121/0x190 [ 3111.715281][ T3385] should_failslab+0x9/0x14 [ 3111.719805][ T3385] kmem_cache_alloc_node_trace+0x270/0x720 [ 3111.725630][ T3385] ? mutex_trylock+0x1e0/0x1e0 [ 3111.730430][ T3385] __kmalloc_node+0x3d/0x70 [ 3111.734954][ T3385] kvmalloc_node+0x68/0x100 [ 3111.739510][ T3385] alloc_netdev_mqs+0x98/0xd30 [ 3111.744294][ T3385] ? sl_free_netdev+0x70/0x70 [ 3111.748991][ T3385] slip_open+0x38e/0x1138 [ 3111.753349][ T3385] ? sl_uninit+0x20/0x20 [ 3111.757650][ T3385] ? lock_downgrade+0x880/0x880 [ 3111.762519][ T3385] ? sl_uninit+0x20/0x20 [ 3111.766780][ T3385] tty_ldisc_open.isra.0+0x8b/0xe0 [ 3111.771909][ T3385] tty_set_ldisc+0x2d7/0x690 [ 3111.776523][ T3385] tty_ioctl+0xe69/0x14d0 [ 3111.780870][ T3385] ? tty_register_device+0x40/0x40 [ 3111.786017][ T3385] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3111.792274][ T3385] ? tomoyo_init_request_info+0x105/0x1d0 [ 3111.797984][ T3385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3111.804227][ T3385] ? tomoyo_path_number_perm+0x263/0x520 [ 3111.809844][ T3385] ? find_held_lock+0x35/0x130 [ 3111.814594][ T3385] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 3111.820393][ T3385] ? __fget+0x35a/0x550 [ 3111.824542][ T3385] ? tty_register_device+0x40/0x40 [ 3111.829652][ T3385] do_vfs_ioctl+0xd6e/0x1390 [ 3111.834232][ T3385] ? ioctl_preallocate+0x210/0x210 [ 3111.839328][ T3385] ? smack_file_ioctl+0x196/0x310 [ 3111.844340][ T3385] ? smack_inode_rename+0x2d0/0x2d0 [ 3111.849539][ T3385] ? fput_many+0x12c/0x1a0 [ 3111.853952][ T3385] ? tomoyo_file_ioctl+0x23/0x30 [ 3111.858875][ T3385] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3111.865101][ T3385] ? security_file_ioctl+0x93/0xc0 [ 3111.870200][ T3385] ksys_ioctl+0xab/0xd0 [ 3111.874351][ T3385] __x64_sys_ioctl+0x73/0xb0 [ 3111.878926][ T3385] do_syscall_64+0x103/0x610 [ 3111.883503][ T3385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3111.889377][ T3385] RIP: 0033:0x458079 [ 3111.893255][ T3385] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3111.912852][ T3385] RSP: 002b:00007f9718f31c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3111.921333][ T3385] RAX: ffffffffffffffda RBX: 00007f9718f31c90 RCX: 0000000000458079 [ 3111.929292][ T3385] RDX: 0000000020000100 RSI: 0000000000005423 RDI: 0000000000000004 [ 3111.937247][ T3385] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3111.945210][ T3385] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f9718f326d4 [ 3111.953167][ T3385] R13: 00000000004c22d2 R14: 00000000004d4c70 R15: 0000000000000005 19:36:07 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x017h\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:07 executing program 1 (fault-call:1 fault-nth:0): r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:07 executing program 5: perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x16}, 0x59, r1}) setsockopt$inet6_int(r0, 0x29, 0x1000000f9, &(0x7f0000000540)=0x7, 0xfffffffffffffeef) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x28c, 0x3ef, 0x200000000000000, 0x30c, 0x0, 0x0, 0xe003, 0x33c, 0x0, 0x0, 0x3603, 0x252, 0x8]}, 0x75, r2}) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r2}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYBLOB="210000004dc3bff6a3d819d4caffffff7f27b369c0cc545640afff9af97288ee0bb983881a4d5271b477a12a56b815752b2332869f8df76ac8a5cffba513d97cc2d108efcf86b462af492933a098526f"], &(0x7f0000000880)=0x1) rename(&(0x7f0000000780)='./file0\x00', &(0x7f0000000a80)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r5, 0x1000) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000240)='./bus\x00', 0x105000, 0x0) sendfile(r5, r6, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6(0xa, 0x3, 0x8001000000002b) connect$inet6(r7, &(0x7f00000000c0), 0x1c) sendmsg(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) 19:36:08 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:08 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff\xff\xff\x7f\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3112.640030][ T26] audit: type=1804 audit(1552937768.349:123): pid=3512 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir340090139/syzkaller.Qy7SL2/9534/bus" dev="sda1" ino=17969 res=1 [ 3112.748366][ T26] audit: type=1800 audit(1552937768.369:124): pid=3512 uid=0 auid=4294967295 ses=4294967295 subj=_ op=collect_data cause=failed(directio) comm="syz-executor.5" name="bus" dev="sda1" ino=17969 res=0 19:36:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:08 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) 19:36:08 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:08 executing program 4 (fault-call:4 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) mknodat(r0, &(0x7f00000001c0)='./file0\x00', 0x20, 0x20) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) lstat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) setuid(r1) openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x802, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:09 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*\xa8\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:09 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x99\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00+\x03\xd0\xa1\xcel4n\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb4\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf3B\f\x93\x00\x00\x00\x00\x00\x19\x00', 'syz1\x00', 'syz1\x00', 0x0, 0x0, 0x10000000}, 0x118) 19:36:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:09 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:09 executing program 5: perf_event_open(&(0x7f00000012c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffff9c, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000900)=ANY=[@ANYBLOB="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"], &(0x7f00000002c0)=0x1) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@remote, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@mcast2}}, &(0x7f0000000200)=0xfffffffffffffd6d) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000340)={@dev={0xfe, 0x80, [], 0x16}, 0x59, r1}) setsockopt$inet6_int(r0, 0x29, 0x1000000f9, &(0x7f0000000540)=0x7, 0xfffffffffffffeef) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000240)={'bond_slave_0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r0, 0x8916, &(0x7f00000000c0)={@local={0xfe, 0x80, [0x28c, 0x3ef, 0x200000000000000, 0x30c, 0x0, 0x0, 0xe003, 0x33c, 0x0, 0x0, 0x3603, 0x252, 0x8]}, 0x75, r2}) r3 = socket$l2tp(0x18, 0x1, 0x1) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000300)='/dev/rtc0\x00', 0x101002, 0x0) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={@local, @empty, @loopback, 0x3, 0x0, 0x1f, 0x0, 0x100000000, 0x0, r2}) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000480)=ANY=[@ANYBLOB="210000004dc3bff6a3d819d4caffffff7f27b369c0cc545640afff9af97288ee0bb983881a4d5271b477a12a56b815752b2332869f8df76ac8a5cffba513d97cc2d108efcf86b462af492933a098526f"], &(0x7f0000000880)=0x1) rename(&(0x7f0000000780)='./file0\x00', &(0x7f0000000a80)='./file0\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r3, 0x84, 0x10, &(0x7f00000008c0)=@sack_info={0x0, 0x2e75, 0x815}, 0xc) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000700)='./bus\x00', 0x0) ftruncate(r5, 0x1000) lseek(r5, 0x0, 0x2) r6 = open(&(0x7f0000000240)='./bus\x00', 0x105000, 0x0) sendfile(r5, r6, &(0x7f0000d83ff8), 0x8000fffffffe) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001380)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = socket$inet6(0xa, 0x3, 0x8001000000002b) connect$inet6(r7, &(0x7f00000000c0), 0x1c) sendmsg(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040), 0xffef}], 0x1, &(0x7f0000000200)}, 0x0) getsockopt$inet_sctp_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f00000003c0), 0x0) semget$private(0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x200, 0x0) 19:36:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x10000, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000180)=[@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:09 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000200)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0xfffffffffffffeea, 0x0, 0x4000000000000000, 0x0, 0x4, 0x0, "86f2e8952a3590762181cff557d6a8eeb0fe610ed99c436871f16acfb28791a2815b49a30aa429a38a9b4ff78711346aa0a88cf918c5eb8c1541322d17abeed41e76f9120d72cb0279f9bd8a7a2893312926e0335da1bf2213386c726bb21a5b3b3acf41070e98c5adfdcc7b3f8ede8c5ae6887c29bee3e477476550b3489df98c30abdb4a2efaea7d098f2eee72ca3fbfc56baec830df14acc6a8179a75b2134254146f90986488acfbe1d987f9b57eb0118bc7dd65533e8983a2fafa6ee42e46e1e4bc13966b7633aa6a3089f7e226a3eb0a899c397109f47a3904376dac000000000000"}, 0xffffff01) 19:36:09 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xe4\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:09 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x3ede87b0d5b3752a) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETPERSIST(r2, 0x400454cb, 0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') r3 = gettid() ptrace$setregset(0x4205, r3, 0x207, &(0x7f0000000240)={&(0x7f0000000200)="305c339eb8086b62454d5dd64af6e5a58bc753ea48437c72262e04e850313446e5edde559d902972a9317541207be61b268e4e945db2", 0x36}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x28, &(0x7f0000000080)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000001c0)={r4, 0x6, 0x18}, 0xc) 19:36:09 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\xd8\xe8\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:09 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) r2 = syz_open_dev$radio(&(0x7f0000000140)='/dev/radio#\x00', 0x1, 0x2) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x12}}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000200)={0x0, r0, 0x0, 0xa, &(0x7f00000001c0)='/dev/ptmx\x00'}, 0x30) lstat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000003c0)={r3, r4, r5}, 0xc) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:09 executing program 5 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:09 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf4\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3114.278911][ T3973] FAULT_INJECTION: forcing a failure. [ 3114.278911][ T3973] name failslab, interval 1, probability 0, space 0, times 0 19:36:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0xb15, 0x4) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') [ 3114.508553][ T3973] CPU: 1 PID: 3973 Comm: syz-executor.5 Not tainted 5.1.0-rc1 #28 [ 3114.516404][ T3973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3114.526475][ T3973] Call Trace: [ 3114.529788][ T3973] dump_stack+0x172/0x1f0 [ 3114.534249][ T3973] should_fail.cold+0xa/0x15 [ 3114.538870][ T3973] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3114.544707][ T3973] ? ___might_sleep+0x163/0x280 [ 3114.549584][ T3973] __should_failslab+0x121/0x190 [ 3114.554674][ T3973] should_failslab+0x9/0x14 [ 3114.559281][ T3973] kmem_cache_alloc_trace+0x2d1/0x760 [ 3114.564681][ T3973] n_hdlc_tty_open+0xa7/0x50f [ 3114.569381][ T3973] ? n_hdlc_tty_close+0x360/0x360 [ 3114.574422][ T3973] tty_ldisc_open.isra.0+0x8b/0xe0 [ 3114.579549][ T3973] tty_set_ldisc+0x2d7/0x690 [ 3114.584161][ T3973] tty_ioctl+0xe69/0x14d0 [ 3114.588504][ T3973] ? tty_register_device+0x40/0x40 [ 3114.593683][ T3973] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3114.599938][ T3973] ? tomoyo_init_request_info+0x105/0x1d0 [ 3114.605679][ T3973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3114.611939][ T3973] ? tomoyo_path_number_perm+0x263/0x520 [ 3114.617609][ T3973] ? find_held_lock+0x35/0x130 [ 3114.622393][ T3973] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 3114.628227][ T3973] ? __fget+0x35a/0x550 [ 3114.632402][ T3973] ? tty_register_device+0x40/0x40 [ 3114.637536][ T3973] do_vfs_ioctl+0xd6e/0x1390 [ 3114.642151][ T3973] ? ioctl_preallocate+0x210/0x210 [ 3114.647273][ T3973] ? smack_file_ioctl+0x196/0x310 [ 3114.652313][ T3973] ? smack_inode_rename+0x2d0/0x2d0 [ 3114.657534][ T3973] ? fput_many+0x12c/0x1a0 [ 3114.661981][ T3973] ? tomoyo_file_ioctl+0x23/0x30 [ 3114.666934][ T3973] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3114.673277][ T3973] ? security_file_ioctl+0x93/0xc0 [ 3114.678406][ T3973] ksys_ioctl+0xab/0xd0 [ 3114.682587][ T3973] __x64_sys_ioctl+0x73/0xb0 [ 3114.687194][ T3973] do_syscall_64+0x103/0x610 [ 3114.691812][ T3973] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3114.697811][ T3973] RIP: 0033:0x458079 [ 3114.701717][ T3973] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3114.721330][ T3973] RSP: 002b:00007fb3efd89c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3114.729753][ T3973] RAX: ffffffffffffffda RBX: 00007fb3efd89c90 RCX: 0000000000458079 [ 3114.737769][ T3973] RDX: 0000000020000140 RSI: 0000000000005423 RDI: 0000000000000003 [ 3114.745759][ T3973] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 19:36:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf5\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3114.753926][ T3973] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb3efd8a6d4 [ 3114.761909][ T3973] R13: 00000000004c22d2 R14: 00000000004d4c70 R15: 0000000000000005 19:36:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(r0, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:10 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x100) ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000240)=ANY=[@ANYBLOB="08000000000a00afe170a50ad1cfab3f000800000080234f4b1e4d7b7e31000000"]) syz_execute_func(&(0x7f0000000040)="c441817c5f09660f3a6356b9e666f247a565470fac8def00000000f30f1afbc401755dcdc4c2499a1c996440dfa0040001008f8978c2560066440f381cd9") setsockopt$bt_l2cap_L2CAP_LM(r0, 0x6, 0x3, &(0x7f0000000200)=0x74, 0x4) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) bind$vsock_stream(r0, &(0x7f0000000280)={0x28, 0x0, 0x2710}, 0x10) 19:36:10 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x63a, 0x20400) fstat(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) sigaltstack(&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000200)) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) syz_mount_image$erofs(&(0x7f0000000240)='erofs\x00', &(0x7f0000000280)='./file0\x00', 0xae0, 0x5, &(0x7f0000001440)=[{&(0x7f00000002c0)="70e3fe6d4edee8aac7c4e7ca7fb867493df7121fcece3fc3f49cf6b667", 0x1d}, {&(0x7f0000000300)="0dea613e4457fcfe5d81ac2bfd4313d194bc98c4a4cea3f1e331e906fcec227d3e4429c025224ca1d7df68278cd877428bafd84e31a0c13a419144d8f45859543c2980aa8207b3555f11568ff01b833a1f2258d814ae1bc3592766bb2faafba00b34676d793acbe3d2fb077663", 0x6d, 0x4}, {&(0x7f0000000380)="5adaaa6562ff32137990b474620797e603ba5ccab3cb2973333381740b0263dc59bb1b368027d51cc2ea681835389f8c48fda1ce4129463b36a4a088c43813dd0d2eac8ca5ae192349", 0x49, 0x100000000}, {&(0x7f0000000400)="2f6c82c3892fefda4a9acebe207c0d810bcaca0b048ed6014f726eb86ff8f8d17788c19507f392c4341727b36187198751d4e3d9d932", 0x36}, {&(0x7f0000000440)="66387e9fecdb5c3d9f07bec23dedf1a98c3541fb12fc98e34ab7015ea5f37c917fac31fde7022162cc5e8bb4fd305309b7f6295a96f9ed0a70f157af667a82f28257c403aac8ba56aefd72508a0de73e17417a84af6693330bdcb8ff9544575c4a61b3fd1d708cdd130fae07d051973c27f265af651d95b565bf0f4caaee42799dd815e4b669dd02f7fc1b1b8933c631dff5aeb3128ce4bf598f70243a220922de7863e7e8b9d15ae1d73c9ccc2b7355319e88205a3b6c5b05a776a90382e84990b27f05a8fc5daf0bdc7e3ebc483711a18bdc3f19ebc306e73649d84ede2d38727724bfe239b3ee989ce2eda7e4e22307ffc7a30babca5e222930796e06aa7e3674e4393bc9f938984c5aeef3b4e2d90660c9f2e26f4e7b42041800998751cfaffdb11f4c9994b751a3fb558dbb4c6a7746a79dc1b61f9146cbccd993e5db1bce9fc1a813fd432a028310267da63d778e790d2bbe164324034763df5d746f25826f3d78e23113bf304eef8a9451dd1b011804a4e14f5a92d9ff312b45147b5762493e06864486bd423e3751d85ac790ab3e9a4f2548adb6f64f567057b2b371b3e6a9031224e274b07513ab445d7be2368c9427400f208d8a8cd2dda70093e1ce6c6a6cf35542e3be0aae147ad5da31a46a5de567a72f71289b91f3a1c3df1e155be7a6f2e514373a1ab8bde451420a922d925b40090ed0b08305fa22df846e6c05a096e535f20694c6c9b93da61a878c652071dee9e21c81171396861d193cd23d8f3575a6f97d6a1d4fb3ce58a7cedc30087bea589d228e53f26ec4452b456249be2f5f57be13240affe3004647623555f0958cecd6758f1c2bd18c8bf7a4af0c19fa071b53e32bc10aa0cd4e1efb5ac36a50757a155d7631ad957d10e35cc83316eca602b226f065b42f5c991e334d8ba4d400744ff7ae9aed9dcc5a4c49e76f414517e09e5cb369a0e07e3ef0cbb22e6b586aa657ee506875a8f09cbac543e98ab297ccec339c3893a32f3e3cbad3331bcf89880ba8a3ce575902bc4f780ab94f144e45aa266d44b61b2667f5be13c30ffa33d6a46ec6ab3ff3e0ee732183f5157b141264f0a7ed1fd1269635b60cf425fbd25290f7ad0b70cc3c26f0aa3a0b6bc96e3c99edf90056cfdfbe2fbbc7ae7ca82039ace0b4b4f69d92fc911a4501efeab59e4635be70409a52a66932442aedcadb29b5e03c54846eeaabc57ed6198f2b5e85246fc1ea0a1e856e64fe0478fffb69569696e744c1a4281e1ecdf80ce3b7e90932670072873a51c97a5ba370d0d7a3c693f8f2bc3f471537b4ecd20e34b7d1439f517abec16b430ad1dbc3f59b005b5b04a1a41649fd55ed64733af0a74d8a7d65873c40f209facdb8bbde488e6b02f25fc633ce64d9b7ab969e04123aa2140f454ee6da1f2fb3c94dfab6a509755dfcfba176c3b50ecddad8a8a5bdc7221e164a54e4da5684505cd1aaae171d568a349fee7c7acbc7d1b97704227660195014354f025c1feba21758941598f1d2719dadc2898bf3f793bedc4416af556e8d3570e6fb6d72daefd4062348d85c30f4c46ef6b8c46b627ad715d538e5c0d3ffce2f4aa6060ec115043251e4f78b6e1541a2a687d580913c9fab373b93ad75a162d301b337f790fcd0ecfbfe0188cd0f862cc0baf3e04b807c0fdda4619f302f61d9b703f2a0408e5d9aea42c3a4c0a4a8b82f6da68f4df63bae81e8dcefa31bae3e3063aeb7164c73e9be37a4401cc89fdbdcb9e9d5701ade2981eef434356db4194f2ce7fec172d6dee42aa8e73a176307f3e8d378ec8a0013346af8ea2055fb58ae0a17a4334cbea58bd6101632c875049bbd598346200b22159438c9b42377683c270f1dfa060e744b383d46eaa15bbcd81d59b521a8f18f634e65ac40171bc41b073fa6195e887df00826a9884532a436913a6052c963f689195e53714258b416e4d89591f9b08e21ca5de092258fc5dd5517d34ae705af6d5d4fc1f9abae2f9ba6dda55f4f6c5a73e5b83cceae4d4388b6aad4898c8dea32fceeeb3d6b55bceb31fa8e33f2e9af5307922c7b59e441160c87608beb54dc7103d2ef0246c9187a1978c514bc5a39b3f9e7d759f9b24526742553e0356a41e2cb1a5b2926fa06dc4f4024263a9539cdf1bfccd7fb01ac0b0c6c2f14f927c3b1f35e5fb97db6b581b2aa3ebcf65cdbd62a06f8467c5a9dfcc55314f920b032df7b7d5ea0af2efd40dbb0637e14d9c6005d22a3cba7823d9b0b8be9d5a59cac785e72e05afae7a9a2b33d8969ebf5ec460857da0a3c12bc3bdebc4d73f3373123add048c89f90878911e8beb1ae9a0da4a136b4dda6e1473090af9f674b71b4b0982a7631a75bdec83975027561409ac4054f2132975970b82799d5381e2bb171223b27ca041e343ef52884c35e93b1330b591edf01da4c74af9d5d090b07bfe738c8652b4a892ee81c1b48758f1ea5c0698f410443e96f9f509a0901b367917547a65d78bccdb4f95d6bb550b022653fe353e86bb052bbc0d02f8ca4a34972de2f91effb39d4b8affdadadbe7193110675971f036136e6232742f735f7a5ddc3b31aaa14f5bb8a01ab7d6a606d0a6f6984bb9a263f8b0bb72ab0207d5c3e5ab5f592571180c0d26a83094d5bab8481d72045adf7be01db92762c291469fe29573ff378300595c1c75283ef9a3299c20734c302103ea32b45e2952fdfbcd1afa1dd6bebd8540e1e6e40ada9a575bfbceceedf15188d6334fc22ef96aa67f1a3e829b28f394d5b7477f7cdb334c19c1cb997ccc46cfca955c678557a4e26541ccb915ecb6038b6f0304c442f56b999298945195b8bbb106784ffef65307b3e8c030f2a89ecb37284157df5fa586e0dda772d83750bc6ff566aa332f442de9a54622dce9053c16c3decbb5e627e8e529d79705b0d49e07bebc5365d3898124d0515d9649a66cc79b0ff9bec56b48f3159d7ab8b73a3c63ae1ff27ff5d9fcbaeed3a84e0e5c02046675af74fd75a12960b4b75c26a53122ccbdfd6b31d46836f36743680fe2aae73828d3cb5e8207145d5545d373af48aa391861b677d104a64783e859263b23f3be406f5451343b883d10cc48136925a92aa29fa2a824f4122371b5fce3a0fff3606e739ab58829f5438ab4004bccb4c0a9753344541a76bf2c0c98adf9463fd833266ae370729e834f9bd01463c71427fe781dfecab7ac76d49c2b4bb4a02e69ad8a0f90165c77015039152315c2046242babaf522e19841f7ffcb2544d7929fa3d4b9227f653d58fce5fbc4bae922e0de0ec8918686d854d39d542d58757d30f6307e07fd3c7b7b80d6ea51a69de4f3c19019aa5ee0a1b21a6a07e08032f717a333f6add4f0dc130eed08e6d4b9512db07378983f37aa485743adc65bea328cadcc88c83728fda9575ab0c55845f609496aacf34eae0c54f08886e074b2faf15a53d0385c7ea1bbacefcf920b8a33e4bf20fb716c370821238c79f1c92b6532dfc2e3347852ed3c3f958600cc6f911dbc97c1362c0c281c9ab779fb834c2600dd1e9d623df73402efaf48d8df0d20628c915fbdd17c3fa98d6d728ed1e918061ed282f8991213a845a38a1c9d4d7661a96fa8f90abcdb913fe2d44e16aaa7cba9c22796386f0b6a0d916c976c14a227ec0b6a10d761da7f25b5fbe87ace6481f3e2d31b86f2107afd77eef9d6142673a9363f746b04e0643bb1d982e061d50d45296f794fe5c18f599d424f313ca2ec8e5d6725f1f2ea815931b9f1fc10c014fc8c296ec0282cd41ffe496eaae9e1e13901326c41c84dddfab4e10a6bb51d91194329626e87a111e26b313e2ab12699114cc3d6024929908f553dcdfe0d9e9a5a5ea5e8f70d6068d5ead89096fa4e31f0cd3e2508d099d09372fd85e36756c94690632fc823207561d08afd9adbf66f294ed5053342ad7b86c8086f1402f0eeb2fbe5b0f21cf46cca59b585f8079232b8ae752b1d8d34372a0b907dbd9d40e6c02cfa6e8124a21f1bf3f3100adb7b4130ed068ba0af2e2766a63f55ddabece55e56feda8375f51a1af5da5faf8ef6530a01e1adc33378f50718b3a399f47dd3fda8d655d0e216409d50d4ef44e4c417b8001e825ae837b97f24c29726d3dc56c1478fe68b2f4bd76754f674eb1ef1ae23c52dbff5a87d0061741ba1d4182ae821a7092f98cd33dea4d506879840b8df3132ed88531039bb8bfa4bc17121d8d9dd17fa98d6ee5c387d884c02874f3b4f1dd2f6e5209155c7ac83b1247ad986fbfe7985654e0679e13b543855cbe9709033e393b1cdc488110df8c10fa085dd40b309872183e4fe5a6b566a03e957e7b01fae7d41e7fa3e27e9344b7ea16d4a6205abd2ed7e0ac963cca00c5cdd5ebafd8e9163267ab9313cc695ff766c30dc486fde5f4472d4a20dd6af8f0e52fe1e7976ae14c046c32f72878d84ac48c79505358cfa7abfd6ebcea8812550e110562733a6a1d102ac735633619efb99fca07dd9ef9646f16642454adbbc3eabc90bb8522b58674855ae618d634d71334fa0e58106d0b4a216136a78506de1b60a9bc41e612b643489317f808e67e6f96d5dfdf890ac3d6e149f9358ce398cfe241e5727343dec9bb16fb56a378a3813476437db3741c70d4d7565b5f5f25c1e6ccabffd30e5d73d9bd474961c5ea41ae98a99d36d55f2396ee66a7c4f36ebc0d72efe9d86df896aad857dbf9924581187f2421eb597645f58531402c1d4e278ffaf3b3f33c0ebce17eb5ce6ca35efc42427f19de1b12b599b3ea31d51838a5252a0058734d39287205038c5df0e930153ecc1755c5f06ed4b2fe9cc3d138cb3db0a4da3aaa81807f41e05ca48fee2fe31f726543e053305b4cb9f5a2681a9c7054dd16ad06b36f61f8da8eb8a2199da98be5a1f5105ebdd3d7fb96757b2ed0029a2aaf772a4a3e82b1b2a833bf407e633de897cf4b6fc564ad9cec0657dbccbcd7515fe1723071595de1ec81b555060ca7adf9eb72ac91be798d71a60ac655704f597fcf8f7377f7a4dd6e9d1a7c6743944ec6706608ea4716a8959aca3e6e4c3b8bbccc0e5a912732a6264c800b81d99a0fc06882fa677c6e5f305fb9baba74cd70015059ab805a5100fa7b3f65fbbfffbadb4c4a90ee2480916b11f1001d944c45be521938effd1ac4c9bde6134102fa3531f0e666777857abb9f3fd2f7eae903fc7fe2ae47012b63192e17bbc4e9fe4d0fe986982622c157eab5c6a5dc31a93f75c7b7648ffc46f1922549aceddaa35dadafba14ee1ba82d54487a988497e912250824214cbf0cbff746fc03fba4953ed837e1ed648ac3e9b3bba89ce5184c6b12302ed5c9a8c9910d306f5107a97c4b4f05846e246d57eb28fa844a01296c82ccfaf71e732eba59263a57d1efb4f7ea86aeddad995d92e4c63747c35dd10ffd634d827a9507d5e0eb07b183ad5432b1b15c78fe53cdb21673309e550edc2be0c8304474bb67e78c503a9023aef31b84a24766dc98057b1ad5f59a1014bc76aff8de9a9bd6aab6bcaf330fb32aeb53eea7c93b23dcedd64c288bd2ca220b4f1e40e9ee97d1150d032a54b387f47fdd2b12a20756fd9f544f65eaf2fa24c499297c43ba72663e0e2e3ea4ebb67a0059aacd5788e2ce1b3aea1ef3a8d3ff407aa8e4e2834c9c0e6be0f333570da9d874ba9781573b0e87dee67c346a78c7d6bee2e282d009f55898d9b3fcba9b8b270f72cf504551db7e6458eb23c209281ce75da62f70bb6443eb00c6b31c1e2499d7c6a22df0e2eba09e73c08dfd44e21957a2d1f9537195c468cd67f23b5", 0x1000, 0x6}], 0x42000, &(0x7f00000014c0)={[{@noacl='noacl'}], [{@fowner_eq={'fowner', 0x3d, r1}}, {@uid_gt={'uid>', r1}}]}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r2) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:10 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x5, 0x80) 19:36:10 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3115.320637][ T3973] n_hdlc_alloc failed 19:36:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:11 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:11 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000000)=ANY=[], 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0x2, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r1, 0x10, 0x70bd2a, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4004080}, 0x800) 19:36:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = socket$inet6(0xa, 0x5, 0x7) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000001700)={0x0, 0x3ff, 0x20, 0xffffffffffffff30, 0x6}, &(0x7f0000001740)=0x18) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f0000001780)={r2, 0xfffffffffffffffd, 0x437b, 0x9c1d}, 0x10) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="ff011c0000000080530164be6e6a7fe941fbb68bee436500848a0f09c8ad7bbac3b24c909951f97fb000915e06f3f315d40284ccf5ca2af53e729d152a624b03fffffeff714df5dc4ed9fbec4b58feefb07d2afb77785ed54ece4192af63cc6b0738f7aa286dd3456853a76b4c55e2270068e34c0afe3cb6a950d670c614f59414ba0a60dbc0ccec64f4d91e86095cabc81f8f83fdac3e6b7fc69ae2c79108000000000000000000000000000000000000"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x4000, 0x0) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r3, 0x5386, &(0x7f0000000140)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000340)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x18081, 0x0) ioctl$KVM_XEN_HVM_CONFIG(r4, 0x4038ae7a, &(0x7f00000002c0)={0x3ff, 0x998, &(0x7f0000000240)="8fe92c6aa729e7f525f58d7fbeef709894c7afb31844b74a09979c4212638f047d7cf943aeab0556c246702a1e8668b794f45ab5703ac747b694dc4fcf7144b3aa9399f524ac5f914b6f4d4c4c7cd75598149e61f1cd4a90578dcd3641b6ad657df10ffc8f39d6c8ebb12c7e5a8e", &(0x7f0000000140), 0x6e}) write$P9_RWRITE(r4, &(0x7f0000000300)={0xb, 0x77, 0x2}, 0xb) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:11 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) 19:36:11 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:11 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:11 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000a80)={r2, 0x1, 0x80000001, "f68a0b51d175cd27eb0ca9ab4adc230cb7e248ab9cf867e10bd15129a91bc177eff33680b55dc1fa6b2f35c039ec1ab452bdf3024e0238d25a3d44f5d57b44f4070f25e7632b720086f71c2295e72a7c7cdcc8513df138c679c20eb161becd08c33d4566b995faa619cd33d77b5d773bb98071b6354b5e08bf5df76f836972d28c438d83e7209ee63043733dec7e1480f89d658c1496d89e4c32c4be347921e3e71c55d6767267f1a3f7cd249d473d78e004116081d21e359138fb8c2123eb8778545f8cf55429993c4b9292043baea741df4b8135460d2449c72de555d44ed0e847e14bba1eb57f5a6a38701f32a7fc22c8eee258d544dd26"}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) write$binfmt_elf32(r0, &(0x7f00000001c0)={{0x7f, 0x45, 0x4c, 0x46, 0xfffffffffffffd83, 0x1, 0x1, 0x100, 0x800, 0x2, 0x7, 0x8, 0x18a, 0x38, 0x24e, 0x100, 0x1ff, 0x20, 0x1, 0x6, 0x3, 0xa6}, [{0x6474e557, 0xf4, 0x1, 0xffff, 0x2, 0x1, 0xfffffffffffff800, 0x5}, {0x6474e551, 0x0, 0x9, 0x2, 0x9ed, 0x6, 0x1, 0x80}], "115a089f58826ae21b160f122e1e0933b397c0ca3e1af26a2aceb91d7c4cf5dcf003e2", [[], [], [], [], [], [], [], []]}, 0x89b) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x0, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:12 executing program 1: r0 = open(&(0x7f0000000240)='./bus/file0\x00', 0x80, 0x4) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) lsetxattr$security_capability(&(0x7f0000000000)='./bus/file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f00000001c0)=@v1={0x1000000, [{0x20, 0x1983}]}, 0xc, 0x3) 19:36:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) r1 = syz_open_dev$vcsa(&(0x7f0000004240)='/dev/vcsa#\x00', 0xfff, 0x2a000) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000004280)='lp\x00', 0x3) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:12 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x14103f, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00', 0x0, 0x0, 0x0, 0x5, 0x4}, 0xde) ioctl$KVM_S390_INTERRUPT_CPU(r0, 0x4010ae94, &(0x7f0000000000)={0x5, 0x1000, 0x4194a939}) 19:36:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000140)="c2858ab1e36204c9c3fbced1db4b1755") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x12) openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x240000, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) getsockopt$ax25_int(r1, 0x101, 0xb, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 19:36:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x0, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:12 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:12 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000073793a3100000000000000000000000000000010000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006c45a1840000000000001900000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000"], 0x1ad) ioctl$KDGKBSENT(r0, 0x4b48, &(0x7f0000000000)={0x5, 0x101, 0x7fff}) 19:36:13 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TCSBRK(r0, 0x5409, 0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:13 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x12e) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) getsockopt$inet6_mreq(r0, 0x29, 0x14, &(0x7f00000001c0)={@rand_addr, 0x0}, &(0x7f0000000200)=0x14) recvfrom$packet(r1, &(0x7f0000000180)=""/48, 0x30, 0x20, &(0x7f0000000240)={0x11, 0x8, r2, 0x1, 0xff, 0x6, @link_local}, 0x14) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r3 = shmget$private(0x0, 0x3000, 0x1808, &(0x7f0000ffa000/0x3000)=nil) shmat(r3, &(0x7f0000ffb000/0x3000)=nil, 0x1000) r4 = syz_genetlink_get_family_id$tipc2(0x0) sendmsg$TIPC_NL_BEARER_SET(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8030000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0xa4, r4, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x90, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1d1b}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x10}, 0x20004010) ioctl$KVM_ASSIGN_PCI_DEVICE(r1, 0x8040ae69, &(0x7f0000000400)={0x57e, 0x2, 0xe7, 0x6, 0x400}) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:13 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) 19:36:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x0, 0x20, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x400080, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="010200000100"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:13 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\xff\xff\xff\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:13 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x2) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB="010000000100d5cbcb60e4eba509f10d214e6fee05b01a74c9efac3936a1a21bfe8a21"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) r1 = syz_open_dev$vcsn(&(0x7f0000000440)='/dev/vcs#\x00', 0xdda7, 0x12100) ioctl$IMGETVERSION(r1, 0x80044942, &(0x7f0000000480)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = accept4$inet(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000180)=0x10, 0x80000) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f00000001c0)={0x1, 0x1f, 0xfff}, 0xc) close(r0) r3 = syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000200)='./file0\x00', 0x2000, 0x1) getsockopt$netlink(r4, 0x10e, 0x6e4b6d76daef79ff, &(0x7f00000003c0)=""/23, &(0x7f0000000400)=0x17) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000380)={0x3, 0x3, 0x5771}) sendmsg$TIPC_NL_LINK_SET(r4, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800400}, 0xc, &(0x7f0000000300)={&(0x7f0000000280)={0x70, r3, 0x0, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7}]}, @TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xe49}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x7cc5d590}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x101}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x9}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3da2}]}]}, 0x70}, 0x1, 0x0, 0x0, 0x4004}, 0x10) 19:36:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:14 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x40, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x1d, 0x151201) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000001c0)={0xffffffffffffffff, 0x1, 0x80000001, "c37a2c3a492489a551a115bd896892ddae616eef67f7e5f0f5b79f426239408f6c0f0deb0d915ac0fb980525d7848b06aeb0526cc2578c2b40e5fa2c1318a8f9652dff51571d2f3ef00e24793c0ba1b311cda3e56230ea91ddf383373f8ae1f215302ef1bd8f166884e5baa618520298523c887dbb1e7e1982b59cbc91143083ad5bc7b67d06692f09000000369f65a4fa37916c87e5a408d1a99d127a51d29f85e6c1926ad5b74bd526e6e796352485f59295b0d507b711d6a31e13eea6fd1075aa25f79eaced0974de06ed670fdc6bbdb7e601c37c4ccf6fb271f9133a03a0cce7a0d1f41352fc2dc120c57560295e7471ff18444e2f4be091e3ad2b08ff82d29f139d7448661d3cf2fe4afb6819acd38303d6917361ccbe08dd339affb9517bc0739e53287d0ab622bd87965193caebf6b926585233440e19d1a7708fe4b2e59eb587a37b37fe4d0693fca67d733f555b27cd83ced0c22166c024be9f62ebb395ba0653"}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:14 executing program 1: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x0, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f00000000c0)) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000100)={0x0, 0x8, 0x30, 0x8, 0x9}, &(0x7f0000000140)=0x18) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000180)={r2, 0x9}, 0x8) write$UHID_CREATE2(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4ea000000000000b600000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000b80000000000000000000000000000000000e100000000000000000000000000000000000000000000002f76c13431f6000073797a310000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='bpq0\x00'}) 19:36:14 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget(0x1, 0x7, 0x240) semctl$SEM_STAT(r0, 0x3, 0x12, &(0x7f0000000000)=""/227) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0xd) 19:36:14 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\xff\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:14 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141002, 0x0) 19:36:14 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x22, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffa, 0x0, 0x0, 0x4, 0xffffffffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x9) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='attr\x00') ioctl$sock_proto_private(r1, 0x89e2, &(0x7f0000000180)="e63fa1bdf2d98a60c4ef7b123f789aef55fafb596900940c8edd374e8ecb342563c9ba7a41d90a11559adda8132cb96c0280590f5001fc60e76f525ab6f13813445b224e05b8d467b566a5a982907302c48a42632d1f172a2eb6b03ec1cb03316a92966679086a533af4c17730ef3a053e8672c92441d99569a8c887870727286069ea26d93202426ebabe9925be9053a19f6306707e055f3eba2e8bc9850301a2732ece4f7074b353435c818d61d64f2c17bc3fafaa381786c5b0403f46423f31fe47b0a1e5671e17") ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x509140, 0x0) ioctl$sock_netrom_SIOCDELRT(r2, 0x890c, &(0x7f0000000080)={0x1, @null, @bpq0='bpq0\x00', 0x7, 'syz0\x00', @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x8000, 0x6, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}) 19:36:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:15 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x400000, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000200)=0x9, 0x4) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x100000001, 0xd8}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp6_SCTP_RTOINFO(r1, 0x84, 0x0, &(0x7f00000001c0)={r2, 0x4, 0x8001, 0x6}, 0x10) close(r0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000380)='TIPCv2\x00') sendmsg$TIPC_NL_PUBL_GET(r1, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x14, r3, 0x28, 0x70bd26, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x40) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:15 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x126) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:15 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x20000001, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x10000, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setpipe(r0, 0x407, 0x7) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) fstat(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000180)={{{@in6=@ipv4={[], [], @rand_addr=0xb5}, @in6=@loopback, 0x4e21, 0x100000000, 0x4e22, 0x1, 0x2, 0x80, 0x20, 0x3, 0x0, r2}, {0x6, 0x0, 0x24, 0x80, 0x0, 0x800, 0x2}, {0x7, 0xffffffff, 0x5, 0x8000}, 0xfffffffffffffffa, 0x6e6bbd, 0x1, 0x0, 0x2, 0x3}, {{@in=@local, 0x4d6, 0x3f}, 0x2, @in6=@local, 0x3500, 0x3, 0x3, 0x2, 0x8, 0x7, 0x20}}, 0xe8) 19:36:15 executing program 3: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ubi_ctrl\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000bc0)={0x0, 0xc7}, &(0x7f0000000c00)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000030c0)={0x2c7, 0x8000, 0x40e, 0x7ff, 0x0}, &(0x7f0000003100)=0x10) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000003140)={0x0, 0x4b, "7f96469f359671e8ab15f0425c39dc9188ae033abe523c9d6c4138891e8c63e47e58cd5ce8b749e43bf20b23239361fdf4ee052c487db6a3849dade523996f128418fc37906ba5217166a4"}, &(0x7f00000031c0)=0x53) sendmmsg$inet_sctp(r0, &(0x7f0000003280)=[{&(0x7f00000001c0)=@in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000200)="73ee9f8faa0562831978ebf2955e7898849524", 0x13}, {&(0x7f0000000240)="2ac1f3b663f1941d2227809a823abb278210033a08aee64271a0f03d23bb20b78823cff7aeba8931c763796ea70d2bd9ac4b6b5eb9198c68e34bc288506ae5c751b3a837797437077bb4cca9d6393f1382c013f1bc42bba7ff5965a5671316265ff9c8c973e5595116c717d45157f557797dab2db5ae5ae7a7d4ce2a73d19443b7dcc7f9556b551ddc51d9ca9348c83bdaf09001830e2ef76339207c8bda277cf9ed13b184d594a5a6", 0xa9}, {&(0x7f0000000300)="e6fe898ca728bf57e88af6a1fe8a5d9275461add19a8bab848597e6667f9eb4e97978532b52e44b2804ce1a3a830d3a489bfe416976ed2a18d3762b857370c71c545241fc81319b13667b7eb1594192409145999b29bb9bb1b06f11f7f276388b7c39bd4223fe3ca12d7e39551be59334055f69d1d7a025175359682530ff8bdc9d19dfa2a3e6035891a7476ade23f04059487194462d3a94ae9a1964fc4b7146fdb3046fc98e7db784674720bc473bc05a3e62b389f7e1a42edce8714d3a0f68163f71f7b1fc9b0375e203519e31429f1d91cc28325fa65f81dd015", 0xdc}], 0x3, &(0x7f0000000440)=[@prinfo={0x18, 0x84, 0x5, {0x30}}, @dstaddrv6={0x20, 0x84, 0x8, @remote}], 0x38, 0x800}, {&(0x7f0000000480)=@in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x20}}, 0x10, &(0x7f0000000b00)=[{&(0x7f00000004c0)="8473edd4103d271075828519f34e6e4b44393a0f9b87b5b069657720b31efeb04196fb4903c593542f41700e66b219cdca49f4214aea787397f7e7ddff0884b538566c7ba7ef2ecf7ccffe96643e9aadafe36006212b039ec968cb41f536afa95418c220fffbcafcff49d70cf7bf8186edf32601b9f13b90c95d9bf927929a435c73c1e58978716b00721688b6c66dd283bacc26bf198920d0de93b099ea9c5ddabf9cdf47192ed45adccce0845b08ef4e4acc0c6396998c5ef5f6c1ca693b3cd986c8283040270411c3b2a11b7f424a16786bc18fe8989351bb361db2c80def83", 0xe1}, {&(0x7f00000005c0)="85b4612e8a95fb3fe00b5d2b12a6738790fd75c5e50d9c2cdb3a35a20e7b21ef9415ab27d70f59557e1c17faaaf759462626053fe4c6da7b706dcc1979fae794f7425c83dadd370c646bfac6a996025067e0166c1ec289384a41a2a9ce4e572319ad2399f023d20e5af9f59866bd2b01214ed9f4ac63ce87230c665a04986d56a820b660", 0x84}, {&(0x7f0000000680)="e61f0fde69619c72418767f4b64a97e05d3fadeec5396d3f08a461210f34531d7f10bf006ce4eaaa239ee1af7ddcc5b73ba87fda8783b9228412d4ada245d9f3ed4a4b855618f5c58dffc641925d12a067b5a79bebba6121b0a2b554f3c09f4aec5fe8e43e8d4ebb5faa83501fc1da954f9b45bda37fa092df373dcad897574fbe36f62be199ce9d201bd5791943fa702c86dda345068bede8f99cc1e881ebb1835714d9b4bd5068f076a8e94c1d", 0xae}, {&(0x7f0000000740)}, {&(0x7f0000000780)="e1aae256797b40091968d69ff63df493c77e7117b8a96345a11434f6f0b6e64627c5f91f8311601c4dcf0b8a41aed95e6189023a6e75dbdfcbdf2f7b", 0x3c}, {&(0x7f00000007c0)="da7a0c54913b3e485e4e77317cc2d69157ab933ea709de5dd01fc6a86061041ec020005ce576061abb24f7baa6470f587ab90e2e8f8af21dd4b9071b301c87957439c351655212cdb12c4dda5b1c79422c896ae3c044af1573770b101be923f9f5d96fdb16c589c9c241db341e9727362d88dfe162dba1dd451e505b99717ff92b41b24e3445d81cee5092d8", 0x8c}, {&(0x7f0000000880)="0917415e4bc751f8c05e9ab72b07e9a8d35405a035", 0x15}, {&(0x7f00000008c0)="49a9d3f50fdbf5878eccf28fd298507e932820dd78ac7cec9350b33a867998319dacfa0fd0fa8ed0b743535915a3e56114d35bd49ff452bf4be4", 0x3a}, {&(0x7f0000000900)="f59d6d0a91d0360f74d6fb141259ce3880af818725025b6c37667be37c6cdcabf1cf832102b7da3985faad44868572659bb7624388431551aced2fa3abd0a67bd39e4c3be1aafcfeb4c4cdfee469b602ad4c561c87dae780f3f088b10249076651a83815b6c4dcd92a8a157d2ddbf6ef5287a0ebc25d8f1b617f28e09c3121d83a68646576a4b6b9f73af801635776e21c9d2d7d7f0dd9bc925d4515fc67f51ee9073dc3ed7a716edba9308065102b5c72d2268799cb154a140bcaef909afa80d0da26a663a374aa1851342e2a6cfb66c3adab7bdb06e59676909c237a8753b1823a06d386e9bf28650b64d1d2dd02f5e6241c81bd6ed4a41f95d38e5b", 0xfd}, {&(0x7f0000000a00)="f5da232bed6bb3245e2a49ea2c7ee5181d1173e624d4cba73bfab39f5a18e5bb207a4b426fa7ed0cef8e7a559739bd449c67776d6d20104d8afaf4e9253067c8de17f76c5cf119b448e9e2c36a2941be347d0191dcf6dff2ee6baa1325a963d686bfad726a57e572c2a1c9e7138c4b42d4c68317e196f458695717f0f83930882a90d0fe3a398f0cdd38117f8c3070c9e219c635853d4d161bfb58b82163b45c5822b8e9a277c88003a1b5bfce0b9585a9dc24127df496a28a633ea5b9296191af84a0d7b4e6a571668e4ef779fb7ebac47fef9a1e6eb48f933b4b2a089a47112c4c776dbdb73b042d9dc7", 0xeb}], 0xa, &(0x7f0000000c40)=[@init={0x18, 0x84, 0x0, {0x2, 0x1, 0x0, 0x3}}, @prinfo={0x18, 0x84, 0x5, {0x20, 0x200000000}}, @init={0x18, 0x84, 0x0, {0x767, 0x0, 0x0, 0xfffffffffffffff8}}, @sndrcv={0x30, 0x84, 0x1, {0x2, 0x5, 0x8000, 0x1, 0x7, 0x1fe0000000000000, 0xfffffffffffff4bb, 0x78d1, r1}}], 0x78, 0x4}, {&(0x7f0000000cc0)=@in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x16}, 0x9}, 0x1c, &(0x7f0000001e80)=[{&(0x7f0000000d00)="373d1158e786cfbccf7953169c9d756a9fcb408dd458424f8b3bfa0ddbbc4f32ac43672e54a7e0813b02dbe8f93d22d86661a9ae3e3fc38af8bc708c53b808d672e62de1f2dbd75acdc12da0e16c81b018b4184f706235440207f08e6eeb289ad4b92329e5663fd428abca8c3daf817e7c64ae59caf77b9773cd6173b3c432a17852bdcae805c664452101ca656aa03ee19e0a6146d9d6e6995b43ba253085ca3adf966495ff243a4eaf0c42352909eb347741a8d336239faf5a3739e60207e59c6db81273935e227584a6edaef5a80cc8a65af94ec2923c2110a0afe90dfc326a3ce5d16b18367a56ef384ff36146", 0xef}, {&(0x7f0000000e00)="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", 0x1000}, {&(0x7f0000001e00)="22329610e550a2a69473dd1d13611ea5b1a284e3dd26a7979a7eb7b52690fb67d93f8573e998c4f248c526806bd0ea17d4b07bd78cf9841abba45496651de4d954ef", 0x42}], 0x3, &(0x7f0000001ec0)=[@dstaddrv6={0x20, 0x84, 0x8, @empty}, @init={0x18, 0x84, 0x0, {0x8000, 0x3, 0x7, 0x6}}, @authinfo={0x18, 0x84, 0x6, {0x28}}, @dstaddrv6={0x20, 0x84, 0x8, @loopback}, @dstaddrv6={0x20, 0x84, 0x8, @mcast2}], 0x90, 0x810}, {&(0x7f0000001f80)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000003080)=[{&(0x7f0000001fc0)="495b28e080c5bba38155f22d7836f6af518f7c6ec419de2dd2b8473b0d2fc6726625a0609b2b4230d602d0ec747da2dcac89c01508111227147d01fa7c25", 0x3e}, {&(0x7f0000002000)="51601dd73d5c2fc99eee3054ca3aa7c5856b63ed702754257bbf75341290a93bd3a94904842b97403a577f4617e0d6775596b155c12ac4f3a178cfb70d65d5aec1287daa50e6c62ed5a805ec0c2135e5a50a41f0e4b4c01f5c6e965c3f088efe574fe83fc5ac7f02f938d4eb254afacf5731d20007af4c8d7bb2104482c99297dc093a28447a3cbc2746d8e20b48a17f64f61fa7ed52952975d665c28d6807326a288f591a0fe00445660336b6edfdf2eaa1845f54a030a58c5ca3715f826f3c976199e10d2f67160d26f5d4b5abe75c81a5e7441fa04b8a17054f23e394040aec8a114468f13f745951295afe94eececf6f1feadd801537e34e70ffff26abdcdd4cff932e80b6934d0cb1af9d0c423014dd0e11d10d5feca4c6fc080ce1e1678806348888e6fdbc16f4a65a108b638abdaf365c89dec4c64d54cda0ffc4cbd2e95a6ef788a9ce84d00937ce712dd5d1c0a5df1e23ffb61b55e55207891e3da611d403813443a2749f4b4947915ca811fe60ae6e0be4de3564c86b8f99511b6ddb4a54abcf756ee344d6543309cc20dd242f04ce59c2ae637c0112f89ea594dfb941cd61c91fe9a60ec6780c5701462546cc46340abd94c4e26b0e9ad035a5b2197b9dec389426a38e252195b925a8efa8684bb1b6bdab3fa206aa0f8f5a007dc29f8ac0980fc149d10a231f157b9a070a542e9cc9868ea021f35da09ef28a51b5c3f6cf4ad0dcc93791d342e0fe90fee5071b05d36fe3b8a0f64cd4c7dc559e59f45dd3cd758fb5ded13e33ffbc3271e3f6cb4e67b6b8b6045102d62182f1892a1e4a629ebab5c6973ac94a43dc705592ff62800aafbd4c86ca865c1337252631de7d1d7b52c8540985391d4230e4c21274c273a889691d34157f5bd83b977bbb4765329aa325198de40f836f70c971038c9f16d593680f5b138e6198df7ae206a2da55b520f1830b81ed1f19d48a39eafa32b1158a3f4514a422b715e6009d742f0b0ce18abf8dfcb65733e5ca04fce4eb7ba49b8521a1569f69a35e4cbd85f8e290902bf379d3857ae9b55731d96474e14677132e38361f37cdb1871dae053099ad48abaa8bd406242a148e9be575f33a224b6f7b766926da0233c44f3a285f7ee928353a85f0de95cb0280af39d74440397d7418ffa6ba2df522c703c61efbf43b3340a62a11082dab006a1050c0f84a0828e2b4f19815073ac871efb84ea191929001c0430a583779236856683a043fef4e2bda3e6d1b058d45fe24976cc947fd4a5aa6458012da6f8fe63bc5552bf1a3ef105e69736d5a850e473b42b2cb728427bfa418381993e1ff8f6eb03b87e6c1fe546b3b46685d89763d567a9c0eed7c66f5b8fede905eecb413bdf8fefe239d16f1c0c024566846f1850137df4738974b1a09696678aad273707f29e1b5fdb1ea53da56f6d49872885bec1193a641431097fcd447fd974325b2ce42f4d177ceb8053f6e6d4015bffb49334efef091275bdf961f048e4770bc596c3fe290ab2fa0e6e07927f689a55a5c812dfb76cf01d18c3561d0b1dd4d0a9d620bd1722a9005bacf464c0566ce4af3f4620684ef1953f8bf7d2829e9491ac701ee9d56bd976500e479e301a40c4100bef5c12f6112bcc3ba8f1c3f59398d0130957a6394956400135c49d214b09112d8c5f073755342a9c52501ad36a5c8ebb890d5b12ef38fd77cf09f029feff537b494e11904033c501dbf44cba17acba722198d11d06124f05fd632f410b9c4efab39b346635538ba16d94d0865ebb6614e723b6ce64e6ddf8219c579060c6a52eb6130848f52660a445d6177c2b78c5ce626fb8ed8f3599ad642e9eb204f580cb26bb624dd83b043c5cc6a239748a4c64e3032e96c35c2e0013875a3f7ebcf0816f238c5213c5b9360b4fea2e03ffd8c36e5a1ddbd461500c56c80077e8ed5284c673b6b20733baf45a34d71307a5ce6d86a5541a63a89ce6f28a3032c1d0e6902294e1b3fe5cca086d45879cda78df13996390268de86d5c361494a347b0090c84e916f9ec8d60a2b2565777d141ba16299be3b7c9d36f79b5e3a08e7ff16b8a307326744bef4501a8749d77cc3584c9fef982109532e168e8ada4a59e779f03f8ee3d40e1bbccb35dfe80d64a0a000b50064a4ea536696238946a78d7433f1a4013eaef10e0e11f8bb32585b069bd80226e916458ea6d1458bc5bf0039f5e3d78234e90a3fe91199b5d247d8d4631504b16adac1f3747003e923d36a88cda6fe2e776b81b850cc4968b020756a5b4f32f8a735760b9035ea56889615689ae99dca8ce320cdde11d50c69184ba341a36a4139b23ad9797b1db2e362302bc49034d65ae668011a1fee73b6eb74e8767ba9e4baf94be0ccad19adcbe11e27040e1e350d08043a6bbc36941227983f19629c99c1bbffa383a550772bcb45c8071003691dad54d096f674c488235202c618a6415deffeaabfd8c9fe89eee4bec41741611efa34c617e9a5abc93483e6e8a985baf17869721ccf287fb1fcbef5b279c6a674daf82dfd2cbc25377d4d565fec827ab36ca180e68b0297bed248513d4f6de440ee1a81dec3918a56673acce117fd6493054a2f2f49e7ccaae3019cc40e4eb7f8cd2ff9ae8b4950f188be20ea1c18399b5eb9ee97d2e50ee2b72ce0bd46b0627c3788dc15d4924ccd4b4ea2c4810f985864d67968b554bef88968a3aff40f21651636ea1c3e4887d67baad5f212c067c0c71c2ae21b576317aed643f08d6de1aadb36a6742c611850ab201cb33af4bf12ca4f193a3029b79c90b56d6765cad804e22f3b53c8489ee85b46a2aee07a59aac4e7dd9f051e18c7b440616cc842f45c9dd5cb4a45ac2177569571affdad7a6486d9ba9bda4aeff6feb08477b0f816299041407d47f48df62f11d996151284e1f1782f24988bf72d1f7d630e03f4b5e1f72b95d000134b6e3a96a19ddc3f06054a4148976d4d6bd4af4eb3bc20a6e038a22107fa6428cfd90e83a19d7a0fb35ce3219690d11590f87ffcf2118f1d56e78c6cc8ff908e18673dbdc7b9bf6d9a79c1c52eae5b5f580ccd8543859c04448163a3c08b016b2706d05ecbb9b4a679fb270aab5a20276b5a4004787bf04038d242806cf72b8407848d1931922385141621e7c6db5e82eaaf6514bb06510580a233982e2b103c92d0e734f710d2a7038b3ebba8b7707b2c0019870a32e3b6d54012c601fc8d79d5043b9db7dc15adfdeea77da27863f37803967e9980cd33ba8368c04477d26e5c168e3dcae6134abad22934c4e5cebf1f593cf718e99a7e303136c10e25995c131b8021447cb44451a4e0a1ea6d9aff9c3952f95ab9de3e5d00391058313d1917a05896375d41da9859a2153dd623e4dacc9704361b6321848d55101ec34df64c0d45d65cdf9409d0c2890d525302274cebaf8ffa1726a4ae889343a3f23fe5b6c0469a665a8200984acc93d20973cd150a076c23da086c9e472b20b836a47119f31960ef94942adb968c30173fdc3a66bfb06dd6784386024b9efefd9b6eab4f36fd07d93d16e95ee579ad00e37fcf341c398be4eb1ff30c19c129d8e7fff851a7abef791df34a779c5d3da81d53f19084da7f8e4449f658d8244ef1ceda7c432424b332d4758d4585d382fb74a0890bedccfba530b0ec4f9c0165878d2e6ca87b9fdea6f863f329f41913611444b224c85ce18d0cbea9a1ee7aabeb301abc76f3cec4a8586659a2e3daf4ac337c2d0f1550dc0de7555803289ae29285cbb0da0add719b4b2de70375058435b64e44246c8ba9e55fd349ebc8ed1ede53664d968782512dd7562da9f8c9dcdb1040abba660ffa57860063383a6bd38e373243a7248da90a9deabbc98268c2b18a4b346999f00c727eb2eb1268025430a7cef5a2a47c772696e6ddffc410cdac58fac6b71dbb418d75415a6bc2883a38024ea6d5047b0444989199ef33246c83f80f6a5392ab236a6a5d2c1db91cc934d4a15b751d9d0c11b1ca5d0d79c0eb295050c52ca938dfb983d9f530781e01ad0bb0335af221c30c77d7b4778d58aa1cf7085b6cc102aa118aaf39333bba1a10ef8e1ab6606513bda3babb97496c1c244f2393bf0d726845768b21dd0aa41e6c7ea1d8449e531bc321320f2a2d5d5ec86044ea091702f65a35ca5e18393714a9ce12615fa58ecf2699a425eecb69d88c79520387e880dc0a0b15b32de309220e182a574c13fc4657986098bddb4fa9aab11b0c0f3f28c4c46dbf6e481e928685fe819842af6f4cec078883ad9b7555a732cf1ae15233778f4d3a94669307b3c0ec3eb187feb8219c0f75d9a537555b44acd064b0dc719edf4c0530e01a54dca22769285e6df39ab8fe9439c3aaea3409110f081b258b73855537cda8ac78bd8698fca0fb29b0121dcf6d37dbaa251ee42ddae550937d06af2c6be3ce38b630911bf05a0217b17cc705d427d69079633864e01f9e90dff35807991394bc975eebffcc66b7e4c0a53cba04d0a7b08d9f920c07acc5109af84b740e81ac2b92e4ebf6cced65a9f5a8efbe28f352314c9829ee813729bb871bdce543451369775508a635c8f756ad29347165b79707d8b5558a463a6c9def0a2eadf164c157bde22e7562f617edb0c40ff254c2e34da3c83dd343a604cd5954acbf50734b9bb954a80e8065a163a3604fe57ae48c306fe2c40098f81796f80fa79d73ae14110be49376ef78883e857b3cc908ceb248dc0666ee5cd3c24e7965196aeaa6a1c5fe1adcd707b1ac979db10a6b333791b9792516815fb3beb66b3d875e2ad8f964e45e2133d3b0e9cb98c29f41c55a17f2a53a29a08543ecae3b1be62532f2e0f35aad37dac0553c3b9df1a42264a68c55a7c1ae3bc4f80ff0c4792815b03449c5b13aab4340629fe7d4a7702229850f04d5aedcf45139af685307329ef85c2f0d4c5c87b70837978ece45be96a1da8f80859ba52b3af5d669bef29fbf9342c23b264433f7628ad8bfb8b32b60bd1b911eb68542735f6c0d19e30bf9d9506dfb1b624d975035a24c929c7fee50e43f3fb47446cdfa11074e223fad6c6599a8c795527efbef58e40b13dc50a80835308964bbb596af83ffb7b1024ae8fb3750ec45cf6205e8869e83329a656ca1ee9842171ba64cacf2e803df0f2dff44ff99ca996c3a115432e6b276d7074dfd38cf104fbf290af198848c5b6a770fa472a5756ccf486293c9e4b0df48f31a7b5ef59cca2764bf47e2db7bc8af2246dcf00d5305122e59aadcbf22c002e148954c8bdf6fe49667862890f51ded84d3dc06f7bec53567cacd4e545060e41b0d07c5ceeca87185c168d7a6c87682274c58a9359626de709a7192f1d9960efaaca3903af34fdab8513ba4289b73b8032739e169472403a27c0f60c51503c1d2ca22cda39f48b38b3b18875f5dd3ae78643195f8a8b60a7dec03c3095dfc4b741ed21d30b0a04aa8084229c581fb1d0afe996df7884646e92af8a59aed6875123c3dbd1b9e8f0e0d35488e8b6bdd864725bd153934fb6bc3b5cc11944ba7405f1379288cc9397c313aaa4d4a7cab857fa4c1ac4de11b33539ffa6a20c312d6a741177225ee52723636be678c322a45625e042100bb9be5043bc6f88e73197ab98d7a1382c6cd2a29b0b85e9a768dfe8a3f736e46efc4cd05c93b36115c8edf8cc598361dea63005e0850103b028b7bcb403ffaa6c14756a85f81be13e26567274ab1ff368b3ee88dac5f69a2e19d0f370f5cd8da00a48a85fb929d430f701a292550bff06e1dd3e097ce480f2e690bf471c27efdb0ec", 0x1000}, {&(0x7f0000003000)="434f1eed2c196d0e050c25792d51afa927f899721beeeb34b114e06cd6e57e9f6bcc028539af496bbbb4fe163fcc895d8a64b3b3d0746fec8caab83600dca55d6aeada", 0x43}], 0x3, &(0x7f0000003200)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x0, 0x1, 0x8001, 0x8001, 0x1, 0x1, 0x4, r2}}, @sndrcv={0x30, 0x84, 0x1, {0x20, 0xfffffffffffffeff, 0x8006, 0x80000000, 0x49f, 0x6, 0x1, 0x4, r3}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}], 0x78, 0x81}], 0x4, 0x20000000) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000003440)={0xffff, 0xff, 0x9, 0x800}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000035c0)={r0, 0x4000000008000001, 0x8, "9368753d3dd7834c25fc231ae24998bd507ab675a33e91b9304a01ea8c18bde4ca48adcd7fc1a72d02a40af8252e3c80d0315c02ff737ee1ddd2916cc4c0ba4a5810557b63fac7f4d17b7cf886fcc1a8bee78a48d898fc559406ee79cbeabfac49c7c84414b66f1985d05f8499f6fec2c2faa3aee259f32719dc17986541e6cb2d1bbc97cd390e34c5249ac8028cd3618382d5436e4705a35c2cfefdefe220595d66eb60adde9b68a0f03157ede7dbe9d1cf53564b162816bc851f66c61cfa97249419626fbecb17ea052d423580214089ba863c4a32e1b7028cedbe2125f6de51b2fbcad1e7622ecb7efc979e17c5efc6e134e54b4b8adefa6f3fb925f8679fecacbacc00000000"}) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f00000034c0)) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000740)={r0, &(0x7f00000000c0)="424d4aed342593c14aa876ea632c864cdd4a04c5ceb57cf3e8", &(0x7f0000003380)="e387265b72b8feb7c425a719ca07cb1e2855aa8667ce25baabc06c6d7379a1bd57bdd2237885f85ba60614173bf8cf1085d475248a74b9c55514016977c16b9205b0cd835548320311c06d02c7eab3740da07d441c337c13b12a38ccb8c673889e1589e63f5299cf49a33cf4d8b826a344ff99a835e2afaef7360fb9388768efe1"}, 0x20) syz_open_dev$dri(&(0x7f0000003480)='/dev/dri/card#\x00', 0x20, 0x2000) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:15 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:15 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x1, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) dup2(r1, r0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x10000, 0x0) setsockopt$rose(r2, 0x104, 0x2, &(0x7f0000000080)=0xfffffffffffffff8, 0x4) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f00000001c0)=""/210, &(0x7f0000000000)=0xd2) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:15 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000200)="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") bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e23, 0x80, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x1}, 0x1c) lstat(&(0x7f0000000000)='./bus\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = getegid() write$FUSE_ATTR(r0, &(0x7f0000000380)={0x19, 0x0, 0x2, {0x8001, 0x10000, 0x0, {0x5, 0xb02d, 0x6, 0x10000, 0x4, 0x81, 0x6, 0x5, 0x0, 0x10000, 0x80, r1, r2, 0x0, 0x4c5}}}, 0x78) write$UHID_CREATE2(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f4cbd5c17bfbe30827bb95e3c36c051c32a7d3e88e19396f18e18596c877423e72b7cb85e0ac1fb6bd0f9ac46b75c74b51e3374e618f2c9f4364b75df9d7ed334bbc64606363d406199b7d6f7bed3ecb44bc4e8bec53b99b3229cca7a70a1ba71b124e008c82536d4e61368240aa662470065f6cf11738078cf8663d5c1e09a56939a028a303c194bd6c85c4e4a017d5d1cb3810ccaaac00"], 0x118) 19:36:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:16 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x4000, 0x0) accept$alg(r0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x202280, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x20, 0x0) ioctl$SIOCAX25GETINFO(r2, 0x89ed, &(0x7f0000000180)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2000, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f00000000c0)=r3, 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) 19:36:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/btrfs-control\x00', 0x2, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x8000, 0x7ffffffd}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) pipe(&(0x7f0000000240)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'U-'}, 0x28, 0x3) close(r0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000280)={0x8000, 0x549, 0x5, 0x10000, 0x3, 0x5, 0x4, 0x4, 0x4, 0x7ff, 0x6, 0xff}) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:16 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x40200, 0x0) 19:36:16 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:16 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x4, 0x6, [0x5, 0x401, 0x3, 0xeb, 0x80000001, 0x3]}, &(0x7f00000000c0)=0x14) setsockopt$inet_sctp6_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f0000000100)={r2, 0xc0}, 0x8) getsockopt$sock_int(r1, 0x1, 0x1d, &(0x7f0000000180), &(0x7f00000001c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000200)={r2, 0x9, 0x6, [0x1, 0x4000000000000, 0x401, 0x6, 0x3, 0x20]}, &(0x7f0000000240)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:16 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x80002, 0x0) ioctl$RTC_WIE_OFF(r0, 0x7010) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:17 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000000)={0xfffffffffffffffb, 0x11, 0x1, r0}) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00', 0xffffffffffffffc8, 0x0, 0xfffffffffffffffd, 0x200}, 0x118) 19:36:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = semget(0x1, 0x7, 0x240) semctl$SEM_STAT(r0, 0x3, 0x12, &(0x7f0000000000)=""/227) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0xd) 19:36:17 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80142, 0x0) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_gettime(0x6, &(0x7f0000000000)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:17 executing program 2: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup2(r0, r0) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000140)) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="0119782d9300"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r2) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:17 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) ioctl$TIOCSWINSZ(r0, 0x5414, &(0x7f0000000000)={0x9, 0x0, 0x51f, 0x40}) 19:36:17 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$net_dm(&(0x7f0000000180)='NET_DM\x00') sendmsg$NET_DM_CMD_START(r0, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r1, 0x100, 0x70bd2b, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4800) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0xd) 19:36:17 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYBLOB="0100000d9cb9c7547bbaf8a815a90f56efd1de1868c24e446d1e3f03d630f6ba2f00e90d3fec09fd6da363a5fb55faf4170ebaa33e48ae18e1639b9af53932a66a538f0900000077ea5bdc60bedda2449b8766948c8a119d665f138d61af58897abc75b55db06c9835184a36d099f0a0527982574a14a8ffd8962fe70c476d221a9aaadf640a0437d1ef35771cfb40ce3912958e24817587071390c3eca65112684bd848e053c38b06206325017e83c6cd7c1db295d5111594f39eb16e24fef2bd5c21776609cb11558b64a8310058"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:18 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x3ffe, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r0, 0x80845663, &(0x7f0000000200)) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:18 executing program 2 (fault-call:7 fault-nth:0): perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:18 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ptmx\x00', 0x40, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, r1, 0x0, 0xf, &(0x7f0000000040)='/dev/sequencer\x00', 0xffffffffffffffff}, 0x30) fcntl$setownex(r1, 0xf, &(0x7f00000000c0)={0x715b0a2e37d4909f, r2}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x101000, 0x0) tee(r0, r0, 0x2f, 0xe) 19:36:18 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB="b66e345d4ef1e7d3db6f3a4dbc876b9d1e831d8c047ebea72845eca4e513ef60a91cd4b1945b37922b6a71b5f9ff00bbecd91a"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x10) readv(r2, &(0x7f00000007c0)=[{&(0x7f0000000280)=""/113, 0x71}, {&(0x7f0000000340)=""/53, 0x35}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000440)=""/63, 0x3f}, {&(0x7f00000004c0)=""/215, 0xd7}, {&(0x7f00000005c0)=""/111, 0x6f}, {&(0x7f0000000640)=""/21, 0x15}, {&(0x7f0000000680)=""/226, 0xe2}, {&(0x7f0000000780)}], 0x9) sendmsg$nl_generic(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000009c0)={0x20, 0x28, 0x5, 0x0, 0x0, {0x3}, [@typed={0xc, 0x3, @u64}]}, 0x20}}, 0x0) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) r4 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000180)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r5 = request_key(&(0x7f00000001c0)='cifs.idmap\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)='\x00', 0xfffffffffffffffe) keyctl$negate(0xd, r4, 0x7f, r5) syz_genetlink_get_family_id$tipc2(0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) [ 3122.640511][ T5818] FAULT_INJECTION: forcing a failure. [ 3122.640511][ T5818] name failslab, interval 1, probability 0, space 0, times 0 19:36:18 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:18 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141040, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)={0xb}) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00', 0xfffffffffffffeb9}, 0x118) [ 3122.845755][ T5818] CPU: 0 PID: 5818 Comm: syz-executor.2 Not tainted 5.1.0-rc1 #28 [ 3122.853652][ T5818] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3122.863714][ T5818] Call Trace: [ 3122.867033][ T5818] dump_stack+0x172/0x1f0 [ 3122.871406][ T5818] should_fail.cold+0xa/0x15 [ 3122.876129][ T5818] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3122.881962][ T5818] ? ___might_sleep+0x163/0x280 [ 3122.886841][ T5818] __should_failslab+0x121/0x190 [ 3122.891802][ T5818] should_failslab+0x9/0x14 [ 3122.896323][ T5818] kmem_cache_alloc_node_trace+0x270/0x720 [ 3122.902185][ T5818] ? mutex_trylock+0x1e0/0x1e0 [ 3122.906969][ T5818] __kmalloc_node+0x3d/0x70 [ 3122.911495][ T5818] kvmalloc_node+0x68/0x100 [ 3122.916023][ T5818] alloc_netdev_mqs+0x98/0xd30 [ 3122.920981][ T5818] ? sl_free_netdev+0x70/0x70 [ 3122.925676][ T5818] slip_open+0x38e/0x1138 [ 3122.930061][ T5818] ? sl_uninit+0x20/0x20 [ 3122.934327][ T5818] ? lock_downgrade+0x880/0x880 [ 3122.939202][ T5818] ? sl_uninit+0x20/0x20 [ 3122.943458][ T5818] tty_ldisc_open.isra.0+0x8b/0xe0 [ 3122.948594][ T5818] tty_set_ldisc+0x2d7/0x690 [ 3122.953203][ T5818] tty_ioctl+0xe69/0x14d0 [ 3122.957546][ T5818] ? tty_register_device+0x40/0x40 [ 3122.962668][ T5818] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3122.968926][ T5818] ? tomoyo_init_request_info+0x105/0x1d0 [ 3122.974772][ T5818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3122.981037][ T5818] ? tomoyo_path_number_perm+0x263/0x520 [ 3122.986686][ T5818] ? find_held_lock+0x35/0x130 [ 3122.991472][ T5818] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 3122.997305][ T5818] ? __fget+0x35a/0x550 [ 3123.001484][ T5818] ? tty_register_device+0x40/0x40 [ 3123.006616][ T5818] do_vfs_ioctl+0xd6e/0x1390 [ 3123.011325][ T5818] ? ioctl_preallocate+0x210/0x210 [ 3123.016453][ T5818] ? smack_file_ioctl+0x196/0x310 [ 3123.021538][ T5818] ? smack_inode_rename+0x2d0/0x2d0 [ 3123.026764][ T5818] ? fput_many+0x12c/0x1a0 [ 3123.031286][ T5818] ? tomoyo_file_ioctl+0x23/0x30 [ 3123.036236][ T5818] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3123.042486][ T5818] ? security_file_ioctl+0x93/0xc0 [ 3123.047651][ T5818] ksys_ioctl+0xab/0xd0 [ 3123.051857][ T5818] __x64_sys_ioctl+0x73/0xb0 [ 3123.056499][ T5818] do_syscall_64+0x103/0x610 [ 3123.061286][ T5818] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3123.067187][ T5818] RIP: 0033:0x458079 [ 3123.071095][ T5818] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:36:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x4b) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000002c0)=ANY=[@ANYRES32, @ANYBLOB="0100000001b531a0ce6b4b736a85aebe01ef204fe33b7ce23c26e73c1444d5dddad8e9388415505791387ba3f9fd9f3a0419339b5e5f84f9a69cb72832fa14139a7df2637d"]) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000440)="11db80a33dff34b7291e9305fcbe9573f5be938ea590c73fb80de9c72fa15f16db9a46e90fb892d8bbe7b0d0ae5658bd453130c65b768a24658930f2c010a56d145e35706a0a5e2fe1e05245e3737a5c3f02f09d54c62086b43358e578c990ad8f2ec62c8aa2e5bcd145ab9392c1e97b1f8d69898d37c9236faa405a3f19dd622e8549d791ff6a2a476420040abe0282cf3059367064e5180493d1ed7a734b4ea430a1a575e576ace7edb0b8bed1d59239d0cca54e850fa9ff31286f23b26bca13541edc7894353b95b4b0e5b2a40a3cbfc6cd37c87c40de24585914c3438254d0d4c20acdc61c1cc8c84a9e65469aa4d50ea03bec12d275") getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) timer_create(0x4, &(0x7f0000000140)={0x0, 0x2d, 0x4}, &(0x7f0000000180)=0x0) timer_getoverrun(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) [ 3123.090794][ T5818] RSP: 002b:00007faafa4bec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3123.099220][ T5818] RAX: ffffffffffffffda RBX: 00007faafa4bec90 RCX: 0000000000458079 [ 3123.107202][ T5818] RDX: 0000000020000100 RSI: 0000000000005423 RDI: 0000000000000003 [ 3123.115190][ T5818] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 3123.123200][ T5818] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faafa4bf6d4 [ 3123.131183][ T5818] R13: 00000000004c22d2 R14: 00000000004d4c70 R15: 0000000000000005 19:36:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readahead(r0, 0x0, 0x8) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:19 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="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"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:19 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x170, r1, 0x800, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x8001}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x10001}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xbd7}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x64}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@rand_addr=0x5}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'nr0\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x6}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@remote}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8}, @IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x4, 0x8}}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2a, 0x10}}]}]}, 0x170}, 0x1, 0x0, 0x0, 0x4001}, 0x4) 19:36:19 executing program 2 (fault-call:7 fault-nth:1): perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80000, 0x20) openat$cgroup_ro(r1, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x40000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1f) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000100)) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000180)) 19:36:19 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc0\x00', 0x8000, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000180)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:19 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:19 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000008000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) 19:36:19 executing program 4: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000080)={0x3}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x37e) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYBLOB="010000000100629a64034a07aa6aeacbdecfe650b5ce876abaed942f9c0c1f00a142656a1ef2e609fa12c878e3185583cbb7ff00"]) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000140), 0x4000) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:19 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffe83, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080), 0x2, 0x1009}}, 0x20) ioctl$DRM_IOCTL_ADD_MAP(r1, 0xc0286415, &(0x7f0000000100)={&(0x7f0000ffe000/0x2000)=nil, 0x4, 0x3, 0x3, &(0x7f0000ffe000/0x2000)=nil, 0x6c05}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) [ 3124.119473][ T6139] FAULT_INJECTION: forcing a failure. [ 3124.119473][ T6139] name failslab, interval 1, probability 0, space 0, times 0 [ 3124.230182][ T6139] CPU: 1 PID: 6139 Comm: syz-executor.2 Not tainted 5.1.0-rc1 #28 [ 3124.238035][ T6139] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3124.248109][ T6139] Call Trace: [ 3124.251417][ T6139] dump_stack+0x172/0x1f0 [ 3124.255775][ T6139] should_fail.cold+0xa/0x15 [ 3124.260390][ T6139] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 3124.266225][ T6139] __should_failslab+0x121/0x190 [ 3124.271224][ T6139] should_failslab+0x9/0x14 [ 3124.275751][ T6139] kmem_cache_alloc_trace+0x4b/0x760 [ 3124.281077][ T6139] __hw_addr_create_ex+0x5e/0x310 [ 3124.286123][ T6139] __hw_addr_add_ex+0x1ef/0x2b0 [ 3124.291000][ T6139] dev_addr_init+0x118/0x200 [ 3124.295607][ T6139] ? dev_mc_flush+0x40/0x40 [ 3124.300127][ T6139] ? __kmalloc_node+0x4e/0x70 [ 3124.304824][ T6139] alloc_netdev_mqs+0x142/0xd30 [ 3124.309693][ T6139] ? sl_free_netdev+0x70/0x70 [ 3124.314389][ T6139] slip_open+0x38e/0x1138 [ 3124.318747][ T6139] ? sl_uninit+0x20/0x20 [ 3124.323000][ T6139] ? lock_downgrade+0x880/0x880 [ 3124.327883][ T6139] ? sl_uninit+0x20/0x20 [ 3124.332144][ T6139] tty_ldisc_open.isra.0+0x8b/0xe0 [ 3124.338804][ T6139] tty_set_ldisc+0x2d7/0x690 [ 3124.343414][ T6139] tty_ioctl+0xe69/0x14d0 [ 3124.347755][ T6139] ? tty_register_device+0x40/0x40 [ 3124.352876][ T6139] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 3124.359141][ T6139] ? tomoyo_init_request_info+0x105/0x1d0 [ 3124.364877][ T6139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3124.371222][ T6139] ? tomoyo_path_number_perm+0x263/0x520 [ 3124.376866][ T6139] ? find_held_lock+0x35/0x130 [ 3124.381653][ T6139] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 3124.387567][ T6139] ? __fget+0x35a/0x550 [ 3124.391740][ T6139] ? tty_register_device+0x40/0x40 [ 3124.396868][ T6139] do_vfs_ioctl+0xd6e/0x1390 [ 3124.401567][ T6139] ? ioctl_preallocate+0x210/0x210 [ 3124.406691][ T6139] ? smack_file_ioctl+0x196/0x310 [ 3124.411729][ T6139] ? smack_inode_rename+0x2d0/0x2d0 [ 3124.416951][ T6139] ? fput_many+0x12c/0x1a0 [ 3124.421384][ T6139] ? tomoyo_file_ioctl+0x23/0x30 [ 3124.426343][ T6139] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3124.432601][ T6139] ? security_file_ioctl+0x93/0xc0 [ 3124.437733][ T6139] ksys_ioctl+0xab/0xd0 [ 3124.441990][ T6139] __x64_sys_ioctl+0x73/0xb0 [ 3124.446611][ T6139] do_syscall_64+0x103/0x610 [ 3124.451223][ T6139] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3124.457123][ T6139] RIP: 0033:0x458079 [ 3124.461024][ T6139] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 19:36:20 executing program 1: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x118) 19:36:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3124.480647][ T6139] RSP: 002b:00007faafa49dc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3124.489077][ T6139] RAX: ffffffffffffffda RBX: 00007faafa49dc90 RCX: 0000000000458079 [ 3124.497065][ T6139] RDX: 0000000020000100 RSI: 0000000000005423 RDI: 0000000000000003 [ 3124.505057][ T6139] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 3124.513044][ T6139] R10: 0000000000000000 R11: 0000000000000246 R12: 00007faafa49e6d4 [ 3124.521019][ T6139] R13: 00000000004c22d2 R14: 00000000004d4c70 R15: 0000000000000005 19:36:20 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) membarrier(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-monitor\x00', 0x101000, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(r1, 0x29, 0xd3, &(0x7f0000000080)={{0xa, 0x4e21, 0x7fffffff, @loopback, 0x1}, {0xa, 0x4e20, 0x5ab, @loopback, 0x9}, 0x4, [0x2, 0x97b, 0x8000, 0x3, 0xffff, 0xfffffffffffffff8, 0x9, 0xf291]}, 0x5c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:20 executing program 1: r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x13e) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000080)={0x4, {{0x2, 0x4e20, @loopback}}}, 0x88) lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="00fbca0008b9dc74289925d0b9e4d372442adadbd8fc0e7a36640b99f07dc4bea47144d25d3fb7c27b122b562d15b9252b68c8d2136c5e8bad10f90dc6dd4c088bb2a602b9debfde8c30797ee15a329e106ab97a2441de4a8a5ade55733d98d65e896f40eede57e348a83e1346d41c0f0923cc4c4a0915513bf8fe3cfd807f0a5b2536a8e8ee950a4677981c927c7b65d306b75b23d196a8f453e4e1cf695cc13e8b3141b1584c71bc87ded7868e12b3be5a50003a2bd8fc7b8368a50b8af5036ce3d18e159cea39bc2c"], 0x1, 0x3) write$UHID_CREATE2(r0, &(0x7f0000000300)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz2\x00\x00\x00\x00\x00\x00\x00\x00\x01\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdd\xff\x00\x00\x00\x00\x00\xe0.=n\b\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\xff\xff\xff\xff\x00\x00\x00 \x00', 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\xb3\x00\x00\x00\x00\x00v\x162\x92\x00\x00\x01\x00', 0xa7, 0x0, 0x0, 0x0, 0xff, 0x0, "cfbd4d4259eb394c7627583f22e104ea2e9fa8e3dd1abe499504f7f55c6663faefc368fe726982b5661968063ab7673bf520848d6503f157e1e956c5f189389766b154699254a10a04e9cf502d5423b6c3751108d8615cb2bf53eea9b272e56afd74ad5f8ec333c718b1e874d25c6a4028c5db874ad1960e767716bfbc0288404be38269fcb7455418f098e60bfd600cb571305c3512075c24580195e2f1211e6cbf78bafd75df"}, 0x1bf) 19:36:20 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:21 executing program 2 (fault-call:7 fault-nth:2): perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:21 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x12, 0x8, 0x4, 0x400000000078}, 0x2c) bpf$MAP_GET_NEXT_KEY(0x3, &(0x7f0000000280)={r1, &(0x7f0000000240), 0x0}, 0x18) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) 19:36:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x4000, 0x0) ioctl$EVIOCGBITSND(r1, 0x80404532, &(0x7f0000000080)=""/81) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x12) 19:36:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:21 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000400)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) r2 = dup(r0) epoll_ctl$EPOLL_CTL_DEL(r2, 0x2, r1) r3 = syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1f, 0x80f, 0x3, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TIPC_NL_NET_SET(r4, &(0x7f00000003c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4804}, 0xc, &(0x7f0000000380)={&(0x7f00000001c0)={0x190, r3, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x68, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x81}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'veth0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x3, @remote, 0x2c9c}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x8}, @TIPC_NLA_NET_ID={0x8, 0x1, 0xdb}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3ff}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1800}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x90c}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb537}]}, @TIPC_NLA_SOCK={0xc, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8}]}, @TIPC_NLA_NET={0x40, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xfffffffffffffffe}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x400}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}, @TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xbc8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2b63}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xb454}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8001}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xfffffffffffffe00}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x10001}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x40000}, 0x40004) 19:36:21 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00']) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$IOC_PR_RESERVE(r0, 0x401070c9, &(0x7f0000000080)={0x5, 0x1f, 0x1}) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000040)=0x1) 19:36:21 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000000000fe00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'bond_slave_1\x00', 0x0}) bind$can_raw(r0, &(0x7f0000000040)={0x1d, r1}, 0x10) 19:36:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x80000000d) 19:36:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="010000001102"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:21 executing program 1: r0 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000240)) socket$key(0xf, 0x3, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_NET_GET(r0, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x1f0, r1, 0x100, 0x70bd27, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0xcc, 0x4, [@TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x114}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x91f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xd2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x80}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x5}]}, @TIPC_NLA_SOCK={0x2c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x7}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_BEARER={0x4c, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x80000001, @empty, 0x401}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x20040000}, 0x4000) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:21 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00>\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:21 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$rds(0x15, 0x5, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000e00)=0xb) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x1, 0x0) sendmsg$kcm(r1, &(0x7f0000000d80)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000080)="d7b9aeb16fb1bca0a41270431bea5934cee4dcfcf9f3d3598d1913ef4bfaa23e4047cffebe71fbf467f36b52dc63e78dbdf4b7477c7b3541556d2f02003f8962d9fba2d6f9634a9dcf5c7c963dbd784f8894c2989fde16416f7a2214f87e0b7ff8510290e1acb960866499830290d723c3b2b88cfa4ad7bec9c7bcf68f89352d601713210dab5a3c", 0x88}, {&(0x7f0000000180)="a9e28f1f4ee3063b4dbe2b9127ada7423df3167f3a3517f6e54fc924caaa9cff48bfb5bc6ac7b7c1dfb0070e37e8c350104712471dd7d4adc5b232e366a420c57fdc138558ed5d802b1c0c6573e0513f00dd99503981b784ffa153f9a895327683e6cb4052ae29620741b3c5c1aa1b4c6d8f4226dec3f7a26cfca311b1788603f39ad44f0622be282aa478e068d725c8a8cdcf33d3031a97a63c7783f8977e078fd41a3dae27b0bfad104f0ded09050e85580ec57851572929d494f5f9eb628d7646d8bc010e0d4fcdd5c19d91559101685ce32ae9f50c57d07cec2c34fa450b6eb2d65f22becf3604b98b5caf91d37357", 0xf1}, {&(0x7f0000000280)="4d2396a96026957c072dc976533961ed5346609c2d532dec0f964391d470ef39dddb413a729046e9f62d4923747dbc41fb1a181d9cc58dfca5e6726ab36b5e8cb8ff285052a7e83467a1e90a828450639af6a5a9d1f1fb9baf2545bb246db61ebae7e30f6d703cae28d44affebc6d28a707a50685292db407dc0d2c12873d42f62ccc7920fcac4552ce3188badc03d13783463d50c617fa80c08c527bcd3d340442ea47a76c1f1d7d61b0a7ca002ecfc", 0xb0}, {&(0x7f0000000340)="b6672f2384b4f1f74468d90ef25c55fda54f3f528d4d26c22b46fd367380b16e400eb934c07c143bd26ddc0f6194babcbfbf7e916241a3c5d51d52b6", 0x3c}, {&(0x7f0000000380)="d10950c44f46b94e0e3557685415a06a8ecdf476b47fc3a3fd2550bb660e6d42dadd25db5cd6d1755dcb7692c2c3c74fe83796909dcabb6c12dace92e83ec2719dd9da51a68758714f5d1bf2883c3a4d1ca8ff497eed820a7ff66c444281506ab7b44b9c7ea7fe2f5ee09a0cba7dc4b109c7b67d4c37b3ec17ef9eb48c0502c12231cd9902635bd01687f201460dc0887036b71cb7a6eb19c01a80de303ff71a8da74216d8fb3eef3328d3c0075beb4de228883e45e64d2dce4503cf582b2da2afcf96822665b7285b0a5a395226", 0xce}, {&(0x7f0000000480)="3b57bb28cb1ae6677a2b341a60a186b804e702051438687330bb882415377754db3cb1cae53803172e6c412c158352e2e764385ffa39666c6da3ec868a1a13657845c84748dd37559e0972a6033c512a3bdd4384a189c9b2837e5e80df5fc56b03b2bad156c23403d3114e4fc4d2d59fb50c572d2f1f4d6e7a37b2bcd233cfc96e55c77ddb829e7cbd10f252abfb0a8321628aa52e7f567ed675edf490a4e61318dbe01986d4c7a5b219fcfa0ec3244e361ae4695ccef67eec5f8eee6ae043fc95c11482f890a5f38b05af434127d8a50dfb44195d8c5d837485de6ae83e1f6ae04e2b4b409d28fab6ad2323a2", 0xed}, {&(0x7f0000000580)="b31a84daf50c92e8f3b3baed131311b21c3fd3314e39022746d12dc4c3a0ce773fce32fba68ceca790ee00647c2d6818c8ceab5831f850f421f0f99c9d499b4d603cbc5ad6eefe2ad4014081714427cc59a8560f361644e30c708fe9def256c9cda7694dfb39d57cbe77176502593af6797b30d1d1c84cf4f880b5d20191ce057abde77a4e6afd0770b021b0e37e8f955e349eb96fd3e5238ccdedc9b5a005d81933a50d372991d3d4266508f21589d77897160a68d27c7ccf91dcfb62d27fc438f338b7eafb32931c44dcbfc25dac5be4c7b8af25c9e1d14d7e48ccb1db7e1cd6e6679cdb69e0030e7d8eec7e8e4481a4567a329b68", 0xf6}, {&(0x7f0000000680)="b8c860ba52f6d4b57dcdd34a70fc0894c368a0e7535a57ad3067bc8de1238287a73fbfefd4364280b641378c1f50891a48173a854b11042e5c85d9e7c04d06276e1e3f5b96bb0f5bdfa7a697212c79c7e1f85487ea2cc4d69f82a2a703bd442ea35a6caf14f3f663dccfbbc65e714e3e46c2b667ede0922088d03567e1a04fa8f292780689113ede7c8144093a3b7db080a4ca0979e5a9412c87cdb351822c73b1dc3733366176fa969398f3d63f52c6795378e3c8067e1ee27bedeb6f7f2fdc46cd69444340c4b5bb1bb7933184fffa2e12bb5b273e8377f3c58e791ffe06a56b94a09297fc62683cf5e7cf73385c08", 0xf0}], 0x8, &(0x7f0000000800)=[{0xf8, 0x111, 0x80000000, "9d1301d039e7881165e32ffba8b1f2e6e2caddac5905a0650eb0969653a81115ae2190bd76640ca29172929ac38a84600fe11595a99f32d0cb0394383ac83212db8eca8c59625ef11f007275e3654544c18c06d8077e7b019b5e872ae844bf1be226ea049aa618e1dfde5a7977ae3aecb0f7e8916e7fc0c61036370d1ef4c886b8206c0b865636642060538477c15389303da8560ea66fa1d90d89d4b33d5a2e5c6da91d4114a4c646e6fe865ebbb27c562eb4324e7b5b02ba1e50a5c9ae37ba4cc35562316b3a91d426882f7726c0ec3da7f4abd0c27e3ab940e58ded7fe0267d7faf00134d"}, {0x88, 0x88, 0x4, "266fb6c61b771e212d5b9606f664bab496c429f5c8f0bb0659be1f17ab9c6cb04cbac47909c34f706089fcfa39647a2d6eb673a6d90e2c84659e02e84e814fdaa531f3fe507fd4116887582b41c08d6b55ad8e29e246851e4fa7b26b3114a3a83521591cb60ae8a6e096757aa4114b7199347955679359"}, {0xc0, 0x0, 0x400, "a58e8becee006f8e1046160659d2bc735837a88142b50247c6786e993d4452a10037a791d2683a927ce62c6b370f5ab09f5ce7b1a5617ffdb8b5306bd469d3f63d66fea42b40689de568a02e6279f6aafa8820e1626f526696ee0b6c282086f992850cca1e4bccb25df7bd9759c70f9430396db259d4bd1836c12a9728bb5dd6fd247a0a8d32d36ee4c82b21657ba39a2093fd4eae809727f12a9fea3bfa075c3d7d6eacb9c28478a09b04970bebdf"}, {0xc8, 0x1, 0x610, "cd95fe2d68e5866234356a08dc92c876c8a04ee04a9c879ee217d173d1c44d131033c5c75dacc944e2c72a0ac24517ae508d8946492229569e93f90bc4c5712256033253631126ae6c34bf83ff4eaf7e02866eefe9406305f0f99192e220aa09a18bb9e19e89ede048b4138106dcffb236cc4f20e16b8d910aefc3873b05f1c992b07bd0e6b77763652ca6fddd84e39e742bef4bf9e14200a4bc0d2047f75fdf4f684f2aee938cf6a0a12980899da30c00"}, {0x10, 0x114, 0x6}, {0xf8, 0x1, 0x7, "f84d3c86481321fbaecba20b7467f15718ca801b658eaf5379b96c6b27e7d3e1d2d24f52e179aab03ab67797f44e22f546cab2a0aed9e64b96aa00d0122b57f829861dac62a6cc414976fad30631adbc7bac17e59aaf5e6223483b00db6f3fc7bd9610b8ffbd03442c0ad7bab2cec5ca89f15374baffe821e82ad9f1b31b00da430bc32ceca50ef38308befed59d8371e9c70aea34dbf1995d86e89c30cedc2ca0e2e790e3d9026118ea0d626a970de0666fc76b34666603ba34720d1356de017079fe229779b0d059fdb5aa0315044aaf4a3b1e0bbcda7c5e1608df58f6b5f39ff1"}, {0x20, 0x19e, 0x3b, "3956a47046010b3d4a458850d9"}, {0xa8, 0x11d, 0x7, "97aa2438ed75a1f96781d27749d0c54d56307fbf91cf18f15e220d998a60ca8bcd5a6f3343e8fc17d1a483041c6ea9eed950be6bcd24b2fef3a1be676bf2678c59bf8a5fbc7a8a5a7f38246a2eed0a9279d092f027e232d10810662140ebe362dd2a0e06ad3d9b6c1e3577a5edc8cc26c76ec12074c16d9989c5de88bf07df03449da67af3354408c92170cc6b9cb1d9ce4d6c"}, {0x88, 0x12d, 0x200, "3d6a8673faab7532dc3720739e5cd43d12390c4efc9070c5004c215da1e0254b93a254c02b73bc941e6fd700064758adc170ea8b3f7c5e7cacc587e1df65a5dcdf558e5d2880370fbcda97aff1f103c34c700683c14cd7aa4c45b44209996569bb666f171fa153761ad9dcc6fe215f2b4a0f0d8a6594"}], 0x560}, 0xc040) 19:36:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000140)="db5f919085cf280fbcfe58f5b851646cd297c751ad59cbc0dab1d64f70638e5402d05eae77b7dd40d0c00b3e69951ed5e27b83e4770d7a200d24fc0b78cac67cb603977cdf1326ae0a2cc239fbcec155c45ef7de99a719b84a6137014dec7e4ae1768225592cc4b68f7e40150533", 0x6e) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000401000700cff7bd43401321094d5851b296b0"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$TIOCSBRK(r1, 0x5427) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(r0, 0x28, 0x0, &(0x7f00000001c0)=0x10001, 0x8) 19:36:21 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) openat$cgroup_type(r0, &(0x7f0000000000)='cgroup.type\x00', 0x2, 0x0) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) write$UHID_CREATE2(r0, &(0x7f0000000200)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz0\x00', 'syz1\x00', 0x230, 0x0, 0x0, 0x0, 0x8, 0x0, "25c50c6791fee4d461484112cddef290df00d0646eb4c7047bdb906ae7b144aa5d0939113b0eb930a4213574627dfed2fdf6ffbf4e6ad924dea28456e0425ec47c97614833ab1919a61934534e0fa9edb6a8ce2fe1f500a7a0587ea8229d720160955ac1fab761465183be7db26b4e8658495da6bf873a1834d3c62f"}, 0x194) 19:36:21 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="b859c589cb01"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x81, 0x8204) bpf$MAP_CREATE(0x0, &(0x7f0000000180)={0x11, 0x8, 0x7, 0xcea, 0x2, r0}, 0x2c) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f00000004c0)=0x0) sched_setscheduler(r2, 0x0, &(0x7f0000000200)=0xdd7d) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$CAPI_NCCI_GETUNIT(r0, 0x80044327, &(0x7f0000000380)=0x7fffffff) close(r1) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000140)={'NETMAP\x00'}, &(0x7f00000001c0)=0x1e) syz_genetlink_get_family_id$tipc2(0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, r3, 0x0, 0x70bd2b, 0x25dfdbfd, {{}, 0x0, 0x4102, 0x0, {0x18, 0x13, @l2={'ib', 0x3a, 'veth1_to_bridge\x00'}}}, [""]}, 0x34}, 0x1, 0x0, 0x0, 0x20040010}, 0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:22 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000053aa0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073cc28b28800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) 19:36:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x80200, 0x0) ioctl$EVIOCSMASK(r1, 0x40104593, &(0x7f00000000c0)={0x13, 0x3d, &(0x7f0000000080)="524debb5c9e0089e81b72955fd8aad8c5b8505d513953620a07b5bec3e73374df522bdb5b1300b87b15e7851e4b629c5c8e20f96d9671d9a07bf58179a"}) 19:36:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x17\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3126.745599][ T6795] Unknown ioctl 1074808211 19:36:22 executing program 1: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000380)='/proc/capi/capi20ncci\x00', 0x107240, 0x0) r1 = syz_open_dev$amidi(&(0x7f00000003c0)='/dev/amidi#\x00', 0x8001, 0xc000) fanotify_mark(r0, 0x21, 0x1020, r1, &(0x7f0000000400)='./bus\x00') arch_prctl$ARCH_GET_CPUID(0x1011) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffff"], 0x118) setsockopt$RDS_GET_MR_FOR_DEST(r2, 0x114, 0x7, &(0x7f00000002c0)={@sco={0x1f, {0x2, 0x7, 0x0, 0x8, 0x5, 0x1}}, {&(0x7f00000001c0)=""/208, 0xd0}, &(0x7f0000000040), 0x50}, 0xa0) 19:36:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB="00000000000027fbe7e6a7050699bdf9a160d54758b1695603802b9e0ee445c8f1d3e89d639daf83e49e3fb2e23e8830c2434fdbe372f92054d7b4b5c8c08beecc29fd8b17582668ccc4b1b764bdb7050cb894b4086f001c7f85d907158661d66f4af91f46d8e39b8f9792f0da725a7c2e0841c93cdaa639608d8aa9d12efad400ed977500"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:22 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="0140fffb0100"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = getuid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000440)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@empty}}, &(0x7f0000000540)=0xe8) getsockname(r0, &(0x7f0000000680)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f0000000700)=0x80) syz_mount_image$vfat(&(0x7f00000000c0)='vfat\x00', &(0x7f0000000240)='./file0\x00', 0x4, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000280)="8dbc68232be659c1a361f8b77229d99d81069c221c1ef0c8aba1f6423ddcb3d9a4d2fc897fd4a175366889a2756929", 0x2f, 0x2}, {&(0x7f00000002c0)="60aec900a8fd48be5361a3c18cff868a17f1a1b77f814187b0c453999b6e215345e545796f7b4b58a95f136bcd48f7f43bac7f504ffce4e531baffd0469a0d50e82c78908d05336cf73e7063b23a368a380f8bb61a87a47715fd32dbe77cf3fa300ad5f67b2196bbb69e44e223f61c3143d1be5eb22d93d19f2d8a78a78b2c96f92598561d7b70506d297e5a429e932493fb7da32c2cda30b0ff95b5780c5c85cbb37d", 0xa3, 0x200}, {&(0x7f0000000380)="03a669bd2c5bdac623eb44f24651eff45568b721d6c0928c214543734f37bead77dde235919610f3ea3b33f3", 0x2c, 0x100000001}], 0x400, &(0x7f0000000580)={[{@shortname_mixed='shortname=mixed'}, {@nonumtail='nnonumtail=1'}, {@shortname_lower='shortname=lower'}, {@shortname_mixed='shortname=mixed'}], [{@appraise='appraise'}, {@fsuuid={'fsuuid', 0x3d, {[0x73, 0x77, 0x7f, 0x37, 0x65, 0x77, 0x61, 0x31], 0x2d, [0x35, 0x37, 0x61, 0x77], 0x2d, [0x33, 0x38, 0x75, 0x32], 0x2d, [0x38, 0x7b, 0x77, 0x77], 0x2d, [0x0, 0x76, 0x35, 0x36, 0x37, 0x7e, 0x65, 0x63]}}}, {@uid_eq={'uid', 0x3d, r2}}, {@smackfshat={'smackfshat', 0x3d, '/dev/ptmx\x00'}}, {@euid_eq={'euid', 0x3d, r3}}, {@smackfsfloor={'smackfsfloor'}}]}) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$VHOST_GET_FEATURES(r0, 0x8008af00, &(0x7f0000000200)) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in6={0xa, 0x4e20, 0x9, @remote, 0x6}, @in6={0xa, 0x4e23, 0x81d, @mcast1, 0x8000}, @in={0x2, 0x4e20, @multicast1}, @in6={0xa, 0x4e20, 0x6, @dev={0xfe, 0x80, [], 0x2b}, 0x2}, @in6={0xa, 0x4e21, 0x3, @mcast1}, @in={0x2, 0x4e22, @loopback}, @in={0x2, 0x4e20, @multicast2}], 0xa0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3126.953146][ T6818] Unknown ioctl 1074808211 19:36:22 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x18\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:22 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0xfffffffffffffffc, 0x0) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/118, 0x76}, {&(0x7f0000000240)=""/128, 0x80}], 0x2) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000000)) r1 = socket$inet(0x2, 0x1, 0x80) ioctl$VIDIOC_G_PARM(r1, 0xc0cc5615, &(0x7f00000002c0)={0x1, @output={0x1000, 0x1, {0x1, 0x80000000}, 0x101, 0x296}}) r2 = dup2(r0, r0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000100)={0x7, 0x4, 0x40}) fcntl$notify(r2, 0x402, 0xd) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000180)=0x0) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000003c0)={[], 0x400, 0x0, 0x3, 0x800, 0x3, r3}) 19:36:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:23 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080"], 0x118) 19:36:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x115) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYBLOB="0100000001004f"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x27, &(0x7f0000000140)={@rand_addr, @empty, 0x0}, &(0x7f0000000180)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000200)={@remote, 0x35, r2}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:23 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000961fe4)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f000095dff8), &(0x7f000095dffc)=0x4) r2 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x9a6c, 0x80140) getresuid(&(0x7f0000000080)=0x0, &(0x7f0000000140), &(0x7f0000000680)) ioctl$TUNSETOWNER(r2, 0x400454cc, r3) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') getsockopt$inet_udp_int(r2, 0x11, 0x67, &(0x7f00000006c0), &(0x7f0000000700)=0x4) setsockopt$inet6_MCAST_MSFILTER(r1, 0x29, 0x30, &(0x7f00000001c0)={0x10000, {{0xa, 0x4e24, 0x2d0, @loopback, 0x8001}}, 0x1, 0x8, [{{0xa, 0x4e20, 0xffffffffffffffc1, @mcast1, 0x10001}}, {{0xa, 0x4e22, 0x0, @remote, 0x800}}, {{0xa, 0x4e22, 0x16, @mcast1, 0x6}}, {{0xa, 0x4e23, 0x3, @remote, 0x8}}, {{0xa, 0x4e20, 0x7, @loopback, 0x8}}, {{0xa, 0x4e23, 0x3, @loopback, 0x5}}, {{0xa, 0x4e21, 0x9, @remote, 0x43}}, {{0xa, 0x4e20, 0x4, @ipv4={[], [], @broadcast}, 0x5}}]}, 0x490) 19:36:23 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) exit(0x2d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:23 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)={r3, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000180)={@mcast1, 0x0}, &(0x7f00000001c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000200)={'team0\x00', r4}) close(r2) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') r5 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/qat_adf_ctl\x00', 0x220c0, 0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$BLKTRACESTOP(r5, 0x1275, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x04\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:23 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000200)={0x9, 0x100000001, 0x7a8e, 'queue0\x00', 0x7}) 19:36:23 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:24 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="018000000102"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x4, 0x181080) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:24 executing program 1: open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) 19:36:24 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="000000000100205361d9f496b0000000b90000000000"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:24 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$P9_RFSYNC(r0, &(0x7f0000000000)={0x7, 0x33, 0x1}, 0x7) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:24 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000300)=0xf) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000240)='/dev/sequencer\x00', 0x3fe, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KVM_GET_EMULATED_CPUID(r1, 0xc008ae09, &(0x7f0000000080)=""/186) 19:36:24 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) write$binfmt_script(r0, &(0x7f0000000240)=ANY=[@ANYRESOCT=r0], 0x17) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) pipe(&(0x7f00000000c0)) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYBLOB="010000000100edaea46b5e9ecb89d8d55123b0f58d0e6a01000000010000006ae1e6b4e597d3f6df3b3deb4833675386da645830d7d2424b8300000000"]) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:24 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:24 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x201, 0x0) ioctl$sock_inet_SIOCSIFADDR(r2, 0x8916, &(0x7f0000000180)={'rose0\x00', {0x2, 0x4e22, @broadcast}}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:25 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$sock_x25_SIOCDELRT(r0, 0x890c, &(0x7f0000000200)={@null=' \x00', 0x7, 'hwsim0\x00'}) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f0000000140)={@dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x7, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={'rose', 0x0}, 0x0, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @default]}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:25 executing program 5: syz_open_dev$rtc(&(0x7f0000000000)='/dev/rtc#\x00', 0x4, 0x10040) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x13, 0x10, 0x3}, 0x2c) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0xb, 0x5, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x10000000}, [@map={0x18, 0x0, 0x1, 0x0, r0}]}, &(0x7f0000000440)='syzkaller\x00', 0x5, 0x401, &(0x7f0000000200)=""/144}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r1, 0x0, 0xe, 0x0, &(0x7f0000000000)="743d7d516f5b0e95d39148531a93", 0x0}, 0x28) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) r4 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x6, 0x200080) ioctl$KVM_CREATE_VCPU(r4, 0xae41, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000240)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r3) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r2, 0x800c6613, &(0x7f0000000080)={0x0, @aes128, 0x2, "0f6da65743823f1a"}) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') futex(&(0x7f0000000140), 0x81, 0x2, &(0x7f00000001c0)={0x77359400}, &(0x7f0000000200)=0x1, 0x0) 19:36:25 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f0000000000)={0x0, @speck128}) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:25 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x2e0) r2 = accept4$tipc(0xffffffffffffff9c, &(0x7f0000000680)=@id, &(0x7f00000006c0)=0x10, 0x80800) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000700), &(0x7f0000000740)=0xc) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000400)={{{@in=@broadcast, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000500)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000540)={0x0, 0x0, 0x0}, &(0x7f0000000580)=0xc) fchown(r1, r3, r4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000005c0)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x40000, 0x0) ioctl$BINDER_GET_NODE_DEBUG_INFO(0xffffffffffffff9c, 0xc018620b, &(0x7f0000000180)={0x0}) r7 = mmap$binder(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1, 0x10, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r5, &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f00000001c0)={'L-', 0x3}, 0x28, 0x1) r8 = mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000000, 0x10, 0xffffffffffffff9c, 0x0) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f00000003c0)={0xb0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="09631040", @ANYRES64=r6, @ANYBLOB="01000000000000000f630c40010000000100000000000000056304400200000005630440020000000d63000009631040", @ANYRES64=r7, @ANYBLOB="010000000000000012634840040000000000000002000000000000000000000011000000000000000000000030000000000000000800000000000000", @ANYPTR=&(0x7f0000000600)=ANY=[@ANYBLOB="0000677adac29cd9", @ANYRES64=r8, @ANYBLOB="0100000000000000852a646600000000", @ANYRES32=r0, @ANYBLOB="0000000002000000000000006f1636fa01781392036a362d301a58511ffc07"], @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB='8\x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0700000000000000066304400300000004630440030000000663044004000000"], 0xab, 0x0, &(0x7f0000000300)="6d40e8c6f01a58587c928f1f68060061eea9faed32e5b6da6cc1d12d03e094840aeb056464ad4b1d0e8519f5a4431588f052604508e5bc3cf774869f49972bf778c8e99fdc913b6841277043eb619d853af74bd8300284ec25e665d78ac225faf32fe7b3a413b936f19f1eeecfe9dc8c076cb2938bf0e5e838d1610c8604625417f0478e2b8f1773feafbdec6eef5bb06f2239fff9be57a129b957ca4ccc27222efe44d709a794ff8fd8f5"}) getsockopt$IPT_SO_GET_ENTRIES(r5, 0x0, 0x41, &(0x7f0000000780)={'mangle\x00', 0xbd, "ab85f2e01b7623b6ac5360e29d3ba221eb6fc0332bd9494a3e0d37b20b4e9ae287d70b66911e971bd16fbd2611b1aac6617bf3aea6defab0b52b694b147a3ebc45107ba94befa683016948e096606122968eac6cf684aa20e04c1c19008c8c4ecec7715f09ebe3c6bff58a4b44d297bc3c93a04f257530322b6c4a95c4118fee9976807ae50f211fc93966c79f6ab4eb305f0631f2e6eb4cbc03a304968b5c1a04886d10e0475d46813f7a7fb112b987d2b74878ade0b65f8b52916a31"}, &(0x7f0000000880)=0xe1) ioctl$TIOCPKT(r5, 0x5420, &(0x7f00000008c0)) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:25 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:25 executing program 1: setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0x80}, 0x28, 0x1) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:25 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="01000000010047a14d14411a11b45c87162e495d9d93fa97b4fd68d833eef91c71442050c9d05cadfe7d82962bebc59c83bdb60aa05999b3191e5c59ed6bd897deaf5bbd3c2fcc9f2c6b854b719f921d499ebe6f7059a49005839a218f4c040e203e02eb2c19443c2e8ad026d86e065e99c4d8f2521f151c5b000000"]) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x2, 0x80) r2 = syz_open_dev$mice(&(0x7f0000000180)='/dev/input/mice\x00', 0x0, 0xc0000) fanotify_mark(r1, 0x44, 0x40000000, r2, &(0x7f00000001c0)='./file0\x00') getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000180)={0xffffffffffffff9c, 0x10, &(0x7f0000000000)={&(0x7f0000000080)=""/184, 0xb8, 0x0}}, 0x10) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000001c0)=r1, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000280)={r2, 0x10, &(0x7f0000000240)={&(0x7f0000000200)=""/36, 0x24, r1}}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) getsockopt$packet_int(r0, 0x107, 0x14, &(0x7f00000002c0), &(0x7f0000000300)=0x4) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={0x0, r0, 0x0, 0xa, &(0x7f00000000c0)='/dev/ptmx\x00', 0xffffffffffffffff}, 0x30) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000180)=0x0) kcmp$KCMP_EPOLL_TFD(0x0, r3, 0x7, r0, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:26 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) ioctl$TIOCMSET(r0, 0x5418, &(0x7f0000000200)=0xfffffffffffffffe) bind$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0x2711}, 0x10) ioctl$TUNSETVNETLE(r0, 0x400454dc, &(0x7f0000000000)) 19:36:26 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00']) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x101, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000080)=@assoc_value={0x0}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e24, @broadcast}}}, 0x84) ioctl$SG_GET_PACK_ID(r2, 0x227c, &(0x7f0000000280)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:26 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDGKBMETA(r0, 0x4b62, &(0x7f0000000000)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/snapshot\x00', 0x200, 0x0) connect$nfc_llcp(r1, &(0x7f0000000180)={0x27, 0x1, 0x1, 0x6, 0x5, 0x7fffffff, "3f3b4e9ac221c9961491e7fe0e6a2e49d174f0278d899fb363dc9459ce2764a4448a599ddde48a65078d763eabe7891cad75fa638facdf4705b9c79b691552", 0xf}, 0x60) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f0000000080)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:26 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f0000000040)={0x8, &(0x7f0000000000)=[{}, {0x0}, {}, {}, {}, {}, {}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000280)={r1, &(0x7f0000000200)=""/117}) 19:36:26 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x17\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:27 executing program 1: r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) flock(r0, 0x4) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) clock_nanosleep(0x4, 0x1, &(0x7f0000000080), &(0x7f00000000c0)) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={r1, 0x28, &(0x7f0000000040)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000240)={r2, 0xc54, 0x8}, 0xc) write$UHID_CREATE2(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000eb00000000000000000000000000000000a3ed445ad3f77dbb000000000000000000000000004ce6d7502325053bff346409d56f5f04c16d1da564e19ff5ad35b105572e42480be9b256a46d5f78fd8a43ccbeac1fd854376df91569a56bab3e002ea021de88863d8ce6f4f97a383203255920aca605d0bb6a8dd19c0618ec1d4d60b691d839c8586e1f766f1ad61da18274813b84aa60f1ff7ba0a5412bfb40528d09021e9e8b567eecaca3f5dadc443fd9abec631b9a94dab55883157b04bb3277670824145dbde5b3833b76129106ac10c19ff52cac7affc86fced3419117b11972e02093de7eb874"], 0x118) 19:36:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x204000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$mouse(&(0x7f0000000140)='/dev/input/mouse#\x00', 0x36e9, 0x80040) ioctl$KVM_SET_PIT2(r1, 0x4070aea0, &(0x7f0000000180)={[{0x6, 0x100, 0x400, 0x3, 0xf4, 0x0, 0x2, 0x9, 0x7ff, 0x100000000, 0x7, 0x800000, 0x6}, {0x3, 0x40, 0x0, 0xfffffffffffffffa, 0x6, 0x8, 0x7, 0x2, 0x8, 0x5, 0x9f, 0x4, 0x6}, {0x7fff, 0x52c, 0x9, 0x7f, 0xffff, 0x336, 0x118d, 0x2, 0x9, 0x80000001, 0x100000001, 0x3, 0x8}], 0x3}) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:27 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x18\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="00000000010020531f398abe4f78bd094d5851b216b0"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0xffffffffffffffff) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x0, 0x0) connect$inet6(r3, &(0x7f0000000080), 0x1c) pipe(&(0x7f0000000640)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000080)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x2, &(0x7f0000000100), 0x28) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0xfa3a, 0x40000) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x8000, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000140)=0x9, 0x4) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$BLKRESETZONE(r2, 0x40101283, &(0x7f0000000280)={0x0, 0x8}) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x4000) perf_event_open(&(0x7f00000001c0)={0x4, 0x70, 0x5, 0x6, 0x8, 0x6a83, 0x0, 0x6, 0x1000, 0xc, 0x3, 0x8000, 0x1000, 0x3, 0x100000000, 0x4, 0x3ff, 0x9, 0x2, 0x7fff, 0x0, 0x8, 0x0, 0x3, 0x1ff, 0x63, 0x2, 0x3, 0x8, 0x7, 0x30e, 0x890, 0x100000001, 0x0, 0x0, 0x9, 0x5, 0xffffffff, 0x0, 0x81, 0x6, @perf_bp={&(0x7f0000000040), 0x6}, 0x10000, 0x8001, 0xdf4, 0x6, 0x9, 0x101, 0x2}, 0x0, 0xd, r0, 0xb) 19:36:27 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000000)={0x0, 0x0, 0x5, [0x6, 0x97d, 0x800, 0x2, 0x1]}, &(0x7f0000000040)=0x12) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000200)={r1, 0x7}, 0x8) 19:36:27 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) ioctl$KDDELIO(r0, 0x4b35, 0x9) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) [ 3131.928771][ T7832] tls_set_device_offload_rx: netdev lo with no TLS offload 19:36:27 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000140)={0x3, {{0x2, 0xff, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x5, [{{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}}, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e20, @remote}}, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e24, @empty}}]}, 0x310) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:27 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:27 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r0, 0xc0305615, &(0x7f0000000000)={0x0, {0xa2, 0x464e}}) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) syz_mount_image$msdos(&(0x7f0000000040)='msdos\x00', &(0x7f0000000200)='./bus\x00', 0x4, 0x7, &(0x7f0000000600)=[{&(0x7f0000000240)="a515b1be6add97971f09d694a4594971bbe703c431981d4e35494e170e8e4d47f2e8f288dfa79db06ebcc21bb98f28b8eaf2c9897f787d50af32b3dd48cb5a67daad", 0x42, 0x7}, {&(0x7f00000002c0)="8a662ab2fc0d8ec0f7567b9b2e2e3114de8d3c21e331c5aa326834a7fc5ce3a494c51cf451ad9096856d18291d84c62b3bd2b74bac9bf0a64ab2c1bcd196978701df62d604cdd434443b909810e95e2d6e632afaa0df131ce8a2bdb827fd27e11b3d579cc8b9a5c2025a0b9dd0c071c24f7fd16bbbb97848ab5bc0bdc3fa7db96e9886381a3235cb13c5ced8631d86c382cccfb5bebbed7c264b16569d4e6d871e6c2705711287e9efd43fb6c8422a3b1b3288695258990db5ee158a4b52", 0xbe, 0x2}, {&(0x7f0000000380)="1b52243c542af181b2fab9a456bc6cf57d6f77f6e637283b6e8dae3a0bbc35b4f22fe6e8962839e4ffcbf2b6c8acce1033951763ef54cc4c3729708887ea4b42e1c40d46589df7e41e194b4611a3b7", 0x4f, 0xa7c}, {&(0x7f0000000400)="dad81aae49a6afb4cdcbc21e868207b2eebcde5d1e8a14c81dab6ca20e9a9e9fbf4ad69cc3b7c74c4131d246f21449da98b6268c36e0c3b170ca0fdd295382e474c6604aa86ad34ccb77378236976d", 0x4f, 0xfa}, {&(0x7f0000000480)="c1cad76018f15153fbe7d4e1857e7b7d596e7457d6bf8533c850fbffaf38528c13565ff244874da29c949890b757a9", 0x2f, 0x696}, {&(0x7f00000004c0)="da8a03073654bf123cc5739f71c1c55b7cdd552c0cdf956a30f5046f2bdcfecc2cfed1e2df243ed266680dd38fd8937ccf13803e7ebf0d180daa91ddf4c190996ace2455d2cfbaa81f323b7121fe92d2c872d92d1ba3062f58ddad09a5", 0x5d, 0x7}, {&(0x7f0000000540)="776f8587d9be04c27b8e7b3d2221dbb6fd000baced0cbd5cf3bd4384242731bdd7f3f7a7b5be4afe2e20b720aa7ef916adb2ccb30f75f5228718ee4ef2feb4e48f122e27ee90c9fc700bb699231c513e32ee517167208a795781b4f852549d6b8b9b99f6fddf6c2933f45125150279144b37a3c64638f0893575177f36b98c2d32196c23a3203513a8561dbbc9305ed6b30527c15891ef8a5571abcf0af8c38b5736bcea113aa0a9", 0xa8, 0x7f}], 0x2, &(0x7f00000006c0)={[{@dots='dots'}, {@dots='dots'}], [{@hash='hash'}, {@dont_measure='dont_measure'}]}) 19:36:28 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB='\v\x00\x00\x00syz\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'], 0xfffffffffffffd18) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000000)={0x7, 0x0, 0x0, 0x81, 0x7f}) connect$bt_l2cap(r0, &(0x7f0000000040)={0x1f, 0x5, {0x1ff, 0x545, 0xaa, 0x0, 0x1f, 0xa3}, 0x400, 0x1}, 0xe) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f0000000200)) 19:36:28 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00`)\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:28 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="015524e75181"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7, 0x800) write$tun(r1, &(0x7f00000001c0)={@val={0x0, 0xcb6d}, @void, @ipv6={0xd3b, 0x6, "aff420", 0x5ae, 0x87, 0x10000, @empty, @initdev={0xfe, 0x88, [], 0x1, 0x0}, {[@dstopts={0x6, 0x2, [], [@enc_lim={0x4, 0x1, 0x5}, @hao={0xc9, 0x10, @loopback}]}, @dstopts={0xef, 0x5, [], [@enc_lim={0x4, 0x1, 0xd15b88e}, @ra={0x5, 0x2, 0x9}, @calipso={0x7, 0x10, {0x101, 0x2, 0xc4, 0x7ff, [0xffffffff]}}, @pad1, @hao={0xc9, 0x10, @rand_addr="221a881b2d8e30fb5cdf37d1025fc6ee"}]}, @hopopts={0x2, 0x50, [], [@calipso={0x7, 0x28, {0x9, 0x8, 0x4, 0x2, [0x3, 0x8000, 0x0, 0x100]}}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @calipso={0x7, 0x40, {0x4, 0xe, 0xe0, 0xe32, [0xbb5, 0xff, 0xff, 0x50c, 0x3, 0x8, 0xb7c2]}}, @ra={0x5, 0x2, 0x1ff}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, @generic={0x3, 0xdf, "e8a71ca2daaa9249d2b46c1721d530c18248c6dcc1910a5916402f1ecebbc2b5864f8c9875fc87a7badf418da815039f53d0f1f7540de4cee11de68a610499f782025445a27b4909c28ff580b24ab78d1b785f19c90794cab9757c3e0b99efd3ad8ec415b01c12089c0575be240253c438c4b13af3980000dc8fc466f80be81329eb04b80165c0e051c25585b68f0289f7132bdc1ee209dfa1fece92757b6cc90c90a852f0988d3fc71b4dc8fd44024b8b57a38beae7b447a18ef60cb67d88e433217d9db39e9c340588d695135995224e9e259336d967174d583e6e1f07fb"}, @generic={0x0, 0xc7, "6c3335cfe0564bfe15b9217500eb19d157716a001f4d9a84cfb6aee98525ef4ef0c35287c85af6d026e1ab393b1291607e4b46aa6bd877434bcbcac53584bad9fe48be72c716383a8d82fe98103d7d19ef05967484546432643482ddae2345c523c495f99a516a545c8b388ea6619074f9619d83070b422477c03b858122b2469a2262e0885ccf8677994c5c82e5239b7bb6183ad72129b4c224bf1f92f17261b42657eb554d5709477732f5fd4c6e709f6a9b5912490e0560a01056a3a413ce27f41e8de3615c"}, @calipso={0x7, 0x38, {0x6, 0xc, 0x1, 0xeb4b, [0x5, 0x3ff, 0x1, 0x3, 0x2, 0x5]}}, @hao={0xc9, 0x10, @local}, @ra={0x5, 0x2, 0x8}]}], @gre={{0x0, 0x0, 0x1, 0x5, 0x0, 0xbef, 0x0, 0x1, 0x880b, 0xdf, 0x0, [0x1], "70ab6102b331c7304f7c543f02e42f09e16ea37130208fcbedbf7d9421a692e34734b5122ecc5914be14c5b7e3dc7dc85d116b03cb831d7543a80b4df3add60eaf9cc7d94b082d2198e608e33dbd46822541488cd27a8fcf0fa74f15d05b7928183445325530800b23becc15099b29e072e5fa09026143b4bc9fb16291fe5617913cfee8d8f5f8e2ab4335955ac880362c5316f5b117e6ff563095433e76b652f100c97a873a9fc7b87a61f991dac593c5927c18706f6daca898e06a9bcbeefa4cb846ed593bf783ef47e650eea7f1fea396562679ad84166a77455ce55699"}, {0x8001, 0x0, 0x1, 0x4, 0x0, 0x0, 0x800, [], "5d8b4ebc6a5ba3b883158d127de02785680616d401a48d3996ad4d0d72f6d8d7e1bc37b9a63e1cafe5961ee3350f9aad92c6a2c4eecdd42e6721c5066ab6baeb7969825337c202337cd5621df552fc85c32545223ac6d0e4e177dedb2d49f9d52469be3dda3621ff780a5009028a58ca52dcf03111f86addc0d2f9d6dd2a51494ef9df7e6e67c2e08a6e057780e2126d2b3eafc03e861b1cb3045e242aa83790a5133a96f8167211d1b1d9aa1aae2cb29b61d6f4a4d45cac231bc58ede8fe00bae7c395720"}, {0x7, 0x0, 0x6, 0x9, 0x0, 0x0, 0x86dd, [0x1, 0x4], "f2f79a7572e605a3703e5e92fea66021280fd1a5c1c85676b86b1fe6ca91ce31b133aea3dd6eb9bf8bbe76c110f82ba651096a4625fe9ca5600f6f72df77341af5df3d0c1ec89b3b1a6981cd83e22636da6f46aaf54384a94924a99318b2b70e84c01d0e4d3534f113fa9b832ae38c9b90a012bc4322a801d90d3b381e9085b0cf004e3a8f067f98bfdacf3e6bd39c0cb6c0296981866b726ea167717bcd4953ed32943939f64e2051a1c3589d3d671b7d700e987e030c0e4ac87c80f54f26e853"}, {0x8, 0x88be, 0x0, {{0x3ff, 0x1, 0x3, 0x5, 0x1, 0x0, 0x9, 0x6}, 0x1, 0x1000}}, {0x8, 0x22eb, 0x2, {{0x100, 0x2, 0x8, 0x9, 0x10000, 0x4b, 0x100000001}, 0x2, 0xfff, 0x7, 0x6, 0x2, 0x6, 0x2, 0x9, 0x5, 0x3f}}, {0x8, 0x6558, 0x3, "0ac0e1d0e5e4da8ac564b5f47712ed7115693315decc6d"}}}}}, 0x5da) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000080)={0x2, 0x0, 0x10001, 0x2}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000007c0), &(0x7f0000000800)=0x4) ioctl$DRM_IOCTL_AGP_ALLOC(r1, 0xc0206434, &(0x7f0000000140)={0xfffffffffffffff8, r2, 0x2, 0x6}) 19:36:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xfe, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYBLOB="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"]) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180)='/dev/hwrng\x00', 0x0, 0x0) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockname$inet6(r1, &(0x7f0000000340), &(0x7f00000000c0)=0x1c) ioctl$DRM_IOCTL_WAIT_VBLANK(r1, 0xc018643a, &(0x7f0000000040)={0x8000001, 0x40, 0x26}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x8000, 0x4) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="00000000010040531e3d8add4f78bd094d5851b296b0"]) ioctl$KDGETLED(r0, 0x4b31, &(0x7f0000000200)) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) connect$nfc_llcp(r0, &(0x7f0000000180)={0x27, 0x1, 0x1, 0x1, 0x7ff, 0x9, "ee4e2ff9c74df82b0984eaf3713e18015e57b7abbc5ff6ceb83145f9c33ba9040c6264a056bd4f0d07c4a9502ebef8b8b7083ae6278dd5f34bc7394ba1632d", 0x25}, 0x60) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000140)={0x9, 0xfff}) 19:36:28 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffff9c, &(0x7f0000000400)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)=""/223, 0xdf}, {&(0x7f0000000280)=""/130, 0x82}, {&(0x7f0000000000)=""/36, 0x24}], 0x3, &(0x7f0000000340)=""/148, 0x94}, 0x41) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000540)={0x75f6, 0x8002, 0x2, 0x100, 0x0}, &(0x7f0000000580)=0x10) ioctl$sock_proto_private(r1, 0x89e3, &(0x7f00000005c0)="5348aec2526466f5e794bac1c757643efc7de60c19cac84adb5a024e9e33720f6c1ee00c48491ae4cfdc1e8df3990971e2767956a97418be50f67744199793e8837014329b21b68a7dad68b0d20cd022ea83e9dc85960cd47911c31c800cce512f36ae7c13a7243ef5f7eea20fa9c34e2279e6a2803949316a1e3c8e5254ade3c739f1504f0711f9eb603def7b8a067fa2bf1c5d35ca0488b8abbfe9fd97adf8803397f88bf3b277ab2322c43b0673c5d5d8c17cf8ed2f36e4e405208d01cf5ae6051f175bf965") getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000440)={r2, 0x2, 0x5, 0xb5}, &(0x7f0000000480)=0xc) r4 = creat(&(0x7f00000006c0)='./file0\x00', 0x0) r5 = syz_open_dev$vbi(&(0x7f0000000740)='/dev/vbi#\x00', 0x1, 0x2) linkat(r4, &(0x7f0000000700)='./file0\x00', r5, &(0x7f0000000780)='./file0\x00', 0x1000) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000004c0)={r3}, &(0x7f0000000500)=0x8) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:28 executing program 1: prctl$PR_SET_UNALIGN(0x6, 0x2) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x84, r1, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0x14, 0x4, [0x0, 0x6, 0x3ff, 0x1]}, @SEG6_ATTR_ALGID={0x8, 0x6, 0x10001}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x1}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x6}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x9}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x2b8}, @SEG6_ATTR_DST={0x14, 0x1, @ipv4={[], [], @remote}}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x7, 0x100000001, 0x3]}]}, 0x84}, 0x1, 0x0, 0x0, 0x4000}, 0x20008000) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000000)) ioctl$LOOP_SET_FD(r0, 0x4c00, r0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0xfffffffffffffea5) ioctl$KVM_GET_TSC_KHZ(r0, 0xaea3) 19:36:28 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xa8*\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:29 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000140)={0x6, 0x1, 0x2, 0x9, 0x16, 0x401, 0x3, 0x80, 0x6, 0x9}) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:29 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) r1 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x101, 0x101000) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f00000001c0)={0x0, @in6={{0xa, 0x4e20, 0x4, @rand_addr="4a817f5dd804af029298a8cd7ec6ce57", 0x3}}}, &(0x7f0000000080)=0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000140)={r2, 0x8, 0xfff}, &(0x7f0000000280)=0x8) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:29 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x80000) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000040)=ANY=[@ANYBLOB="050000000000000000000040050000a90000000000fa000000000040000300000100000000002560b700fff0ffff04040000000000000a000000060000"]) ioctl$KVM_SET_MSRS(r4, 0x4008ae89, &(0x7f0000000000)={0x1, 0x0, [{0x38d}]}) bind$rds(r1, &(0x7f0000000080)={0x2, 0x4e22, @local}, 0x10) 19:36:29 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00>\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:29 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) fstat(r2, &(0x7f0000000140)) 19:36:29 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:29 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) getsockopt$bt_sco_SCO_CONNINFO(r0, 0x11, 0x2, &(0x7f0000000040)=""/18, &(0x7f0000000200)=0x12) fcntl$getownex(r0, 0x10, &(0x7f0000000000)) 19:36:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00']) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYBLOB="1200070001001374145c78561152acb273b05141c6345862bc5e18692332a1"]) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x2000, 0x0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_SET_LINK_PRI(r2, &(0x7f0000000280)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000080}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x68, r3, 0x0, 0x70bd26, 0x25dfdbfc, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0x10000, @link='syz0\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4008800}, 0x4) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') r4 = add_key$user(&(0x7f00000002c0)='user\x00', &(0x7f0000000300)={'syz', 0x1}, &(0x7f0000000340)="974912f0bb7e493a8d4faa6189365a1e68febea9344080972d5c", 0x1a, 0xfffffffffffffffc) keyctl$invalidate(0x15, r4) 19:36:30 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/btrfs-control\x00', 0x80000, 0x0) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r1, 0x10f, 0x84, &(0x7f0000000080), &(0x7f00000000c0)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000100)={0x4, 0x4, 0x4000000000000, 0x7f, '\x00', 0x5}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:30 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b004000000000000000000000000000026000000000000000000000000000000000000000acc6422b8da121226c3844a7c435763c530dea854ecb31aaa709cb4737f0cd89bf29cf81b21"], 0x13e) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f0000000340)={&(0x7f0000000280)=ANY=[@ANYBLOB="a4080000", @ANYRES16=r1, @ANYBLOB="000425bd7000ffdbdf251000000008000400020000001c00010008000600777272000800060072720000080005000400000008000600008000005c0003000800050000000002080007004e2100000800080002000000080008005200000014000600000000000000000000000000000000000800030004000000080007004e200000140006009bff138ebea42c68dbadad05ae5ca4550800050004000000"], 0xa4}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) ioctl$SIOCAX25ADDFWD(r0, 0x89ea, &(0x7f0000000000)={@null, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}}) setsockopt$inet_sctp6_SCTP_NODELAY(r0, 0x84, 0x3, &(0x7f0000000040)=0x38a, 0x4) 19:36:30 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r2 = getpgid(0x0) r3 = getpgid(r2) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x5a, 0xffff, 0x4, 0x7fffffff, 0x0, 0x5, 0x9c00, 0x1, 0x7, 0x9b4, 0x0, 0x4, 0x2, 0x5, 0xfff, 0xfffffffffffffff9, 0x4, 0xfab2, 0x0, 0x7, 0x9, 0x0, 0x8, 0x7fffffff, 0x8, 0x9, 0x6370, 0x45b4, 0x10001, 0x6, 0x8, 0x0, 0x0, 0xffffffffffffffce, 0x0, 0x81, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000140), 0x7}, 0x4, 0xed87, 0x8001, 0x0, 0x337d, 0xfffffffffffff801, 0x3}, r3, 0x6, r0, 0x1) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:30 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)`\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:30 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x200000, 0x0) ioctl$VIDIOC_G_FREQUENCY(r0, 0xc02c5638, &(0x7f0000000040)={0x8, 0x0, 0x6}) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000080)={0x1, 0x1, [@empty]}) open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) 19:36:30 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) arch_prctl$ARCH_MAP_VDSO_64(0x2003, 0x1f) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:30 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4800) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000080)={0x0}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r1, 0x4010641c, &(0x7f0000000140)={r2, &(0x7f00000001c0)=""/249}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:30 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000180)='/dev/snd/pcmC#D#c\x00', 0x9, 0x101000) ioctl$PERF_EVENT_IOC_ID(r1, 0x80082407, &(0x7f00000001c0)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x40) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffff9c, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x2, 0x5}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000100)={r3, 0x3}, 0x8) 19:36:31 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f0000000000)={'irlan0\x00', 0xfffffffffffeffff}) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r0, &(0x7f0000000540)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000500)={&(0x7f0000000300)={0x1f4, r1, 0x0, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xfffffffffffffffa}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x280000}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0x1c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}]}, @TIPC_NLA_BEARER={0x118, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffffffffffffb}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @rand_addr=0x80000000}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x9, @mcast1, 0x7}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7fff}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @broadcast}}, {0x14, 0x2, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x12}}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x81}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}, @TIPC_NLA_MON={0x3c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1000}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xda}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x41}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7e2}]}]}, 0x1f4}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, &(0x7f0000000200), &(0x7f0000000040)=0x68) 19:36:31 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x80\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:31 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0xf2) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x2, 0xffffffffffffffc1, 0xab61, 0x9}, {0x4000000000000000, 0x401, 0x5, 0x1}, {0x4, 0x6a, 0x4, 0x100000000}]}, 0x10) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:31 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*\xa8\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:31 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r0, 0xc008551a, &(0x7f0000000000)={0x7, 0x8, [0xfe7, 0x6]}) 19:36:31 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/ubi_ctrl\x00', 0x40, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000600)='/dev/sequencer\x00', 0x101000, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r2, 0x400442c8, &(0x7f0000000540)=ANY=[@ANYRESDEC=r0, @ANYRESOCT=0x0]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) 19:36:31 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x410042, 0x0) write$P9_RLOPEN(r2, &(0x7f00000001c0)={0x18, 0xd, 0x1, {{0x0, 0x1}, 0x3ff}}, 0x18) syz_genetlink_get_family_id$tipc2(0x0) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0xffffffffffffffd5, 0x22080) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r3) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') setsockopt$llc_int(r3, 0x10c, 0x7, &(0x7f0000000080)=0x5, 0x4) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000200)={'security\x00', 0x3, [{}, {}, {}]}, 0x58) 19:36:31 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:32 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000180)=ANY=[@ANYRES32=r2, @ANYBLOB="00000000010020531e3d8add4f78bd094d5851b296b024d9a6008c6142a1b6ba616db7d15b921a0a82a85bc118a3c43054329e254a8bc0b56af8a10984c9e26e7a556c62900662537003c45791e09dd3644c2f337e52d821c2021b0b0c098430b147962eb634275e8fb1aed0e373b538380358f33f10a4f535ae0318b0f71e3f0ceb69934ab4"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:32 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='attr/prev\x00') ioctl$CAPI_GET_MANUFACTURER(r2, 0xc0044306, &(0x7f0000000080)=0x8000) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0xf3b) ioctl$FIBMAP(r2, 0x1, &(0x7f00000000c0)=0x81) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:32 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000200)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xdf\xff\xff\xff\x00', 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, "64c69470572c38f58b6490976275c33cab82bb34fa0ba4d5cfb1d8ccecfeaf26d0e366015873ecf2d24ea1f2d416336c793f2873fe06da9e4b7731cf7b567f95f34738e7ea902a8b0e098b87187fbe2b9d5edf9a90f690a6b0b147188264542b2606ab2df4c0919fcc000000000000000000000000000000"}, 0x190) 19:36:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x40, 0x0) lsetxattr$security_evm(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='security.evm\x00', &(0x7f00000002c0)=@md5={0x1, "6410c99c7295896d9a0c43f268497895"}, 0x11, 0x3) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x1, @local, 0x93}, {0xa, 0x4e20, 0x58, @remote, 0x7}, r1}}, 0x48) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB="010000000100071c83fe155fcdbaed052a86c9bf40decb4e5fc939b6084335210000a864"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:32 executing program 5: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x40, 0x0) getsockopt$inet_dccp_int(r0, 0x21, 0x5, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) 19:36:32 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$KVM_GET_NESTED_STATE(r1, 0xc080aebe, &(0x7f00000001c0)={0x0, 0x0, 0x2080}) 19:36:32 executing program 1: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) ptrace$setregset(0x4205, r0, 0x203, &(0x7f0000000040)={&(0x7f0000000200)="dea8b68e8339bbc8a7bdb8ffbb5977e4cda573d0529a322816a2ddcabd8dde34d1876b6f9dbaa0594bbea513c0f60a679f5eb2d53487adccd9b433ef77d3bd5a8fa206a514d7711198a0dda38816fd7ecc808274867bb74527ded13e8d5ee1b51e7fcd0b57c3943c0091076ea38080aa74a1d7a4da26fe600c6c347d5c1fa2c1f3bc9177fa3323fa2d05083147179bf8894f1b936d9ab3cc4147e7097469fec928472e75f0335bd5caca453c212374b197bd57658c17cd7a5cd6d071ed6a3e7fd84c977e671765ee65a8cb38ca76bb322af28574646d6b24aceeba3fa0074e0b8c8269d2ec", 0xe5}) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:32 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0xa002, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000001c0)={r1, &(0x7f0000000180)="e53f6a8a70e7a910fa361ab2ca8a7a0ee37c0b310ed49fa825cefd56b09832da8863ac6daba8cdfbd8"}, 0x10) 19:36:33 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000080)) r1 = syz_open_dev$mice(&(0x7f00000001c0)='/dev/input/mice\x00', 0x0, 0x101002) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000580)={{0xa, 0x4e23, 0x3, @mcast2, 0x8}, {0xa, 0x4e22, 0x3f, @empty, 0x7}, 0x9, [0x0, 0x1, 0x5a4, 0xffffffff, 0xffffffffffff5dc1, 0x5, 0x3, 0x1]}, 0x5c) getsockopt$inet6_tcp_int(r1, 0x6, 0x1d, &(0x7f0000000500), &(0x7f0000000540)=0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0x8) ioctl$BLKBSZGET(r1, 0x80081270, &(0x7f0000000200)) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000000)) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x101000, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r2, 0xc058534f, &(0x7f0000000100)={{0x8, 0x200}, 0x0, 0xbee6, 0x2, {0x1000, 0x5}, 0x3, 0x8}) write$binfmt_aout(r0, &(0x7f0000000240)={{0x1cf, 0x3, 0x80000000, 0x391, 0x67, 0x3, 0xf3, 0x3}, "b201449588b7c19d54b32a1a2215179ab479f79a99e76b7e76f49dea81ab8650f8250f5ae9ee8748471c405722dfcd0c6f7310d228a40ea97dd653afd1ac9403ba6dc37dbc67c015ff7e24a4eb924c8838b64a7e8a9a00bc85adce9c05df0ce7e6f2e12e4c8d422c611f861d8b", [[], []]}, 0x28d) 19:36:33 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) ioctl$KVM_ASSIGN_PCI_DEVICE(r0, 0x8040ae69, &(0x7f0000000140)={0xca6, 0xfff, 0x0, 0x0, 0x100000001}) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:33 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00h7\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:33 executing program 1: r0 = openat$vimc2(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video2\x00', 0x2, 0x0) ioctl$VIDIOC_G_SELECTION(r0, 0xc040565e, &(0x7f0000000040)={0xc, 0x4000000000102, 0x2, {0xb1b, 0x7c4, 0xa9, 0x100000000}}) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000200), 0x4) 19:36:34 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00X:\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:34 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r0, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:34 executing program 1: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r0, 0x4c09, 0x2) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:34 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f00000000c0)=""/186) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8000, 0x0) setsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000180)=0x3f, 0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xa) 19:36:34 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:34 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r0, 0x40086432, &(0x7f00000002c0)=0x6) syncfs(r0) write$UHID_CREATE2(r0, &(0x7f0000000300)=ANY=[@ANYPTR64=&(0x7f0000000440)=ANY=[@ANYBLOB="e383cbe012c18274202fa66ba11045eee274f83ef6fa1eb98a875bab13ae4aaf669af732569b24699cf6945c3867d6cd7e794a2b6db9439d9020afa6426e32a5a6a626f57aae2e22aff11c7c3d116a462a4ff01ceeed60d7e79490c4843fae31", @ANYRESHEX=r0, @ANYRESHEX=r0, @ANYRESOCT=r0]], 0x1) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', &(0x7f0000000240)={0x0, 0xfb, 0x7c, 0x5, 0x6, "f3383f8d82e7a4dfa9aba2622d343def", "5b85f741d0d040d84b388950b5b931807c3de3395201f4fde5b79346b660403adf5b33f97ade0cf27cbd693bb5fdfe712e16dae3006f67c5973ef9ea1d1fd02921d9fd7220aa3b2e3ab9a8c8d09d1132be9fb7fa08b91e8c608dff984b298c87a81380d168bba2"}, 0x7c, 0x1) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x401, 0xfffffffffffffffd, 0x3, 0xd5a, 0x18, 0x1ff, 0x3, 0x7, 0x5, 0x7}) 19:36:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcs\x00', 0x1664e174d3a30b0, 0x0) ioctl$PPPIOCDISCONN(r1, 0x7439) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x7, 0x80000) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x8040ae9f, &(0x7f0000000080)) 19:36:35 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x101000, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:35 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x1d\x9a\x02\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:35 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x403ffc, 0x2) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000001e000000000000b9ad060220e5366900000000000000000000000000001c0000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000f16d0300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) 19:36:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/btrfs-control\x00', 0x8606, 0x0) ioctl$VIDIOC_S_PARM(r1, 0xc0cc5616, &(0x7f0000000180)={0x1, @capture={0x1000, 0x1, {0x40ac, 0x8}, 0x7ff}}) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:35 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:35 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x801008000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x15) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x0, 0x200080) ioctl$VIDIOC_ENUM_FREQ_BANDS(r0, 0xc0405665, &(0x7f00000000c0)={0x3, 0x1, 0x872, 0x0, 0x1ff, 0xff, 0x6}) 19:36:36 executing program 1: pipe2$9p(&(0x7f0000000040), 0x2000000180000) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x1, 0x420400) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r3, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(r0, 0x4, 0x1e, r2, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:36 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0xffffffffffffffb9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7f, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x82, 0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000100)={0x2002}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x10000200, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x5) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000280)=ANY=[@ANYRES32, @ANYBLOB="01000000010008469b2a01a99c8ae04c0d3bd5d17d390d6380a6522e81be9b3bcf41dc77b897bb32e4b54407543b899e519ad035918290e0c7ffe8ec1b2cd609c893115b042fadc448a68bd80200000000000000122f0b75fe0255cc2b2212cc187b1c703e33501fd4fc8ea4ac59c063c22069c9de2b9ebd02578cc6c0663546bfa79c457f58e002c050564f02fc1a671f04722b0569c2226ff8e5631e7df1d7b82e0c04f07c35699cb20fbbea2aeb50e45d529ab55d8b5482af9b02479b15393fec7c4955893b550f5204e6"]) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r2) socket$nl_netfilter(0x10, 0x3, 0xc) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:36 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr$security_smack_transmute(r0, &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x3) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x7ff, 0x14000) ioctl$TUNSETQUEUE(r2, 0x400454d9, &(0x7f0000000180)={'team_slave_0\x00', 0x600}) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:36 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x101fc, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x200, 0x0) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x4100, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'rose0\x00', 0x3000}) epoll_wait(r2, &(0x7f0000000100)=[{}, {}, {}, {}], 0x4, 0xfff) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$VIDIOC_SUBDEV_S_FMT(r1, 0xc0585605, &(0x7f0000000280)={0x1, 0x0, {0x7fff, 0x3, 0x301f, 0x8, 0x6, 0x3, 0x3}}) ioctl$KVM_ENABLE_CAP(r2, 0x4068aea3, &(0x7f0000000200)={0x74, 0x0, [0x9, 0x6, 0x800, 0x7]}) ioctl$VIDIOC_G_OUTPUT(r1, 0x8004562e, &(0x7f00000001c0)) 19:36:36 executing program 1: write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:37 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe8\xd8\x14\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:37 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x66eb, 0x50000) write$sndseq(r1, &(0x7f00000001c0), 0x0) connect$rxrpc(r1, &(0x7f0000000080)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e24, 0x2, @ipv4={[], [], @multicast1}, 0x3}}, 0x24) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FIBMAP(r2, 0x1, &(0x7f0000000100)=0x4) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) write$P9_RWRITE(r1, &(0x7f00000000c0)={0xb, 0x77, 0x1, 0xe6c}, 0xb) 19:36:37 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="01000000212400"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x2100000400000002, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x5}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@dev, 0x0, 0x2b}, 0x0, @in6=@initdev}}, 0xe8) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000080)=0x0) ptrace$peek(0x1, r2, &(0x7f0000000140)) r3 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x8, 0x1) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000240)=r4) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:37 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) 19:36:37 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="00000000010020531e96b00000000000000000000000"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000300)='/dev/dsp#\x00', 0xffffffff00000001, 0x8800) ioctl$KDSKBLED(r0, 0x4b65, 0xf0a) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000140)='/dev/autofs\x00', 0x301080, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f00000002c0), 0x4) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:37 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_MEASURE_VERITY(r0, 0xc0046686, &(0x7f0000000000)={0x3, 0x2e, "161df7425992b571eefddb58ca650d4b795960ce1eebaccdf64edd5807c79ad2f7a1e3d6d612cbe7f83f8bb91475"}) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:38 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x80, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_rdma(&(0x7f0000000040)='127.0.0.1\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x2000000, &(0x7f0000000200)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@timeout={'timeout', 0x3d, 0xaf25}}, {@timeout={'timeout', 0x3d, 0x35b}}, {@timeout={'timeout', 0x3d, 0xfffffffffffeffff}}, {@timeout={'timeout', 0x3d, 0x1}}], [{@context={'context', 0x3d, 'system_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '/dev/ptmx\x00'}}, {@fsuuid={'fsuuid', 0x3d, {[0x35, 0x63, 0x7f, 0x30, 0x3f, 0x61, 0x77, 0x3d], 0x2d, [0x67, 0x77, 0x0, 0x7e], 0x2d, [0x39, 0x31, 0x65, 0x30], 0x2d, [0x73, 0x77, 0x77, 0x35], 0x2d, [0x8f8aabe87f983fc0, 0x31, 0x32, 0x63, 0x7b, 0x65, 0x7d, 0x76]}}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@uid_gt={'uid>', r2}}]}}) sigaltstack(&(0x7f0000ffa000/0x3000)=nil, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = dup(r0) sendmsg$TIPC_NL_MEDIA_SET(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="30010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x130}, 0x1, 0x0, 0x0, 0x85}, 0x4) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x1000000000000004, 0x80000000000000, r2, &(0x7f0000000300)='./file0\x00') 19:36:38 executing program 1: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x412480, 0x0) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f00000000c0)) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x40, 0x8) ioctl$TIOCLINUX2(r1, 0x541c, &(0x7f0000000000)={0x2, 0x7fff, 0x8, 0x0, 0x41, 0x2}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x11000040}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x98, r2, 0x610, 0x70bd2b, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x30}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1000000000000000}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x7f}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3000000000000}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x67}]}, @IPVS_CMD_ATTR_DEST={0x44, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1000}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7669}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x7f}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xffffffffffffff00}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}]}, 0x98}, 0x1, 0x0, 0x0, 0x800}, 0x10) write$UHID_CREATE2(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000242d21c3b7d3103cfb97ba6fbaf1c44a000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) 19:36:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="010084ae03b0"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) ioctl$int_in(r0, 0x5452, &(0x7f0000000180)=0xfffffffffffffff9) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000140)='/dev/dsp#\x00', 0x4, 0x80) ioctl$KVM_CHECK_EXTENSION(r1, 0xae03, 0xfbcf) 19:36:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) io_setup(0x4, &(0x7f0000000140)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) io_pgetevents(r2, 0x8000, 0x1, &(0x7f0000000180)=[{}], &(0x7f0000000200)={r3, r4+10000000}, &(0x7f0000000280)={&(0x7f0000000240)={0x40}, 0x8}) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000340)=ANY=[@ANYRES32=r5, @ANYBLOB="0000bd094d5851b296b0000000000000000000000000ccbd683051ebb5b851f7a874c95626f71253b6767291d66328f037a89c59ee741e3c9270960d7bc58649"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) fsetxattr$security_smack_entry(r0, &(0x7f00000002c0)='security.SMACK64IPOUT\x00', &(0x7f0000000300)='cgroupcgroupproc\x00', 0x11, 0x2) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:38 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:38 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x40, 0x0) setsockopt$bt_hci_HCI_DATA_DIR(r1, 0x0, 0x1, &(0x7f0000000080)=0x7f, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:38 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) unshare(0x400) pread64(r0, 0x0, 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:38 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$SCSI_IOCTL_DOORLOCK(r1, 0x5380) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB="59d2a49109000000"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$KVM_S390_VCPU_FAULT(r1, 0x4008ae52, &(0x7f0000000180)) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(r1, 0xde933641bc8e09c3, 0x0, r1, 0x0) 19:36:39 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:39 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') r2 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x5, 0x40) ioctl$CAPI_REGISTER(r2, 0x400c4301, &(0x7f0000000080)={0x100, 0x1, 0x100000001}) 19:36:39 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite\x00') ioctl$PPPIOCGCHAN(r1, 0x80047437, &(0x7f0000000080)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:39 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x1) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:39 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) fdatasync(r0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x3, 0x10000) ioctl$LOOP_GET_STATUS(r1, 0x4c03, &(0x7f0000000180)) syz_genetlink_get_family_id$tipc2(0x0) socket$inet_tcp(0x2, 0x1, 0x0) fanotify_mark(r1, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:39 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U+', 0x4}, 0x28, 0x1) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1000004, 0x81010, r0, 0x0) 19:36:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$SIOCGSTAMPNS(r0, 0x8907, &(0x7f0000000140)) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:39 executing program 5: timer_create(0x6, &(0x7f0000000000)={0x0, 0x37, 0x3, @thr={&(0x7f0000000080)="4294e8b507004ba68012a2a2a8f602a3ec70ac67ca106193bf62fa48d1b4e514b5c24934efa0f0ed7813bc02c3c5b34bc0937e2f177c0d2687345a28129f8d404cf4e85b73b4dfd8df8b75016d5f3010000bbaa2755b2c26027ade6daf81c6ecc423d90a5640e714556768011fd0277c2516b20f87e85bb9e9783f4fed8632e324495ad9d7816451b2890168f8ec4f04f06078f388efdb5d51976e2e9092c0d71592814591727ff5", &(0x7f0000000180)="06a8de8e575871a8b85a0143dfa73d916f21fc43b93d777025eb5a4d22c8552cb97984081f6d122216b86268bbae048c42d8d899a872ff8f7f5eaae7a5ec7a0746701bbed7a62f62db9d26ab7b2dfd22ca723fae7cf827be382883f2adf94c185541e869fe78e31c1bd0b88540f9dd1b1314716732f5aa16dbc8212e5cf1b8c0fc21a5e761174facd576d917da716351767ef08b91f3a3398b8f9fc46e03aed1c52c907a5a69990fbd03090e43d44d49953740d9df3d28f8a3693c532604ac1afe9344a5baa52ddf47e443ece1f655cb2aaa10159e5579ddc30d99649f216f8a9c3ac010ea399643fad50f97d953e8d4d28dd1"}}, &(0x7f0000000280)=0x0) timer_delete(r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) 19:36:39 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) openat$capi20(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capi20\x00', 0x10002, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000140)={0x5, 0xffffffffffffff09, 0x0, 0x89d, 0x5}) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') ioctl$VT_RELDISP(r0, 0x5605) 19:36:40 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0xfffffffffffffffc) ioctl$VIDIOC_S_OUTPUT(r0, 0xc004562f, &(0x7f0000000000)=0xffffffff) write$UHID_INPUT2(r0, &(0x7f00000000c0)={0xc, 0x3, "28da5a"}, 0x9) ioctl$KVM_GET_PIT(r0, 0xc048ae65, &(0x7f0000000040)) ioctl$VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f0000000100)={0x0, 0x30314247, 0x0, @discrete={0x51, 0xdd}}) 19:36:40 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:40 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) get_robust_list(r1, &(0x7f00000001c0)=&(0x7f0000000180)={&(0x7f0000000080), 0x0, &(0x7f0000000100)={&(0x7f00000000c0)}}, &(0x7f0000000200)=0x18) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00']) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r1 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x5, 0x10000) ioctl$KVM_ASSIGN_SET_INTX_MASK(r1, 0x4040aea4, &(0x7f00000001c0)={0x1, 0xfff, 0xda, 0x3, 0x401}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000140)=0x9) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x400000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:40 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="0187549305000000209ad27663119b6c1576d1118ec85f383f1dd0cf79b0283611b93dfb4c8ecd143ad53523016d8e8ff37bce38306a5ec750a67964c678d7ca3e01ec402cb0a4273670d64fbfece696a054"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) socket$inet_sctp(0x2, 0x1, 0x84) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:40 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) 19:36:40 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0xd) 19:36:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/ip6_mr_cache\x00') getsockopt$inet_udp_int(r1, 0x11, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0x4) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:41 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x40000, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000000)={@broadcast, @rand_addr, 0x0}, &(0x7f0000000040)=0xc) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000200)={r1, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote}, 0xc) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) ioctl$sock_inet_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000240)) 19:36:41 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000080)=""/76) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:41 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:41 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) sendfile(r0, r0, 0x0, 0x7f) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:41 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="012092720000"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:41 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lstat(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f00000001c0)=',{\x00', &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='9p\x00', 0x20, &(0x7f0000000340)={'trans=virtio,', {[{@dfltgid={'dfltgid', 0x3d, r0}}, {@access_any='access=any'}], [{@obj_type={'obj_type', 0x3d, '/dev/audio\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '/dev/ptmx\x00'}}, {@permit_directio='permit_directio'}]}}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/audio\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_MARK_BUFS(r2, 0x40206417, &(0x7f0000000180)={0x1f, 0x80000001, 0x9481, 0xd7, 0x8, 0x6}) 19:36:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="00000009010020531e3d8add4f78bd094d5851b296b0"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x4c000, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x2, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:42 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/rfcomm\x00') ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f0000000180)=""/250) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) socket$kcm(0x29, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000, 0x3, &(0x7f0000ffd000/0x3000)=nil) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) 19:36:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:42 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x20080, 0x0) poll(&(0x7f0000000180)=[{r0, 0x80}], 0x1, 0x8) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x1410c2, 0x40000) write$UHID_CREATE2(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000000000000010000000000000000000b0647a8161100585736f00000000000000000000000000000000000000000000000000d47dffcda0f4eb576eef000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000000000006b460000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) 19:36:42 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm_plock\x00', 0x20040, 0x0) r2 = geteuid() fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$P9_RGETATTR(r1, &(0x7f0000000180)={0xa0, 0x19, 0x1, {0x1, {0x2, 0x0, 0x8}, 0x0, r2, r3, 0x2, 0xf8f, 0x80000000, 0x0, 0x7, 0x1, 0x1, 0x1, 0x262, 0x0, 0x4, 0x6, 0x9, 0x6, 0x8}}, 0xa0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="01000000fdff"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:42 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:42 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x800, 0x400) ioctl$DRM_IOCTL_ADD_BUFS(r0, 0xc0206416, &(0x7f0000000200)={0x10001, 0xfdc, 0x0, 0x7, 0x1, 0x100}) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f00000002c0)) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000240)={0x0, 0xffffffff}) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$PPPIOCGNPMODE(r1, 0xc008744c, &(0x7f0000000000)={0x57, 0x3}) write$UHID_CREATE2(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a1200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) syz_open_dev$video4linux(&(0x7f0000000300)='/dev/v4l-subdev#\x00', 0xffffffff, 0x4000) r2 = openat$vicodec0(0xffffffffffffff9c, 0x0, 0x2, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_GET_SREGS(0xffffffffffffffff, 0x8138ae83, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x2b, 0x0, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet6(0xffffffffffffff9c, 0x0, &(0x7f00000001c0), 0x800) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, 0x0) syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) syz_open_dev$rtc(0x0, 0x0, 0x0) alarm(0xbfaf) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f00000003c0)={0x0, @in={{0x2, 0x0, @loopback}}, [0x0, 0x0, 0x0, 0xd8, 0x0, 0x200, 0x2, 0x1000000000000000, 0x0, 0x0, 0x0, 0x380000, 0x3ff, 0x100, 0xe68]}, 0x0) fcntl$F_GET_FILE_RW_HINT(r2, 0x40d, 0x0) ioctl$EVIOCGRAB(0xffffffffffffffff, 0x40044590, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000009c0)='threaded\x00', 0xced423) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$P9_RLOCK(0xffffffffffffffff, 0x0, 0x53036bb457327c7a) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000340)={0x0, @in={{0x2, 0x4e20, @multicast1}}}, &(0x7f0000000400)=0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000440)=ANY=[@ANYRES32=r4, @ANYBLOB="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"], &(0x7f0000001480)=0x1008) mkdirat$cgroup(r0, &(0x7f0000000280)='syz1\x00', 0x1ff) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f00000014c0)={0x80000000, 0x1f, 0x5, 'queue1\x00', 0x2}) 19:36:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:43 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:43 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x400, 0x0) clock_gettime(0x0, &(0x7f0000004140)={0x0, 0x0}) recvmmsg(r0, &(0x7f0000003f80)=[{{&(0x7f00000001c0)=@ax25={{0x3, @null}, [@default, @default, @default, @bcast, @default, @rose, @remote, @default]}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000240)=""/128, 0x80}, {&(0x7f00000002c0)=""/195, 0xc3}], 0x2}, 0x8000}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f00000003c0)=""/219, 0xdb}, {&(0x7f00000004c0)=""/235, 0xeb}, {&(0x7f00000005c0)=""/198, 0xc6}, {&(0x7f00000006c0)=""/4096, 0x1000}, {&(0x7f00000016c0)=""/103, 0x67}, {&(0x7f0000001740)=""/19, 0x13}, {&(0x7f0000001780)=""/152, 0x98}, {&(0x7f0000001840)=""/167, 0xa7}], 0x8, &(0x7f0000001980)=""/1, 0x1}, 0x5}, {{&(0x7f00000019c0)=@xdp, 0x80, &(0x7f0000001fc0)=[{&(0x7f0000001a40)=""/85, 0x55}, {&(0x7f0000001ac0)=""/110, 0x6e}, {&(0x7f0000001b40)=""/94, 0x5e}, {&(0x7f0000001bc0)=""/236, 0xec}, {&(0x7f0000001cc0)=""/197, 0xc5}, {&(0x7f0000001dc0)=""/196, 0xc4}, {&(0x7f0000001ec0)=""/235, 0xeb}], 0x7, &(0x7f0000002040)=""/77, 0x4d}, 0x9}, {{&(0x7f00000020c0)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @mcast2}}, 0x80, &(0x7f0000002480)=[{&(0x7f0000002140)=""/156, 0x9c}, {&(0x7f0000002200)=""/239, 0xef}, {&(0x7f0000002300)=""/227, 0xe3}, {&(0x7f0000002400)=""/110, 0x6e}], 0x4, &(0x7f00000024c0)=""/4096, 0x1000}, 0x3f}, {{&(0x7f00000034c0)=@nl=@proc, 0x80, &(0x7f0000003680)=[{&(0x7f0000003540)=""/83, 0x53}, {&(0x7f00000035c0)=""/150, 0x96}], 0x2, &(0x7f00000036c0)=""/190, 0xbe}, 0xdcdc}, {{0x0, 0x0, &(0x7f0000003a40)=[{&(0x7f0000003780)=""/115, 0x73}, {&(0x7f0000003800)=""/231, 0xe7}, {&(0x7f0000003900)=""/26, 0x1a}, {&(0x7f0000003940)=""/7, 0x7}, {&(0x7f0000003980)=""/144, 0x90}], 0x5, &(0x7f0000003ac0)=""/241, 0xf1}, 0x2}, {{&(0x7f0000003bc0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000003f00)=[{&(0x7f0000003c40)=""/104, 0x68}, {&(0x7f0000003cc0)=""/204, 0xcc}, {&(0x7f0000003dc0)=""/17, 0x11}, {&(0x7f0000003e00)=""/255, 0xff}], 0x4, &(0x7f0000003f40)=""/34, 0x22}}], 0x7, 0x10040, &(0x7f0000004180)={r1, r2+10000000}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r3) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') sendfile(r3, r3, &(0x7f0000000040), 0x7) ioctl$KVM_GET_DEVICE_ATTR(r0, 0x4018aee2, &(0x7f0000004200)={0x0, 0x5, 0x1d2c00000, &(0x7f00000041c0)}) 19:36:43 executing program 5: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x64000, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x7, &(0x7f0000000200)={@tipc=@nameseq={0x1e, 0x1, 0x3, {0x43, 0x1}}, {&(0x7f0000000140)=""/94, 0x5e}, &(0x7f00000001c0), 0x20}, 0xa0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x7, 0x0, 0x7f, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000080)=0xd) 19:36:43 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f00000003c0)={0xb, 'sWz1\x00\x00\x00-\x7f\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'siz1\x00\x00!\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\xff\xff\xff\xff\x00', 'syz1\x00', 0xef, 0x9, 0x0, 0x7, 0x0, 0x0, "85688b2650d76247f2f3201ca15757a9f2fee23cd8ba8ab5889f0000a3d8a58b9380808ee2fef7f9a680fae88e8703cfd5e44d8173a121138d7b7a84f8a6614607668912716bae2dc6e92cdf7d250bed15f6e2c90080a24db7fcc900000000000000000000000000000024d5952bbb96f8a18681d57b11b1afb8fac87e1f10ba2c93178cc6528277969393a8a1ef94344c7f8ab7d70d80d2969ac5342e07c1102ff6d627ae03d6e86440344cd7707ed4f50b619d71d05ad8375167db306d681a96dbe65cc9d7c57ee757ee6ba0b0b7e308d3e944c2d1df8876e574ccd82d0416f6bb47608aaa1a1cd238cd82b24dc7"}, 0x207) 19:36:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB="010020a75455c9de7b6f181100000100"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:43 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:43 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000180)={'#! ', './file0', [{0x20, 'cpusetcpuset+\'GPLself(securityeth0/,cgrouptrusted/(em0-'}, {0x20, 'team\x00'}], 0xa, "950589c39aa441c42db5236af6eedff5bfbcf8bcc4ae5d22820c9d1fa18e94fd1df64b4dee20f177c6be80b71132c8c337b8e50a6b97c5eb0b"}, 0x82) connect$rds(r1, &(0x7f00000000c0)={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:43 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000000)=0x1ff) ioctl$KDDELIO(r0, 0x4b35, 0x1) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000002000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001d0000"], 0x118) 19:36:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer\x00', 0x20000, 0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:43 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\f\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:44 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f00000000000000d55332d408cc66ffa900"], 0x118) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000000)=r0, 0x4) 19:36:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x40002, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000640)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0x22, 0x80002, 0xffffffff00000026) r5 = dup2(r3, r4) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r5, 0x800448d3, &(0x7f0000000280)={{0x3, 0x7f, 0x3f, 0x9, 0x2, 0xfffffffffffffc00}, 0x1, 0x31eab07d, 0x20, 0x6, 0xcf, "14e1e6ad7c4cef0ff65bb9d1a346a40b2d5f51c78f3f56c828ee1898eb96956109878cd1d488008bb2c8c8485054a13971dbad57de194382c9d09c6cee3ea90f40764bc3d86904bf8a47b325ca3ebd7ff269b1d730cc9db06c7e79c59d9ce63b8f9b975170d36a63b7fc01f126da89ed6bbdeedfc6223f2e6e35f2902ab5d7d3"}) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') getsockopt$rose(r0, 0x104, 0x1, &(0x7f0000000140), &(0x7f0000000180)=0x4) fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) fanotify_init(0x8, 0x101000) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r0, 0x84, 0x1c, &(0x7f0000000000), &(0x7f0000000240)=0x4) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) modify_ldt$read_default(0x2, &(0x7f0000000080)=""/114, 0x72) 19:36:44 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\r\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:44 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000940)=ANY=[], 0x0) sendmsg$alg(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000000)="2d2eaec62c60686655910b27dc6b5c0e3ab4c1fe", 0x14}, {&(0x7f0000000200)="3af5c76a460e3176c978cf99b304c34ea57a64e31c02a4f3a84d7ac07861e2b65608ad6f907631558cd85960962cfaa6a5b959e58629eb03e43341ddbc238e39fa3743d1", 0x44}, {&(0x7f0000000280)="af9cff783712dd3633709b738c3532fbd4385f4a0fc4bcc7b3e0f8e4e5deaf9467ace46343f9c5a516ccfd39e3e5e84a4ef5887f3e45fb6aa34a4fa5200be17690cc2428e5c93317b4c3d572e68034ee2fa380c86c3b3ee8dfaff6100e36e79656c6de07754534a2d172093244f45de913eefac61450e8c59e8236924f2c897d80e3508b403898f3148c9d6e9cabffe7e3a601d265038332c6a89435aa5c6fb511eb4640130579adb49c9ee35d8c65a8ba8908475eb595e40ccddf", 0xbb}, {&(0x7f0000000340)="634f8c9a7e041f252345b06ff58bc00ccc8f06f2db2a7f51adcd426eb6359177338f6b452bc410540b0a84a6ea3cfaef1b2e08630caaeffa5b6129ad66ca89db5d519907bb1ba51df06f66a9790c39dc08942c80f6d8af8979b966a0d9b609671b8fc5abfede3266b227686497dcecb8c8f457398b6c", 0x76}, {&(0x7f00000003c0)="927e43d0132f9e2c49d4f910a55276137e1df012e59511d2ae1714a6bb1925d9e75ea2d30a17ca2554a37aa40eb5f290f1968f922c116af06617a0cf78bf419c7b377f2f9d432dfb627f730f9e6a26493f16606769b93c06cd03f88476e6b261c84806e43ba493e0fbe7b12aae", 0x6d}, {&(0x7f0000000040)="5c448936922ba7c42e603dde2f1f4236caa3", 0x12}], 0x6, &(0x7f00000004c0)=[@iv={0x110, 0x117, 0x2, 0xf9, "f15c7937cf1cb1e869edd833de9a4dd13ab202e5f67a87c0ddf8bd5000de736b5a2847751417737508aa7b4fb7a45e2e400e5d3929fe26c3dca422d8e8f60d1e47433591bb711c5bc4c77f3f71f16547b95fd3bc7c1a153834aa5b71e452470d7f5da44f8f8bb44cc75ee105bcd20c0c0e381225bf569349697e7012076d63ea1e803092ec0206231337389cb69a58892f2e073aed6175054c795434e38c8bcc814a178cdecdf65c0c58f9155f404ac6f98c02c4b3d372b944d18f73780bc1ff5813fb04137185e7b24735b813822c774a5808f24ee36590ec8a660688759bb3969a2821694019c9158c1e78cbbbd9810f9f687997eac633f2"}], 0x110, 0x8000}, 0x4000000) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000700)={{{@in6=@remote, @in6=@ipv4={[], [], @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) socket$xdp(0x2c, 0x3, 0x0) syz_mount_image$gfs2(&(0x7f0000000080)='gfs2\x00', &(0x7f00000000c0)='./bus\x00', 0x3, 0x2, &(0x7f0000000140)=[{&(0x7f0000000100)="78d47778430635745cb5d9d14c7df07106016791a6708ce754b5d354ded8dba13e5be8a49fe631f01ed7137139cecf", 0x2f, 0xd01a}, {&(0x7f0000000640)="775463d63613629dcd1069ad0cf68892f2818dda82e75e684dc19d022592f7a92337e923e00a52e46bf6f2606dbf941ff80141ef3c6747afc2ad31b01fc65cd98ba48be1f61a859a22a8696b6030d3b657919f67df3cdf1765f51848e7b2af764c4368ad44c4f7e3addd9c4b9b994749caaa41e33a8f1a0127b85f299096e02d248a43772f8a7bb7ca819e67abafb97854bcc5b7049511cf1d866c", 0x9b}], 0x4000, &(0x7f0000000800)={[{@loccookie='loccookie'}, {@quota='quota'}, {@barrier='barrier'}, {@localflocks='localflocks'}, {@discard='discard'}], [{@fowner_gt={'fowner>', r1}}, {@pcr={'pcr', 0x3d, 0x2f}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@obj_user={'obj_user', 0x3d, '@eth0'}}]}) [ 3148.701996][T11260] delete_channel: no stack 19:36:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/schedule_icmp\x00', 0x2, 0x0) r2 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x1, 0x2) fanotify_mark(r2, 0x1, 0x0, r1, 0x0) 19:36:44 executing program 4: r0 = syz_open_dev$usb(&(0x7f00000001c0)='/dev/bus/usb/00#/00#\x00', 0x8, 0x113103) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000200)={{{@in6=@mcast1, @in6=@loopback}}, {{@in6=@initdev}, 0x0, @in6=@remote}}, &(0x7f0000000300)=0xe8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:44 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:44 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0x0, r1, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:44 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@multicast2, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@multicast1}}, &(0x7f0000000300)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) r4 = getuid() epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r0, &(0x7f00000005c0)) mount$fuse(0x0, &(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='fuse\x00', 0x80, &(0x7f0000000440)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {'user_id', 0x3d, r1}, 0x2c, {'group_id', 0x3d, r2}, 0x2c, {[{@max_read={'max_read', 0x3d, 0x6de}}, {@max_read={'max_read', 0x3d, 0x543}}, {@max_read={'max_read', 0x3d, 0x409}}], [{@defcontext={'defcontext', 0x3d, 'root'}}, {@subj_type={'subj_type', 0x3d, 'syz1\x00'}}, {@fowner_lt={'fowner<', r3}}, {@audit='audit'}, {@fsmagic={'fsmagic', 0x3d, 0x20}}, {@fowner_gt={'fowner>', r4}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}]}}) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3149.266292][T11260] delete_channel: no stack 19:36:45 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="010000ed0100"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x12\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) read$FUSE(r1, &(0x7f00000002c0), 0x1000) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000001940)={{0x21, @empty, 0x4e20, 0x3, 'none\x00', 0x0, 0x2, 0x5a}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x7, 0x2, 0x40, 0xffff, 0x8}}, 0x44) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000140)={0x0, 0x6, 0x3, [0x5, 0x0, 0x8000]}, &(0x7f0000000180)=0xe) syz_open_dev$sndpcmp(&(0x7f0000001380)='/dev/snd/pcmC#D#p\x00', 0x9, 0x10000) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f00000001c0)={r3, 0x9}, &(0x7f0000000200)=0x8) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)={r4, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000280)=0xe) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r5 = request_key(&(0x7f0000000100)='pkcs7_test\x00', &(0x7f0000000240)={'syz', 0x2}, &(0x7f00000012c0)='/dev/ptmx\x00', 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_QUERY(0x18, r5, 0x0, &(0x7f0000001300)='TIPCv2\x00', &(0x7f0000001340)) fsetxattr$security_evm(r0, &(0x7f0000001a00)='security.evm\x00', &(0x7f0000001a40)=@ng={0x4, 0x5, "e5c058047f389169aa1543526809dc"}, 0x11, 0x2) close(r2) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000001900)={&(0x7f00000013c0), 0xc, &(0x7f00000018c0)={&(0x7f0000001400)={0x48c, r6, 0x400, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x100}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xcc84}]}, @TIPC_NLA_LINK={0xc8, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x54, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x400}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb090}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x38ee}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100000001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xf3}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x81}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}]}, @TIPC_NLA_SOCK={0x4}, @TIPC_NLA_BEARER={0x160, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xb44, @empty, 0x40}}, {0x14, 0x2, @in={0x2, 0x4e20, @multicast2}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x100000001}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x3, @rand_addr="9637593962bd2e11d93908f3740f01eb", 0x3}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb46e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f4b}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e24, @local}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x2, @rand_addr="629d6b070c21baeb70b6fad16db20fda", 0x101}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'nlmon0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x2, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0xfffffffffffffffa}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x8, @loopback, 0x6}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @remote}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}]}, @TIPC_NLA_LINK={0xb4, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1de}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4413}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x265}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}]}]}, @TIPC_NLA_LINK={0x9c, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ba8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}]}, @TIPC_NLA_SOCK={0x20, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1223965b}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_MON={0x4c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x20}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xf15e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER={0x74, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x7, @dev={0xfe, 0x80, [], 0x11}, 0xe1}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x8001, @mcast2, 0x857d}}, {0x14, 0x2, @in={0x2, 0x4e21, @multicast2}}}}]}]}, 0x48c}, 0x1, 0x0, 0x0, 0x40044}, 0x44) fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:45 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x20, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000000)) 19:36:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0xfffffffffffffff6) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x3ff, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000080)={0x6aa, 0x0, 0x6, 0x9, 0x5, 0x2}) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:45 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) r1 = geteuid() getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000200)=0xc) stat(&(0x7f0000000240)='./bus\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f0000000300)=0x0, &(0x7f0000000340), &(0x7f0000000380)) getgroups(0x5, &(0x7f00000003c0)=[0xee00, 0xffffffffffffffff, 0xee01, 0xffffffffffffffff, 0xee01]) fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000400)={{}, {0x1, 0x7}, [{0x2, 0x7, r1}, {0x2, 0x7, r2}], {}, [{0x8, 0x7, r3}, {0x8, 0x4, r4}, {0x8, 0x2, r5}], {0x10, 0x4}, {0x20, 0x5}}, 0x4c, 0x3) 19:36:45 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x17\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x2201, &(0x7f0000000140)=0x5) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:46 executing program 5: socket$l2tp(0x18, 0x1, 0x1) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x8) 19:36:46 executing program 1: open(&(0x7f0000000040)='./bus\x00', 0x40000, 0x0) getitimer(0x1, &(0x7f0000000000)) socket(0x1d, 0x80000, 0x7ff) 19:36:46 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x18\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:46 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0xa000) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) fstat(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x2, &(0x7f0000000140)=[0xee01, 0xffffffffffffffff]) chown(&(0x7f0000000080)='./file0\x00', r2, r3) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB="89000058df0084e684c418d9e022c922a1e48b8ee27f3e88c2c2525439d6e7b91968fd7340fcd187acfefb"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:46 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00e4ff72797a310000000000000000000000000000001000000000000000000000000000ea795c4700000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007379e141a93d7a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bb4b3c22ff01000000000000000000000000050000005b79080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) 19:36:46 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x9a\x1d\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:46 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x24000, 0x0) setsockopt$RDS_CANCEL_SENT_TO(r1, 0x114, 0x1, &(0x7f0000000080)={0x2, 0x4e22, @broadcast}, 0x10) 19:36:46 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) ioctl$LOOP_CLR_FD(r0, 0x4c01) 19:36:46 executing program 3: r0 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/attr/current\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000200)={{0x7f, 0x45, 0x4c, 0x46, 0xffff, 0x1ff, 0x2, 0x100000000, 0x5, 0x3, 0x3, 0x4, 0x274, 0x40, 0x9d, 0xfffffffffffffffa, 0x8, 0x38, 0x2, 0xffffffffffffffc1, 0xf894, 0x80}, [{0x5, 0x8, 0x1000, 0x0, 0x21, 0x8, 0x1000, 0x5}, {0x6, 0x0, 0x1, 0x2, 0x1, 0x401, 0x8, 0x6}], "c97234e8128801fcbcfdd7abd8f8e4666728d1404c81d2cdfa852f7f2b6807ae658c24145edcaabb71e494daae4c20421999c3980769d0512e715e4bcb15b030a13d1d9433bb227032035d59e6c7b3e40694ba530f5f69e8b208b5adaa81", [[], [], [], []]}, 0x50e) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ptmx\x00', 0x404000, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x400, 0x0) write$P9_RFSYNC(r2, &(0x7f0000000140)={0x7, 0x33, 0x1}, 0x7) 19:36:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="00020000010020531e3d8add4f78bd094d5851b296b0"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000200)=0xf) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) fstat(r0, &(0x7f0000000140)) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:47 executing program 4: syz_open_dev$sg(&(0x7f0000000240)='/dev/sg#\x00', 0xff, 0x8000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000001c0)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000140)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) write$FUSE_GETXATTR(r1, &(0x7f0000000100)={0x18, 0xffffffffffffffff, 0x2, {0x6}}, 0x18) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000200), 0x4) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:47 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00>\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:47 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r2, 0x4008af23, &(0x7f0000000000)={0x1}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000003c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r0, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="100025bd7000fedbdf250e00000008000500010100002400010000000008000000000800080000000000080109005f0000000000000000000000"], 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x40000) setrlimit(0xf, &(0x7f0000000200)={0x1}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:47 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x2000, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a3100000000000000000000001000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050ff000000000000000000000000000000000000"], 0x118) write$FUSE_NOTIFY_POLL(r0, &(0x7f0000000000)={0x18, 0x1, 0x0, {0x9}}, 0x18) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$TIOCCONS(r0, 0x541d) 19:36:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r1, 0x80045530, &(0x7f00000001c0)=""/26) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000540)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000500)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000200)={0x2c0, r2, 0x301, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_MEDIA={0x84, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x34, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb54d}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x62}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1c}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}]}]}, @TIPC_NLA_BEARER={0x48, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @empty}}, {0x14, 0x2, @in={0x2, 0x4e23, @local}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_SOCK={0x1c, 0x2, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x4c, 0x5, [@TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xebb}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0x16c, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'team0\x00'}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0xa1a7, @mcast2, 0x1}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x4a, @rand_addr="3f9a12eb5836c8a2c811a589adc40b7a"}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0xfffffffffffffff7, @rand_addr="5c98e0e20143e5dc14247a8509570f6e", 0x80000001}}}}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1eed}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x554}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fff}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x6, @loopback, 0xfff}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x577, @loopback, 0x1f}}}}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x28}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xffffffffffffff7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}]}, @TIPC_NLA_BEARER={0xc, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x610}]}]}, 0x2c0}, 0x1, 0x0, 0x0, 0x800}, 0x4000) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:47 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:47 executing program 1: r0 = open(&(0x7f0000000040)='./bus\x00', 0x80, 0xffffffffff7ffffe) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000200)={0x16, 0x98, 0xfa00, {&(0x7f00000001c0)={0xffffffffffffffff}, 0x2, 0xffffffffffffffff, 0x3c, 0x1, @in6={0xa, 0x4e23, 0x200, @loopback, 0x1226}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f00000002c0)={0x11, 0x10, 0xfa00, {&(0x7f0000000000), r1}}, 0x18) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000310000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) 19:36:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x90000, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000001867fd4bf00ba0093e189ff9ddd4f78bd090d5851b296b0"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:47 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) r1 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x100, 0x200400) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f00000001c0)={0x0, 0x0, {0x35, 0x16, 0x4, 0x1c, 0x9, 0x0, 0x6, 0x16b, 0xffffffffffffffff}}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) signalfd(r1, &(0x7f0000000200)={0x5}, 0x8) close(r0) syz_genetlink_get_family_id$tipc2(0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8000, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x10140, 0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, r2, &(0x7f0000000180)='./file0\x00') 19:36:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) prctl$PR_GET_DUMPABLE(0x3) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x400000000000000, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x40, 0x0) sendto$netrom(r2, &(0x7f0000000080)="beac7be208cdd3dc24d585728859d77982ebefce22e051a5d14f178d1a558b59d44b4c4d5c60bb741f1a33a6", 0x2c, 0x4000000, 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_PEER_REMOVE(r2, &(0x7f00000003c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x18000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="d4018b34aa789192708cc7d382", @ANYRES16=r3, @ANYBLOB="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"], 0x1d4}, 0x1, 0x0, 0x0, 0x20000000}, 0x8044) socket$kcm(0x29, 0x5, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:48 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000200), 0xac) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000"], 0x118) bind$x25(r0, &(0x7f0000000000)={0x9, @null=' \x00'}, 0xfffffffffffffe7d) 19:36:48 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x80001, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r3, @ANYBLOB="000000000100b6ef1e0efc476a0001000000000096b0"]) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000140)={0x1, &(0x7f0000000000)=[{0x1, 0x1}]}) r4 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000001240)={0x0}, &(0x7f0000001280)=0xc) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f00000012c0)={r5, 0xbe, "fea8ee999773879c4a50542e9ef507ea8a1ae30b449e1d41a2e1302d170a74f75aa4bc581343b6609def6cfaacaa09a025dc3dc3b7a4da525985eca36148170daf143e4b1d801360afc56343c9a6ee2727367441158140fac4066a6b18b71bb0465cdc25035428d838de93d91eedc10b0204f0e186eb1c68268eb0ece6436bccae4992e6c6e2436098f103372865e1054f5d9a9e215b82a2176efece14de5c1a4e386ee191c68d9f72b334b5f9a81e50fb41abcc4b497291ef07bcf8cc67"}, &(0x7f00000013c0)=0xc6) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r1, 0x1, &(0x7f0000000200)={0x1000, 0x6, 0x1, "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"}) close(r2) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$KDSETLED(r1, 0x4b32, 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) ioctl$TIOCSSOFTCAR(r0, 0x541a, &(0x7f0000000240)=0x800) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:48 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) sendto(r0, &(0x7f0000000200)="7b4769fa74f8a298738f4ca2b8288d9cb00fcdb803a1644c1d85c6e52ced3560489aaad086237282fc3fb079bdebd7aa98aa12c420c165bbd03d67ca8f988114d6fbc1d553cbb2b5f44c4a66f3917d766db7c714fb4c1ef7c448a06b8b58c247bff1c593e1273aa324d0d2abcb3592ac7b8c1a2fd9c3714919b1ffa9a5b52f6cd096480b67cc4ca3352a1f790e314c277180baa162f676cc1502830d20", 0x9d, 0x84, &(0x7f00000002c0)=@l2={0x1f, 0x2d, {0xff, 0x7f, 0x100, 0x7, 0x7}, 0x3, 0x3f}, 0x80) write$UHID_CREATE2(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x1) 19:36:48 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:48 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="01000000010090d64e6cbbd67d3fe00ef0d9d3bd3f12b0857431996ee4c7062077bcc3e6c09a3a24603db76b1b1f2b17c048e6dc30e5ce071da76e8afd3772832103cf0a2953274fdb393d4005af5ea9a06c925ae8b8ccb4d6a6faa0df4baca755cadb4802e4a1fa84a1a434b8dd470037b972"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:48 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01:X\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:49 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x10) 19:36:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00)`\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./file0\x00', 0x20000, 0x120) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000180)={0xffffffffffffffff}, 0x113, 0x1003}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r1, &(0x7f0000000200)={0xa, 0x4, 0xfa00, {r2}}, 0xc) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:49 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r0, 0x12, 0x3, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x12, &(0x7f0000000000), &(0x7f0000000040)=0x4) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000180)={@rand_addr, @initdev, 0x0}, &(0x7f00000001c0)=0xc) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000200)={'team_slave_1\x00', r3}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000140)=0x1, 0x4) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r0, 0x4008642a, &(0x7f0000000280)={r4, 0x8}) fanotify_mark(r0, 0x20, 0x8000029, r0, &(0x7f0000000300)='./file0\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xf) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) r2 = fcntl$dupfd(r0, 0x406, r0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'veth1_to_hsr\x00', 0x100}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) r3 = fcntl$getown(r1, 0x9) perf_event_open(&(0x7f00000001c0)={0x3, 0x70, 0x4, 0x3, 0xfffffffffffffff7, 0x100, 0x0, 0x91d, 0xe00, 0x1, 0x9ab, 0x0, 0x800, 0x7, 0x7, 0x5, 0x4, 0x9, 0xfffffffffffff4f1, 0xee0, 0x7fff, 0x5, 0x1, 0x7, 0x0, 0x6, 0x8000, 0x2, 0x5, 0x8e2, 0x0, 0x7, 0x400, 0x0, 0x1, 0x1d, 0x80000001, 0x9, 0x0, 0x6, 0x5, @perf_config_ext={0x0, 0x401}, 0x8000, 0x2, 0x9, 0x7, 0x1f, 0xa715, 0x7}, r3, 0x9, 0xffffffffffffff9c, 0x1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:49 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = open(&(0x7f0000000000)='./file0\x00', 0x60000, 0xa4) setsockopt$inet6_int(r1, 0x29, 0xc9, &(0x7f0000000080)=0xae41, 0x4) 19:36:49 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x017h\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:50 executing program 1: r0 = open(&(0x7f0000000200)='./bus\x00', 0x141042, 0x10200000000) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) 19:36:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00*\xa8\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:50 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000180)=0x11) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x7) ioctl$KIOCSOUND(r0, 0x4b2f, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) getsockname$inet6(r1, &(0x7f00000001c0)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000200)=0x1c) ioctl$sock_rose_SIOCADDRT(r1, 0x890b, &(0x7f0000000100)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x2}, 0xffffffffffffff00, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @bpq0='bpq0\x00', 0x6, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x7f) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000000)) 19:36:50 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000240)=0x80000001, 0x4) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="0b00000073797a310000800000000000000000000000001000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"], 0x118) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x2000, 0x1) faccessat(r0, &(0x7f0000000000)='./bus\x00', 0x4, 0x100) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000040)) 19:36:50 executing program 2: r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f0000000280)=ANY=[@ANYRES32=r2, @ANYBLOB="00001b000100a5051e3d8add4f78bd094d1851b296b00051ee241bfa68c915f50513e69486d312401358bd37706ed0c1e50cd94d69f7c06791a0ac393cee53475e133c3e1c42d4c3f39830461fd67a82ecccfbc6b2326f1654c5abc455d3c981d02b0ff856adc95a765f1421041c601d49f6d577309490d516cc80fa83b7cc2f4cc0"]) ioctl$RTC_AIE_ON(r0, 0x7001) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000140)={0x8000, 0x1, 0x7ff, 0x8001, 0xd, 0x8001, 0x3ff, 0x5, 0xfff, 0x4, 0x20, 0xf4}) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={@loopback, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2, 0x9, 0x100000001, 0x100, 0x0, 0x200, r3}) close(r1) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000180)={0x34, 0x0, &(0x7f00000000c0)}) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:50 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x10080, 0x0) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r1, 0x111, 0x1, 0x9, 0x4) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:50 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) r1 = accept(0xffffffffffffffff, 0x0, &(0x7f0000000140)) ioctl$SIOCGIFMTU(r1, 0x8921, &(0x7f0000000180)) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) [ 3154.984862][T12640] sp0: Synchronizing with TNC 19:36:50 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xc0\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3155.266480][T12648] sp1: Synchronizing with TNC 19:36:51 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000240)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f0000000000)=0x6) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000040)=@hopopts={0xb6, 0x0, [], [@pad1, @ra={0x5, 0x2, 0x4}]}, 0x10) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000200)={0x4, 0x0, [0x0, 0x0, 0x0, 0x0]}) 19:36:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="ff0300000100"]) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x42801, 0x0) ioctl$int_in(r1, 0x800000800c5012, &(0x7f0000003ff8)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, 0x0) 19:36:51 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x28) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000080), &(0x7f0000000140)=0x4) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:51 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xe4\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:51 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) prctl$PR_SET_TIMERSLACK(0x1d, 0x1) 19:36:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x780, 0x0) sendmsg$kcm(r1, &(0x7f00000009c0)={&(0x7f0000000080)=@caif=@rfm={0x25, 0x6, "a6f4ce4538d0be2a99513f658b577f68"}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000180)="1c439474c0c7a9d735e16263102a4ecabe6d99433eb345aac8be192a99427444681cab327239e2bd6fcb53924e542f62b35474ef7215534c8562b088a40f8c016545212191433d44c7fdde04ca25a32739ba5925", 0x54}, {&(0x7f0000000200)="3a26e9276b79471eddc851a0a1e52cd11e207f295bc124355bfcdeeaae8ce90f90517413a4a453c66c4ef466fcfa60bd5876559681cc5d952f34970615515aa8ee5a8d1d", 0x44}, {&(0x7f0000000280)="8553266d648d55a70b1f2c39bc2aa6e3cb3431088c5534bb6bd9a0bed5b72b784db1d99cc7a1561df0664b1ac3a7d39c5c2851094317febf9412a36a74d9a57cd705e0236832d5bfb83fdd6b9bec8be303a88c96602dd8a61f69d4f0a9", 0x5d}, {&(0x7f0000000100)="aba3", 0x2}, {&(0x7f0000000300)="e9469803ab3707fa75aac4df30a2a1e9d34d6b96990c7944f1db72258e4409982586740624da2eec1e0368db788e4b70e130480f10c3e4866a7427de3f78d78ae7351365320eb105e172af4470c74daa4c8ed4", 0x53}, {&(0x7f0000000380)="859918456de0ae234297086f4e53c56e90b17850757c80ba1ac8c119c3db2ac3bae9daf28d22e4662cf675fe9211b11d796af8b8f0a109427c29ca43ac02f4cca514707e78d189931ddc1ba075161bff5e209aa3b3f974e150bddc8d72104229c03c67df19d279d34ffa16694e181b4c3072cf901689e95e8a1144d4", 0x7c}, {&(0x7f0000000400)="efa117d21e245a3871b3af6336cce5b291309707be82061047f8b47b5239a64bb10f13ae23539e9d39035b9a0d48afd5d02443c90c7b8bbca693912862acc648e3ab30659ab5fd3e5ac406622aded62343459a6fc29728ee58f57fb4639ec8a0fda8d4e3b29f5de0c981df0a21153fccd76e8b7b38ba60aefda270dc269a9ebdb17664af8bdd0361b35bc16b1437ab", 0x8f}, {&(0x7f00000004c0)="e8a94394389e1bbd85d6bcb4f81c8488ba4abbc5b9e49d664d3bfbfc814af5164c372f22f0d538da1c698a51de9613ce010e0745f2064e639ebb0e80f0c9f1aba9df9622a00a43ed43a468e5af3c0526c999e2c291c1c581f2a3085f9131c1521bfe8b1475ce58befd87ff78df698f60d416225783d8dec4860ba5910cc0e48522e430b4538fcf77c900bddebb403fae1fb56444d62d7eab8509225e59d3856d3ab991ee88d0a6c6598f5579215093a5db6e415a2d64596d35e74653131162a7530401f7dd4f479edb0522bff07a8db81f40ec9a9d0811c02755731bdda5", 0xde}, {&(0x7f00000005c0)="5fc7b647e97729afb7b1417e14bc80a5147de35d19ae508cb7752945d6c5abeb0e746b0ea6039c2e0fd7aad1b7cd3fd0c41b68227da8b4e30c4ac2d8d34b70a6beb3963d47300d477d840b0d442f7c80c15e0d6169adc3c1517cf083ec4819b073bd4cb5b953f9b02c8f2c996d4f8bc4ee4c76d0c44ddbf5b2f3bcaa1ecdb79e190e5e434bdc8e420c67e48955ebaa2d0e8caef8", 0x94}, {&(0x7f0000000680)="33fb191129fde2fa588d06c460c554088fcab8a786d965f9f6a15d013de6adac936976d4faba9e5f49c3695eb8b87e3c87137c33a08294c1d519d363685b1fa0ddc2de6d946e8005756c85cb438b", 0x4e}], 0xa, &(0x7f00000007c0)=[{0x88, 0x100, 0x5, "285c2f4f02f70212d1087282aa25bfdec3f3aae401c53b7a8e1a668eb51f46b8b3655381edd2c4bdff61164f380049b19008a003ac3f79ef643b712981f61186c471a9686a0aff59edadcd14fd68ae935c44577a72286846aa1262d57b1f53595d117607c90f186892c4d7e4b2bbf7b87bbf"}, {0xc0, 0x11f, 0x9bfb, "69141564c4633b81944c373507828515eb81d3b1b167ecd82ea687025adfc742e0b129ca3d08e82e7e6b38e15c307c8331b518b8be4df8a73dcbe40860d3f8cbae29f3c49d4ba97178850ed88cc4fd0c81d4f150fb4e251000e067f82c85fb207e3a70df8f720e6461d5afc0602d4832c0191d27dd3abed724ce551b98c308a421507575569ba950c788d65eaa267cecffc7cbf8bff18d48b230cadb24229920288f87cf5ed8e7eeecfcefd8d8a6"}, {0x38, 0x0, 0x3, "b1a9f4146f8b0bbd6df971e127bf43774cd3d0d4fa127da1c0f107460f2219de28"}, {0x80, 0x88, 0x2, "3b997ddb6188b76d6e107f1a0fa5faed3178c6c9aa11d8936458d0749cd8d86aaf98d4141131f073df4ebb3da75f68b10643253b6f34f34fd31dfc5170a502bda064dffb733fbf249f4d45b5f01d0f73eef9a64e49152d5efaecf9406a91e630f4776934aed0e4f056"}], 0x200}, 0x40000) 19:36:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCOUTQ(r1, 0x5411, &(0x7f00000001c0)) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000140)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}, &(0x7f0000000180)=0x10) fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r2, 0x4008ae89, &(0x7f0000000280)={0x7a, 0x0, [0x40000108], [0xc1]}) 19:36:52 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x14\xd8\xe8\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:52 executing program 1: r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x100000000000) ioctl$EVIOCGSW(r0, 0x8040451b, &(0x7f0000000240)=""/4096) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./bus\x00', 0x0, 0x18}, 0x10) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000001c0)={0x1, 0x7, [@local, @random="80a6c79534cb", @local, @local, @dev={[], 0x28}, @local, @broadcast]}) write$UHID_CREATE2(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="4b00000073797a3100000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f9ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007379000000000000000010000000000000000000000000da781b81000000000000000000000000000000000000000000000000000000000000000000000000cb4000000000000000000000000000000000000000"], 0x118) 19:36:52 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x41f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x3, 0x82) bind$rose(r1, &(0x7f0000000080)=@full={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, 0x3, [@null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @null, @null, @bcast]}, 0x40) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xf) 19:36:52 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x10000, 0x0) listxattr(&(0x7f0000000000)='.\x00', &(0x7f0000000040)=""/21, 0x15) write$UHID_CREATE2(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffff000000002a949f39c6335164b99eb2e7da0bf8a3c976cb5f228e5953537448fef246168eadaf1cf9e00071476820b5"], 0x118) socket$bt_rfcomm(0x1f, 0x3, 0x3) syncfs(r0) 19:36:52 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="019e0a000102"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:53 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf4\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:53 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$inet(0x2, 0x0, 0x0) bind$inet(r1, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet(r1, &(0x7f0000000200)={0x2, 0x0, @multicast1}, 0x10) 19:36:53 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)={r3, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r2) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f0000000140)=""/12, &(0x7f0000000180)=0xc) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:53 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000080)={0x5, 0x70, 0xb1, 0x6fa90342, 0x1, 0x3, 0x0, 0x1, 0x80000, 0x0, 0x7, 0x0, 0x89, 0xffffffffffff5598, 0x4, 0x2, 0x4, 0x4, 0x5, 0xfff, 0x8, 0x9, 0x100, 0xd1d4a77, 0x3, 0xffffffff7fffffff, 0x0, 0x5, 0x1, 0x0, 0x8, 0x9, 0xfffffffffffffff9, 0xbee, 0xffffffffffff0001, 0x2da15484, 0x2, 0xeca7, 0x0, 0x5, 0x1, @perf_config_ext={0x7, 0x3}, 0x10, 0x6, 0x566f, 0x7, 0x5, 0xaa96, 0x5}, r1, 0x8, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:53 executing program 1: r0 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:53 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xf5\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:54 executing program 1: ioctl$KVM_SET_VAPIC_ADDR(0xffffffffffffffff, 0x4008ae93, &(0x7f0000000040)=0x2000) r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) finit_module(r0, &(0x7f0000000000)='syz1\x00', 0x3) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000200)=r0, 0x4) write$UHID_CREATE2(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d6ffce5368b97d35f0ea02ce3549d524"], 0x118) 19:36:54 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000001400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x0) 19:36:54 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x400000, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) io_setup(0xfffffffffffffff7, &(0x7f0000000040)=0x0) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x90080, 0x0) io_cancel(r1, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x7, 0x5208afc7, r0, &(0x7f0000000080)="25043a141eea354e67d1e8cab19c562b46630352216f42cf19cb28b6f11298160d601ddf52e2315a0e63e40c12c543844bc30db649c155555149d00c4aebb45f38e966414dd7909f8a23a9718840cfe496585e5f08", 0x55, 0x1ff, 0x0, 0x1, r2}, &(0x7f00000001c0)) 19:36:54 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfb\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2000, 0x0) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f00000001c0)) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:54 executing program 1: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0xc91a, 0x200) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000340)={0xfffffffffffffffa, 0x5, 0x6, 0x81, &(0x7f0000000200)=[{}, {}, {}, {}, {}]}) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) sendfile(r1, r1, &(0x7f0000000040), 0xcdfa) 19:36:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ptmx\x00', 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000040)={0x0, 0x0}) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20ncci\x00', 0x143202, 0x0) ioctl$PPPIOCGUNIT(r2, 0x80047456, &(0x7f00000001c0)) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r1, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x800, 0x0) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000000)={0x1ff, 0x0, &(0x7f0000ffc000/0x2000)=nil}) ioctl$SIOCGIFHWADDR(r4, 0x8927, &(0x7f0000000080)) 19:36:54 executing program 3: r0 = socket$inet6(0xa, 0x1000000000003, 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xd}}) 19:36:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000140)={0x8, 0x2, 0x2000}, 0x4) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000180)=[@sack_perm, @window={0x3, 0x8001, 0x9}, @window={0x3, 0x3, 0x5}, @mss={0x2, 0x719c}, @window={0x3, 0xfffffffffffffff9, 0x7ff}], 0x5) fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:55 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xfe\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:55 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) close(r0) socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000080)='syz_tun\x00\x00\x00\t\xf6\x00', 0x10) connect$inet(r0, &(0x7f0000593000)={0x2, 0x0, @multicast1}, 0x10) 19:36:55 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_CLIENT_ID(r1, 0xc0505350, &(0x7f0000000040)) r2 = syz_open_dev$admmidi(&(0x7f0000000600)='/dev/admmidi#\x00', 0xd7ce, 0x80000) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r2, 0x5386, &(0x7f0000000640)) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x1fe, 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000500)={{0x101, 0x58}, 'port1\x00', 0x10, 0x1000, 0x0, 0x5, 0x9, 0xe, 0x3, 0x0, 0x1, 0xa3bc}) ioctl$SIOCAX25OPTRT(r3, 0x89e7, &(0x7f0000000180)={@netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, 0x2, 0x76}) sendmsg$alg(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="5d3ac7115cf8f5e3b239d56bd70cb0d1c2c8ffa76d324b017252ce324d1e8a4521bc29529717c4602af8", 0x2a}, {&(0x7f00000001c0)="3632a1b7c39f54063824953d1a6660f52df06fa111e0b1064c173b662319bb9f759032927b87708fd193e8512ad5a442692651be3f4f7c3a6f9ea4c2e85f8130e1ff857fc53dc512bbbc838bced4a1", 0x4f}, {&(0x7f0000000240)="b4f2e2a60af33d864a42b7360d2307863ac2e189f79ddee942fa19488d8a1f59b63a81526a48e20224dda95ab23ee1d651e55dab297ea35c409d98d1199b06384db77eba977c63f728d597e3c1e9f68dd5021972ebd903d7de30714f6bfb27cfaacbc20da2bd1bc580e382745524d25ab99c075fa70f64bf893d8e35c783664377dfd8385af4f7d73600214c475668ceb278c40bb0dc0d954c0ff99cd9bdf97cf3a0dc93275d5f44e31880b2eb129f01bca02f1f0e5ea9dd08e476bcc79598f887f6080c70615123d8f47604cca14304800e2b34", 0xd4}], 0x3, &(0x7f0000000340)=[@assoc={0x18}, @assoc={0x18, 0x117, 0x4, 0x200}, @op={0x18}, @op={0x18, 0x117, 0x3, 0x1}, @op={0x18, 0x117, 0x3, 0x1}, @iv={0x80, 0x117, 0x2, 0x6b, "845f526afa94cf4cadbf401d729263c9ae18bdf7464f026c5d3397004392a2c5295b0d4246ad244263d3cdb593edcc3f0ecc1bdf4cdb079c5a9a6bf73cb09278c4ba85ca85796ce31a6875b8efea3743875fa227e0898c5bf71ed52bb60bbe87241f11375b03cf2051c181"}, @iv={0x40, 0x117, 0x2, 0x2b, "796482f42c8cb3bfb60ccc2ac501df875cfff5d11fd0eeae16891c2aa8202078a90e75c326ec23f3479101"}, @assoc={0x18, 0x117, 0x4, 0x4}], 0x150, 0x8000}, 0x4004800) getsockopt$rose(r2, 0x104, 0x7, &(0x7f0000000680), &(0x7f00000006c0)=0x4) setxattr$trusted_overlay_redirect(&(0x7f0000000700)='./file0\x00', &(0x7f0000000740)='trusted.overlay.redirect\x00', &(0x7f0000000780)='./file0\x00', 0x8, 0x1) ioctl$sock_inet_SIOCSIFNETMASK(r3, 0x891c, &(0x7f00000005c0)={'vlan0\x00', {0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x23}}}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$GIO_CMAP(r0, 0x4b70, &(0x7f0000000000)) 19:36:55 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x101000, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x165) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x80000, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x74, &(0x7f0000000080)=""/63, &(0x7f0000000140)=0x3f) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') write$UHID_INPUT2(r2, &(0x7f0000000200)={0xc, 0xc2, "5c9cabc37d6b786ae6b5ec8cc3955b8d3427e7c0c9aa89138639257beecaec4a51b85a36796c90bacdb4e4db7db73aaac4d1c5b0c82a5ef3fec51ee4e9ce81f6221b8ca2bd2173762e40249aa186499ee5fb7260232082b77653098044038838d86f318577e32a2720770744da70cf11bc749e932d0cd91000337dac5b58a8c5307ffc6b50ae7d15ec1886f2f7f11034d684a213c538c00eb6a02cee9e8606a0ad5d2861e6811ee508eb46181d9286e81c3bad1c0b5877396eccbd59e7dd2d41962e"}, 0xc8) 19:36:55 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:56 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00', 0xfffffffffffffe3e}, 0x118) 19:36:56 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'eql\x00', 0x809}) 19:36:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="001fb06c69002053013d8add4f78bd09495851b296b0"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) arch_prctl$ARCH_GET_CPUID(0x1011) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r0, 0x541b, 0x0) ioctl$VIDIOC_SUBDEV_S_SELECTION(r0, 0xc040563e, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x2, {0x0, 0x80, 0xa8, 0x401}}) 19:36:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4000, 0x40) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000080)={0x1, 0xffffffffffffff2f, 0x9, 0xe7, 0x2, 0x2, 0x7, 0x1f, 0x3, 0x32f, 0x7}, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:56 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000300)=ANY=[@ANYRES32, @ANYBLOB="010000000100f6aa5a71ea38858d7aa28dfb3c00b4bd26b6ec0778b4301307906c9fd4431fbb095a332384ea65a3afaadc3cf0cb6b57355967992c371994776a329c8a3494619da41d57325dd2311f86f35e3db7a6d88e279a9b526a0202efe44e7c7859a406333159582200000000000000000000000000000000"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x5, 0x80400) ioctl$sock_inet_SIOCSIFBRDADDR(r1, 0x891a, &(0x7f0000000240)={'syzkaller1\x00', {0x2, 0x4e21, @local}}) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4000) accept$netrom(r2, &(0x7f00000001c0)={{}, [@null, @null, @remote, @rose, @bcast, @netrom, @default, @netrom]}, &(0x7f0000000080)=0x48) 19:36:56 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x200000, 0x4) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) ioctl$RNDZAPENTCNT(r0, 0x5204, &(0x7f0000000000)=0x3ff) 19:36:56 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:56 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x200000, 0x0) 19:36:57 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x7f\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:57 executing program 3: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'nr0\x01\x00', 0x4005}) r1 = socket$kcm(0x29, 0x5, 0x0) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000c00)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\r\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83\xf2\xf3\xcf7\x8aCZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x982\xeck+8Dk;\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r0, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0xfdef) 19:36:57 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f00000003c0)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00', 0x1d, 0x0, 0x6, 0x400000000000, 0x0, 0x0, "9236116d30346a6cc1bbbf1067735b6f41f1afb0f8495e92101ee3a582"}, 0xef) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000380)={r0, 0x10, &(0x7f0000000340)={&(0x7f0000000280)=""/131, 0x83}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r0, 0x10, &(0x7f0000000040)={&(0x7f0000000000)=""/28, 0x1c, 0x0}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=r1, 0x4) 19:36:57 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x24, 0x80, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/xfrm_stat\x00') ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000080)=0x0) r3 = geteuid() r4 = getegid() setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000140)={r2, r3, r4}, 0xc) [ 3161.550766][T13925] device nr0 entered promiscuous mode 19:36:57 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x8380, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:57 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe4\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:57 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x200, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f00000000c0)={r3, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:36:57 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b6010000000000000100000000000000000000003757d482a173656f00cd3d834d95829bc909607c6cbd5a2ac7ef09f6de17146ae2c6b0231ee621bea190ec94267af74e531687c244268c13b7a1fc344e3be1a57d8a5494d192c12ba66ff0d6e782185d9275eb61445dfdcb474c10f1c4a8821754ccb4d0c28789be232235b1d936b2948cb3105054416ac43f62136f4caa35747035a74f2d1efb67ae1027d8424f95855cf9b6024cc7e9c4e8ea44c691ed9dc1bdcd8bbfd0d0b8fe4816ef069c8038cc43f89793a863d5504471a78cca1b8e7a9102ffb092a71dc0c7aee48af0a2f72fddc0902fdbedb847a2356cb9f3d200933bdc14797dbaa213f4ab0d633c14ae216240ea7ae97d4b"], 0x118) 19:36:58 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf4\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:58 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4000) sendmsg$rds(r1, &(0x7f0000004480)={&(0x7f0000000080)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x23}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/232, 0xe8}], 0x1, &(0x7f00000041c0)=[@cswp={0x58, 0x114, 0x7, {{0x5, 0x9}, &(0x7f0000000100), &(0x7f0000000280)=0x400, 0x3, 0x2, 0x6, 0x5, 0x40, 0x1}}, @mask_cswp={0x58, 0x114, 0x9, {{0x3, 0x40}, &(0x7f00000002c0), &(0x7f0000000300)=0x7fffffff, 0x6, 0x1ff, 0x5, 0xffffffff, 0x0, 0x1}}, @zcopy_cookie={0x18, 0x114, 0xc, 0x10000}, @rdma_args={0x48, 0x114, 0x1, {{0x400, 0xc9}, {&(0x7f0000000340)=""/211, 0xd3}, &(0x7f00000004c0)=[{&(0x7f0000000440)=""/86, 0x56}], 0x1, 0x2, 0x3}}, @mask_fadd={0x58, 0x114, 0x8, {{0x6, 0x80000000}, &(0x7f0000000500)=0xfffffffffffffbff, &(0x7f0000000540)=0xbf5d, 0x4, 0x7, 0x10001, 0x100000001}}, @rdma_args={0x48, 0x114, 0x1, {{0x6e, 0xfffffffffffffff9}, {&(0x7f0000000580)=""/153, 0x99}, &(0x7f0000001900)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000001640)=""/147, 0x93}, {&(0x7f0000001700)=""/251, 0xfb}, {&(0x7f0000001800)=""/130, 0x82}, {&(0x7f00000018c0)=""/3, 0x3}], 0x5, 0x8, 0x9d0}}, @rdma_args={0x48, 0x114, 0x1, {{0x7fff, 0x9}, {&(0x7f0000001980)=""/2, 0x2}, &(0x7f0000002b00)=[{&(0x7f00000019c0)=""/90, 0x5a}, {&(0x7f0000001a40)=""/4096, 0x1000}, {&(0x7f0000002a40)=""/163, 0xa3}], 0x3, 0xa}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000002b40)=""/14, 0xe}, &(0x7f0000002b80), 0x44}}, @rdma_args={0x48, 0x114, 0x1, {{0x6, 0x6}, {&(0x7f0000002bc0)=""/230, 0xe6}, &(0x7f0000004080)=[{&(0x7f0000002cc0)=""/4096, 0x1000}, {&(0x7f0000003cc0)=""/227, 0xe3}, {&(0x7f0000003dc0)=""/220, 0xdc}, {&(0x7f0000003ec0)=""/58, 0x3a}, {&(0x7f0000003f00)=""/84, 0x54}, {&(0x7f0000003f80)=""/30, 0x1e}, {&(0x7f0000003fc0)=""/133, 0x85}], 0x7}}, @rdma_map={0x30, 0x114, 0x3, {{&(0x7f0000004100)=""/93, 0x5d}, &(0x7f0000004180), 0x8}}], 0x2a0, 0x20000000}, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:36:58 executing program 1: sysfs$1(0x1, &(0x7f0000000000)='\x00') r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:58 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf5\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:58 executing program 1: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00', 0xfffffd32}, 0x118) 19:36:59 executing program 3: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='ramfs\x00', 0x0, 0x0) ioprio_set$uid(0x1000000003, 0x0, 0x0) chdir(&(0x7f00000001c0)='./file0\x00') r0 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) ftruncate(r0, 0x208200) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) 19:36:59 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/btrfs-control\x00', 0x20000, 0x0) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f00000000c0)=0x1) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='io.stat\x00', 0x0, 0x0) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x6, 0x10000) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f00000003c0)={0x0, @aes256}) ioctl$BLKREPORTZONE(r3, 0xc0101282, &(0x7f0000000180)={0x3, 0x8, 0x0, [{0x400000000, 0x848, 0x6, 0x0, 0x180000000, 0x3, 0xc5}, {0x4, 0x401, 0x9, 0x8000, 0x7f, 0x101, 0x81f}, {0xffffffffffffffff, 0x7a, 0xffffffff, 0x7, 0x6, 0x700000000000}, {0x8, 0x80000000, 0xb2, 0x1, 0x28, 0x2, 0x3}, {0x40, 0x400, 0x1000, 0x0, 0x7ff, 0x8, 0x1}, {0x5, 0x3, 0x7, 0x3, 0x8, 0x200, 0x5}, {0x5, 0x280000000000, 0x6, 0x5, 0x100000000, 0x1, 0x800}, {0x8, 0x5, 0x100000000, 0x7ff, 0x0, 0x4}]}) 19:36:59 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) ioctl$TIOCSBRK(r0, 0x5427) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:36:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfb\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:36:59 executing program 1: socket$inet6_dccp(0xa, 0x6, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000240)) clock_gettime(0x0, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200), 0x0) 19:36:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={r1, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) r2 = socket$inet6(0xa, 0x800, 0x2) getsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000140), &(0x7f0000000180)=0x4) close(r0) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') ioctl$KDMKTONE(r0, 0x4b30, 0x2) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f00000001c0)={0x4, 0x1, 0x7fff, 0x400, 0x7f}, 0x14) fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(r0, 0x541b, 0x0) 19:36:59 executing program 1: clone(0x4008200fffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) mknod(&(0x7f0000000340)='./file0\x00', 0x10001040, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f000073b000/0x4000)=nil, 0x3) tkill(0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 19:36:59 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xfe\xff\xff\xff\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:37:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x80000001, 0x4041) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000380)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r1, 0xc1105517, &(0x7f0000000180)={{0x4, 0x2, 0x81, 0x80000001, '\x00', 0x7}, 0x1, 0x8, 0x100, r2, 0x2, 0xc18d, 'syz0\x00', &(0x7f00000000c0)=['/dev/ptmx\x00', 'vboxnet0cgroupbdev\x00'], 0x1d, [], [0x6, 0x4, 0x4ee0, 0x2]}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0xd) [ 3164.303951][T14243] [ 3164.307868][T14243] ====================================================== [ 3164.314885][T14243] WARNING: possible circular locking dependency detected [ 3164.321921][T14243] 5.1.0-rc1 #28 Not tainted [ 3164.326423][T14243] ------------------------------------------------------ [ 3164.334963][T14243] syz-executor.1/14243 is trying to acquire lock: [ 3164.341382][T14243] 0000000005568923 (&pipe->mutex/1){+.+.}, at: fifo_open+0x159/0xb00 [ 3164.342240][T14185] kobject: 'rx-0' (00000000b86500b2): kobject_cleanup, parent 00000000ab405a5b [ 3164.349479][T14243] [ 3164.349479][T14243] but task is already holding lock: [ 3164.349486][T14243] 00000000d20b0687 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 3164.349516][T14243] [ 3164.349516][T14243] which lock already depends on the new lock. [ 3164.349516][T14243] [ 3164.349519][T14243] [ 3164.349519][T14243] the existing dependency chain (in reverse order) is: [ 3164.349522][T14243] [ 3164.349522][T14243] -> #2 (&sig->cred_guard_mutex){+.+.}: [ 3164.349549][T14243] lock_acquire+0x16f/0x3f0 [ 3164.408047][T14243] __mutex_lock+0xf7/0x1310 [ 3164.413082][T14243] mutex_lock_killable_nested+0x16/0x20 [ 3164.419157][T14243] lock_trace+0x4a/0xe0 [ 3164.423840][T14243] proc_pid_stack+0x13e/0x2c0 [ 3164.429736][T14243] proc_single_show+0xf6/0x170 [ 3164.435134][T14243] seq_read+0x4db/0x1130 [ 3164.439911][T14243] do_iter_read+0x4a9/0x660 [ 3164.444945][T14243] vfs_readv+0xf0/0x160 [ 3164.449637][T14243] do_preadv+0x1c4/0x280 [ 3164.454767][T14243] __x64_sys_preadv+0x9a/0xf0 [ 3164.459970][T14243] do_syscall_64+0x103/0x610 [ 3164.465090][T14243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3164.471495][T14243] [ 3164.471495][T14243] -> #1 (&p->lock){+.+.}: [ 3164.473366][T14185] kobject: 'rx-0' (00000000b86500b2): auto cleanup 'remove' event [ 3164.478098][T14243] lock_acquire+0x16f/0x3f0 [ 3164.478112][T14243] __mutex_lock+0xf7/0x1310 [ 3164.478130][T14243] mutex_lock_nested+0x16/0x20 [ 3164.501221][T14243] seq_read+0x71/0x1130 [ 3164.505917][T14243] proc_reg_read+0x1fe/0x2c0 [ 3164.511041][T14243] do_iter_read+0x4a9/0x660 [ 3164.516073][T14243] vfs_readv+0xf0/0x160 [ 3164.520760][T14243] default_file_splice_read+0x475/0x890 [ 3164.526830][T14243] do_splice_to+0x12a/0x190 [ 3164.531855][T14243] do_splice+0x10a9/0x13c0 [ 3164.536808][T14243] __x64_sys_splice+0x2c6/0x330 [ 3164.542277][T14243] do_syscall_64+0x103/0x610 [ 3164.547477][T14243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3164.553907][T14243] [ 3164.553907][T14243] -> #0 (&pipe->mutex/1){+.+.}: [ 3164.560947][T14243] __lock_acquire+0x239c/0x3fb0 [ 3164.566326][T14243] lock_acquire+0x16f/0x3f0 [ 3164.571357][T14243] __mutex_lock+0xf7/0x1310 [ 3164.576383][T14243] mutex_lock_nested+0x16/0x20 [ 3164.581679][T14243] fifo_open+0x159/0xb00 [ 3164.586449][T14243] do_dentry_open+0x488/0x1160 [ 3164.591745][T14243] vfs_open+0xa0/0xd0 [ 3164.596256][T14243] path_openat+0x10e9/0x46e0 [ 3164.601396][T14243] do_filp_open+0x1a1/0x280 [ 3164.604648][T14185] kobject: 'rx-0' (00000000b86500b2): kobject_uevent_env [ 3164.606417][T14243] do_open_execat+0x137/0x690 [ 3164.606431][T14243] __do_execve_file.isra.0+0x178d/0x23f0 [ 3164.606447][T14243] __x64_sys_execve+0x8f/0xc0 [ 3164.630239][T14243] do_syscall_64+0x103/0x610 [ 3164.635616][T14243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3164.642023][T14243] [ 3164.642023][T14243] other info that might help us debug this: [ 3164.642023][T14243] [ 3164.652277][T14243] Chain exists of: [ 3164.652277][T14243] &pipe->mutex/1 --> &p->lock --> &sig->cred_guard_mutex [ 3164.652277][T14243] [ 3164.665212][T14243] Possible unsafe locking scenario: [ 3164.665212][T14243] [ 3164.672684][T14243] CPU0 CPU1 [ 3164.678045][T14243] ---- ---- [ 3164.682513][T14185] kobject: 'rx-0' (00000000b86500b2): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3164.683416][T14243] lock(&sig->cred_guard_mutex); [ 3164.699712][T14243] lock(&p->lock); [ 3164.706045][T14243] lock(&sig->cred_guard_mutex); [ 3164.713676][T14243] lock(&pipe->mutex/1); [ 3164.718006][T14243] [ 3164.718006][T14243] *** DEADLOCK *** [ 3164.718006][T14243] [ 3164.726169][T14243] 1 lock held by syz-executor.1/14243: [ 3164.731626][T14243] #0: 00000000d20b0687 (&sig->cred_guard_mutex){+.+.}, at: __do_execve_file.isra.0+0x376/0x23f0 [ 3164.742156][T14243] [ 3164.742156][T14243] stack backtrace: [ 3164.747042][T14185] kobject: 'rx-0' (00000000b86500b2): auto cleanup kobject_del [ 3164.748046][T14243] CPU: 1 PID: 14243 Comm: syz-executor.1 Not tainted 5.1.0-rc1 #28 [ 3164.748055][T14243] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 3164.748059][T14243] Call Trace: [ 3164.748077][T14243] dump_stack+0x172/0x1f0 [ 3164.748098][T14243] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 3164.787291][T14243] check_prev_add.constprop.0+0xf11/0x23c0 [ 3164.793109][T14243] ? depot_save_stack+0x1de/0x460 [ 3164.795703][T14185] kobject: 'rx-0' (00000000b86500b2): calling ktype release [ 3164.798140][T14243] ? check_usage+0x570/0x570 [ 3164.798151][T14243] ? mark_held_locks+0xa4/0xf0 [ 3164.798172][T14243] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 3164.820548][T14243] ? graph_lock+0x7b/0x200 [ 3164.824969][T14243] ? __lockdep_reset_lock+0x450/0x450 [ 3164.830347][T14243] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 3164.836598][T14243] __lock_acquire+0x239c/0x3fb0 [ 3164.841479][T14243] ? save_stack+0xa9/0xd0 [ 3164.843534][T14185] kobject: 'rx-0': free name [ 3164.845817][T14243] ? mark_held_locks+0xf0/0xf0 [ 3164.845832][T14243] lock_acquire+0x16f/0x3f0 [ 3164.845852][T14243] ? fifo_open+0x159/0xb00 [ 3164.864250][T14243] ? fifo_open+0x159/0xb00 [ 3164.868677][T14243] __mutex_lock+0xf7/0x1310 [ 3164.873198][T14243] ? fifo_open+0x159/0xb00 [ 3164.877188][T14185] kobject: 'tx-0' (00000000066f4ccd): kobject_cleanup, parent 00000000ab405a5b [ 3164.877617][T14243] ? fifo_open+0x159/0xb00 [ 3164.891046][T14243] ? fifo_open+0x2b5/0xb00 [ 3164.895555][T14243] ? mutex_trylock+0x1e0/0x1e0 [ 3164.900324][T14243] ? fifo_open+0x2b5/0xb00 [ 3164.904752][T14243] ? kasan_check_write+0x14/0x20 [ 3164.909704][T14243] ? lock_downgrade+0x880/0x880 [ 3164.914570][T14243] mutex_lock_nested+0x16/0x20 [ 3164.919424][T14243] ? mutex_lock_nested+0x16/0x20 [ 3164.924334][T14185] kobject: 'tx-0' (00000000066f4ccd): auto cleanup 'remove' event [ 3164.924366][T14243] fifo_open+0x159/0xb00 [ 3164.936469][T14243] do_dentry_open+0x488/0x1160 [ 3164.941238][T14243] ? pipe_release+0x280/0x280 [ 3164.945941][T14243] ? chown_common+0x5c0/0x5c0 [ 3164.950619][T14243] ? inode_permission+0xb4/0x570 [ 3164.955557][T14243] vfs_open+0xa0/0xd0 [ 3164.959538][T14243] path_openat+0x10e9/0x46e0 [ 3164.964139][T14243] ? path_lookupat.isra.0+0x8d0/0x8d0 [ 3164.969307][T14185] kobject: 'tx-0' (00000000066f4ccd): kobject_uevent_env [ 3164.969514][T14243] ? __kmalloc+0x15c/0x740 [ 3164.981013][T14243] ? security_prepare_creds+0x123/0x190 [ 3164.986568][T14243] ? prepare_creds+0x2f5/0x3f0 [ 3164.991343][T14243] ? prepare_exec_creds+0x12/0xf0 [ 3164.996408][T14243] ? __do_execve_file.isra.0+0x393/0x23f0 [ 3165.002152][T14243] ? do_syscall_64+0x103/0x610 [ 3165.006926][T14243] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3165.011577][T14185] kobject: 'tx-0' (00000000066f4ccd): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3165.012995][T14243] ? __lock_acquire+0x548/0x3fb0 [ 3165.013010][T14243] ? prepare_exec_creds+0x12/0xf0 [ 3165.013027][T14243] do_filp_open+0x1a1/0x280 [ 3165.038462][T14243] ? may_open_dev+0x100/0x100 [ 3165.043159][T14243] ? __lock_acquire+0x548/0x3fb0 [ 3165.048107][T14243] ? lockdep_init_map+0x1be/0x6d0 [ 3165.053146][T14243] do_open_execat+0x137/0x690 [ 3165.057155][T14185] kobject: 'tx-0' (00000000066f4ccd): auto cleanup kobject_del [ 3165.057834][T14243] ? unregister_binfmt+0x170/0x170 [ 3165.070460][T14243] ? lock_downgrade+0x880/0x880 [ 3165.075312][T14243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3165.077086][T14185] kobject: 'tx-0' (00000000066f4ccd): calling ktype release [ 3165.081551][T14243] ? kasan_check_read+0x11/0x20 [ 3165.081566][T14243] ? do_raw_spin_unlock+0x57/0x270 [ 3165.081582][T14243] __do_execve_file.isra.0+0x178d/0x23f0 19:37:00 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xcc5000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) clock_gettime(0x7, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 19:37:00 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xf0\xff\xff\xff\x0f\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3165.081594][T14243] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 3165.081610][T14243] ? copy_strings_kernel+0x110/0x110 [ 3165.081621][T14243] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 3165.081637][T14243] ? getname_flags+0x277/0x5b0 [ 3165.120402][T14185] kobject: 'tx-0': free name [ 3165.121655][T14243] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3165.121676][T14243] __x64_sys_execve+0x8f/0xc0 [ 3165.127572][T14185] kobject: 'queues' (00000000ab405a5b): kobject_cleanup, parent (null) [ 3165.130991][T14243] do_syscall_64+0x103/0x610 [ 3165.131006][T14243] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 3165.131017][T14243] RIP: 0033:0x458079 [ 3165.131029][T14243] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 3165.131035][T14243] RSP: 002b:00007f2dfcf9cc78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 3165.131046][T14243] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000458079 19:37:00 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) [ 3165.131053][T14243] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000100 [ 3165.131059][T14243] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 3165.131066][T14243] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f2dfcf9d6d4 [ 3165.131072][T14243] R13: 00000000004be5b3 R14: 00000000004ceee0 R15: 00000000ffffffff [ 3165.171969][ T3877] kobject: 'loop5' (000000007f87e100): kobject_uevent_env [ 3165.250469][T14185] kobject: 'queues' (00000000ab405a5b): calling ktype release 19:37:01 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x80\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:37:01 executing program 1: clone(0x4008200fffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) mknod(&(0x7f0000000340)='./file0\x00', 0x10001040, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f000073b000/0x4000)=nil, 0x3) tkill(0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 3165.266617][ T3877] kobject: 'loop5' (000000007f87e100): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3165.281497][ T3877] kobject: 'loop3' (00000000fae1d02a): kobject_uevent_env [ 3165.295747][T14185] kobject: 'queues' (00000000ab405a5b): kset_release [ 3165.302123][ T3877] kobject: 'loop3' (00000000fae1d02a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3165.337000][T14185] kobject: 'queues': free name [ 3165.347814][T14185] kobject: 'sl0' (00000000053f30a4): kobject_uevent_env [ 3165.376822][T14185] kobject: 'sl0' (00000000053f30a4): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3165.389367][T14238] kobject: 'sl1' (000000006f373616): kobject_add_internal: parent: 'net', set: 'devices' [ 3165.389744][ T3877] kobject: 'loop5' (000000007f87e100): kobject_uevent_env [ 3165.400068][T14238] kobject: 'sl1' (000000006f373616): kobject_uevent_env [ 3165.410947][ T3877] kobject: 'loop5' (000000007f87e100): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3165.419067][T14238] kobject: 'sl1' (000000006f373616): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3165.441078][T14238] kobject: 'queues' (00000000441b3b4c): kobject_add_internal: parent: 'sl1', set: '' [ 3165.452030][T14238] kobject: 'queues' (00000000441b3b4c): kobject_uevent_env [ 3165.461268][T14238] kobject: 'queues' (00000000441b3b4c): kobject_uevent_env: filter function caused the event to drop! [ 3165.474515][T14238] kobject: 'rx-0' (00000000a0caf5c4): kobject_add_internal: parent: 'queues', set: 'queues' [ 3165.484925][T14238] kobject: 'rx-0' (00000000a0caf5c4): kobject_uevent_env [ 3165.494254][T14238] kobject: 'rx-0' (00000000a0caf5c4): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3165.506899][T14238] kobject: 'tx-0' (00000000da0da978): kobject_add_internal: parent: 'queues', set: 'queues' [ 3165.517257][T14238] kobject: 'tx-0' (00000000da0da978): kobject_uevent_env [ 3165.524520][T14238] kobject: 'tx-0' (00000000da0da978): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3165.537521][T14360] kobject: 'sl0' (0000000012c63ea0): kobject_add_internal: parent: 'net', set: 'devices' [ 3165.548219][T14360] kobject: 'sl0' (0000000012c63ea0): kobject_uevent_env [ 3165.557395][T14360] kobject: 'sl0' (0000000012c63ea0): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3165.572758][T14360] kobject: 'queues' (0000000033c9ffab): kobject_add_internal: parent: 'sl0', set: '' [ 3165.583691][T14360] kobject: 'queues' (0000000033c9ffab): kobject_uevent_env [ 3165.594343][T14360] kobject: 'queues' (0000000033c9ffab): kobject_uevent_env: filter function caused the event to drop! [ 3165.610746][T14360] kobject: 'rx-0' (0000000006222109): kobject_add_internal: parent: 'queues', set: 'queues' [ 3165.621048][T14360] kobject: 'rx-0' (0000000006222109): kobject_uevent_env [ 3165.628201][T14360] kobject: 'rx-0' (0000000006222109): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3165.644906][T14360] kobject: 'tx-0' (000000009e215610): kobject_add_internal: parent: 'queues', set: 'queues' [ 3165.655305][T14360] kobject: 'tx-0' (000000009e215610): kobject_uevent_env [ 3165.664697][T14360] kobject: 'tx-0' (000000009e215610): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3165.678305][T14185] kobject: 'sl0' (00000000053f30a4): kobject_cleanup, parent (null) 19:37:01 executing program 4: r0 = syz_open_dev$adsp(&(0x7f0000000140)='/dev/adsp#\x00', 0x3, 0x40000) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000280)={r0, &(0x7f00000001c0)="7277218c6107b516968e5ab6fb71a748326cad1c91feb78ad188527dbb64d2336a789120cc482291df1d385fdd0044f26a69f7bb6e1e62e394c738e4d51bf3a496b53382d759aee43a376574631204d134efadae867734e190fa348807bd0278600ee9f28fb32622b4c7e34e0ffc5633ca7ee50a5334e600a7ddd519cf87c85d625764cb2a7848d3cc5d8b3d"}, 0x10) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="0100ea000100"]) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r1) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x41, 0x0) setsockopt$netlink_NETLINK_PKTINFO(r2, 0x10e, 0x3, &(0x7f0000000080)=0x1, 0x4) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:37:01 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xcc5000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) clock_gettime(0x7, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 19:37:01 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3165.689931][T14238] kobject: 'rx-0' (00000000a0caf5c4): kobject_cleanup, parent 00000000441b3b4c [ 3165.700264][T14185] kobject: 'sl0' (00000000053f30a4): calling ktype release [ 3165.707708][T14238] kobject: 'rx-0' (00000000a0caf5c4): auto cleanup 'remove' event [ 3165.717051][T14185] kobject: 'sl0': free name [ 3165.718555][T14238] kobject: 'rx-0' (00000000a0caf5c4): kobject_uevent_env [ 3165.760406][T14238] kobject: 'rx-0' (00000000a0caf5c4): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3165.766833][ T3877] kobject: 'loop4' (00000000a09d31a3): kobject_uevent_env [ 3165.789480][ T3877] kobject: 'loop4' (00000000a09d31a3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3165.821981][T14238] kobject: 'rx-0' (00000000a0caf5c4): auto cleanup kobject_del [ 3165.843493][T14238] kobject: 'rx-0' (00000000a0caf5c4): calling ktype release [ 3165.855626][T14238] kobject: 'rx-0': free name [ 3165.867645][T14238] kobject: 'tx-0' (00000000da0da978): kobject_cleanup, parent 00000000441b3b4c [ 3165.905595][T14238] kobject: 'tx-0' (00000000da0da978): auto cleanup 'remove' event [ 3165.922427][T14238] kobject: 'tx-0' (00000000da0da978): kobject_uevent_env [ 3165.933040][ T3877] kobject: 'loop3' (00000000fae1d02a): kobject_uevent_env [ 3165.942579][T14238] kobject: 'tx-0' (00000000da0da978): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3165.948298][ T3877] kobject: 'loop3' (00000000fae1d02a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3165.954618][T14238] kobject: 'tx-0' (00000000da0da978): auto cleanup kobject_del [ 3165.977794][T14238] kobject: 'tx-0' (00000000da0da978): calling ktype release [ 3165.986092][T14238] kobject: 'tx-0': free name [ 3165.991120][T14238] kobject: 'queues' (00000000441b3b4c): kobject_cleanup, parent (null) [ 3166.000342][T14238] kobject: 'queues' (00000000441b3b4c): calling ktype release [ 3166.007808][T14238] kobject: 'queues' (00000000441b3b4c): kset_release [ 3166.014524][T14238] kobject: 'queues': free name [ 3166.019663][T14238] kobject: 'sl1' (000000006f373616): kobject_uevent_env [ 3166.026611][T14238] kobject: 'sl1' (000000006f373616): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3166.036925][T14360] kobject: 'rx-0' (0000000006222109): kobject_cleanup, parent 0000000033c9ffab [ 3166.045969][T14360] kobject: 'rx-0' (0000000006222109): auto cleanup 'remove' event [ 3166.053874][T14360] kobject: 'rx-0' (0000000006222109): kobject_uevent_env [ 3166.060995][T14360] kobject: 'rx-0' (0000000006222109): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3166.073228][T14360] kobject: 'rx-0' (0000000006222109): auto cleanup kobject_del [ 3166.080878][T14360] kobject: 'rx-0' (0000000006222109): calling ktype release [ 3166.088161][T14360] kobject: 'rx-0': free name [ 3166.092863][T14360] kobject: 'tx-0' (000000009e215610): kobject_cleanup, parent 0000000033c9ffab [ 3166.101844][T14360] kobject: 'tx-0' (000000009e215610): auto cleanup 'remove' event [ 3166.109689][T14360] kobject: 'tx-0' (000000009e215610): kobject_uevent_env [ 3166.116736][T14360] kobject: 'tx-0' (000000009e215610): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3166.128832][T14360] kobject: 'tx-0' (000000009e215610): auto cleanup kobject_del [ 3166.136422][T14360] kobject: 'tx-0' (000000009e215610): calling ktype release [ 3166.143844][T14360] kobject: 'tx-0': free name [ 3166.149153][T14360] kobject: 'queues' (0000000033c9ffab): kobject_cleanup, parent (null) [ 3166.158271][T14360] kobject: 'queues' (0000000033c9ffab): calling ktype release [ 3166.168819][T14360] kobject: 'queues' (0000000033c9ffab): kset_release [ 3166.175567][T14360] kobject: 'queues': free name [ 3166.180970][T14360] kobject: 'sl0' (0000000012c63ea0): kobject_uevent_env [ 3166.188054][T14360] kobject: 'sl0' (0000000012c63ea0): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3166.202193][T14512] kobject: 'sl1' (000000007a6782b8): kobject_add_internal: parent: 'net', set: 'devices' [ 3166.224438][T14512] kobject: 'sl1' (000000007a6782b8): kobject_uevent_env [ 3166.232547][T14512] kobject: 'sl1' (000000007a6782b8): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3166.246828][T14512] kobject: 'queues' (000000008e105115): kobject_add_internal: parent: 'sl1', set: '' [ 3166.259495][T14512] kobject: 'queues' (000000008e105115): kobject_uevent_env [ 3166.267584][T14512] kobject: 'queues' (000000008e105115): kobject_uevent_env: filter function caused the event to drop! [ 3166.282043][T14512] kobject: 'rx-0' (0000000015a25e85): kobject_add_internal: parent: 'queues', set: 'queues' [ 3166.293285][T14512] kobject: 'rx-0' (0000000015a25e85): kobject_uevent_env [ 3166.300986][T14512] kobject: 'rx-0' (0000000015a25e85): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3166.316726][T14512] kobject: 'tx-0' (0000000082a9ca2b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3166.329527][T14512] kobject: 'tx-0' (0000000082a9ca2b): kobject_uevent_env [ 3166.348724][T14512] kobject: 'tx-0' (0000000082a9ca2b): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3166.378335][T14238] kobject: 'sl1' (000000006f373616): kobject_cleanup, parent (null) [ 3166.402730][T14512] kobject: 'rx-0' (0000000015a25e85): kobject_cleanup, parent 000000008e105115 [ 3166.412546][T14238] kobject: 'sl1' (000000006f373616): calling ktype release [ 3166.428600][T14238] kobject: 'sl1': free name [ 3166.429693][T14512] kobject: 'rx-0' (0000000015a25e85): auto cleanup 'remove' event [ 3166.459572][T14512] kobject: 'rx-0' (0000000015a25e85): kobject_uevent_env [ 3166.473967][T14512] kobject: 'rx-0' (0000000015a25e85): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3166.487003][T14512] kobject: 'rx-0' (0000000015a25e85): auto cleanup kobject_del [ 3166.495673][T14512] kobject: 'rx-0' (0000000015a25e85): calling ktype release [ 3166.503891][T14512] kobject: 'rx-0': free name [ 3166.510332][T14512] kobject: 'tx-0' (0000000082a9ca2b): kobject_cleanup, parent 000000008e105115 [ 3166.519382][T14512] kobject: 'tx-0' (0000000082a9ca2b): auto cleanup 'remove' event [ 3166.527253][T14512] kobject: 'tx-0' (0000000082a9ca2b): kobject_uevent_env [ 3166.534585][T14512] kobject: 'tx-0' (0000000082a9ca2b): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3166.545864][T14512] kobject: 'tx-0' (0000000082a9ca2b): auto cleanup kobject_del [ 3166.553921][T14512] kobject: 'tx-0' (0000000082a9ca2b): calling ktype release [ 3166.561279][T14512] kobject: 'tx-0': free name [ 3166.565934][T14512] kobject: 'queues' (000000008e105115): kobject_cleanup, parent (null) [ 3166.575139][T14512] kobject: 'queues' (000000008e105115): calling ktype release [ 3166.582802][T14512] kobject: 'queues' (000000008e105115): kset_release [ 3166.589709][T14512] kobject: 'queues': free name [ 3166.595861][T14512] kobject: 'sl1' (000000007a6782b8): kobject_uevent_env [ 3166.603105][T14512] kobject: 'sl1' (000000007a6782b8): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3166.613832][T14360] kobject: 'sl0' (0000000012c63ea0): kobject_cleanup, parent (null) [ 3166.623190][T14636] kobject: 'sl0' (00000000cc8e264d): kobject_add_internal: parent: 'net', set: 'devices' [ 3166.627674][T14360] kobject: 'sl0' (0000000012c63ea0): calling ktype release [ 3166.636574][T14636] kobject: 'sl0' (00000000cc8e264d): kobject_uevent_env [ 3166.646017][T14360] kobject: 'sl0': free name [ 3166.647296][T14636] kobject: 'sl0' (00000000cc8e264d): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3166.665719][T14636] kobject: 'queues' (000000004365bb20): kobject_add_internal: parent: 'sl0', set: '' 19:37:02 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000180)=ANY=[@ANYRES32=r3, @ANYBLOB="000000000100205778bd094d5851b29690f136e6a415fff5b00000000000d09f4fa5c899117a37d6348cb53109fdafab45b9ac4bed9a1241fa460eaf9c3acb90dbb8a59e0f9259d06e5bed6e203ca8a48d78afa76e3417c748a028d2afeb18510310156a9949bf6b87a30ee29682de24033d9b9fa31964597960b45b45"]) getsockname$inet6(r1, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r2) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fcntl$dupfd(r0, 0x0, r0) fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:37:02 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40000, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x3f, &(0x7f0000000080)=0x1f, 0x4) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r2, 0x40045730, &(0x7f0000000300)=0x7fffffff) sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r2, &(0x7f0000000280)={&(0x7f00000000c0), 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x84, r3, 0x200, 0x70bd26, 0x25dfdbfc, {}, [@TIPC_NLA_BEARER={0x70, 0x1, [@TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1d05a40a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x1, @mcast1, 0x3ff}}, {0x14, 0x2, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x101}]}]}, 0x84}}, 0x14) setsockopt$bt_l2cap_L2CAP_OPTIONS(r2, 0x6, 0x1, &(0x7f0000000340)={0x40, 0x2, 0x1, 0x81, 0x8, 0x6, 0x389}, 0xc) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$NBD_CLEAR_QUE(r1, 0xab05) ioctl$BLKZEROOUT(r1, 0x127f, &(0x7f00000002c0)={0x5, 0xffffffffffffc014}) 19:37:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:37:02 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xcc5000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) clock_gettime(0x7, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) 19:37:02 executing program 1: clone(0x4008200fffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) mknod(&(0x7f0000000340)='./file0\x00', 0x10001040, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f000073b000/0x4000)=nil, 0x3) tkill(0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 3166.677325][T14636] kobject: 'queues' (000000004365bb20): kobject_uevent_env [ 3166.684683][T14636] kobject: 'queues' (000000004365bb20): kobject_uevent_env: filter function caused the event to drop! [ 3166.697295][T14636] kobject: 'rx-0' (00000000bed42328): kobject_add_internal: parent: 'queues', set: 'queues' [ 3166.700734][ T3877] kobject: 'loop2' (000000000725137b): kobject_uevent_env [ 3166.754321][ T3877] kobject: 'loop2' (000000000725137b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3166.775470][T14636] kobject: 'rx-0' (00000000bed42328): kobject_uevent_env 19:37:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xff\xff\xff\xff\xff\xff\a\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3166.798631][T14636] kobject: 'rx-0' (00000000bed42328): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3166.831845][T14636] kobject: 'tx-0' (00000000f7328d1b): kobject_add_internal: parent: 'queues', set: 'queues' 19:37:02 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xcc5000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) clock_gettime(0x7, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b9}, &(0x7f0000000200)={0x0, r2+30000000}, 0x0) [ 3166.876580][T14636] kobject: 'tx-0' (00000000f7328d1b): kobject_uevent_env [ 3166.888192][ T3877] kobject: 'loop3' (00000000fae1d02a): kobject_uevent_env [ 3166.903286][ T3877] kobject: 'loop3' (00000000fae1d02a): fill_kobj_path: path = '/devices/virtual/block/loop3' 19:37:02 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000000100)=0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$VT_OPENQRY(0xffffffffffffffff, 0x5600, &(0x7f0000000040)) connect$l2tp(r0, &(0x7f0000000180)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x4, 0x3, 0x2, {0xa, 0x4e24, 0x6, @rand_addr="b93512db452e437bf397ced10a9a1a67", 0x6}}}, 0x32) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffc, 0x0, 0x8000}, r1, 0x0, r0, 0x0) getsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000000), &(0x7f0000000080)=0x4) ioctl$KVM_GET_NR_MMU_PAGES(r0, 0xae45, 0x200000004) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000140)=0xd) 19:37:02 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3166.922236][T14636] kobject: 'tx-0' (00000000f7328d1b): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3166.955019][ T3877] kobject: 'loop5' (000000007f87e100): kobject_uevent_env [ 3166.977034][T14512] kobject: 'sl1' (000000007a6782b8): kobject_cleanup, parent (null) [ 3166.982774][ T3877] kobject: 'loop5' (000000007f87e100): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3166.999793][T14636] kobject: 'rx-0' (00000000bed42328): kobject_cleanup, parent 000000004365bb20 [ 3167.021126][T14636] kobject: 'rx-0' (00000000bed42328): auto cleanup 'remove' event [ 3167.038287][T14512] kobject: 'sl1' (000000007a6782b8): calling ktype release [ 3167.055260][ T3877] kobject: 'loop5' (000000007f87e100): kobject_uevent_env [ 3167.076014][ T3877] kobject: 'loop5' (000000007f87e100): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3167.086370][T14512] kobject: 'sl1': free name [ 3167.096598][T14636] kobject: 'rx-0' (00000000bed42328): kobject_uevent_env [ 3167.105664][ T3877] kobject: 'loop3' (00000000fae1d02a): kobject_uevent_env [ 3167.113052][T14636] kobject: 'rx-0' (00000000bed42328): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3167.130668][ T3877] kobject: 'loop3' (00000000fae1d02a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3167.146634][T14636] kobject: 'rx-0' (00000000bed42328): auto cleanup kobject_del [ 3167.163670][T14636] kobject: 'rx-0' (00000000bed42328): calling ktype release [ 3167.180397][T14636] kobject: 'rx-0': free name [ 3167.188065][T14636] kobject: 'tx-0' (00000000f7328d1b): kobject_cleanup, parent 000000004365bb20 [ 3167.197593][T14636] kobject: 'tx-0' (00000000f7328d1b): auto cleanup 'remove' event [ 3167.208297][T14636] kobject: 'tx-0' (00000000f7328d1b): kobject_uevent_env [ 3167.215724][T14636] kobject: 'tx-0' (00000000f7328d1b): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3167.229571][T14636] kobject: 'tx-0' (00000000f7328d1b): auto cleanup kobject_del [ 3167.237281][T14636] kobject: 'tx-0' (00000000f7328d1b): calling ktype release [ 3167.245535][T14636] kobject: 'tx-0': free name [ 3167.250197][T14636] kobject: 'queues' (000000004365bb20): kobject_cleanup, parent (null) [ 3167.259372][T14636] kobject: 'queues' (000000004365bb20): calling ktype release [ 3167.266833][T14636] kobject: 'queues' (000000004365bb20): kset_release [ 3167.273824][T14636] kobject: 'queues': free name [ 3167.279093][T14636] kobject: 'sl0' (00000000cc8e264d): kobject_uevent_env [ 3167.286064][T14636] kobject: 'sl0' (00000000cc8e264d): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3167.296359][T14655] kobject: 'sl1' (0000000029f65da9): kobject_add_internal: parent: 'net', set: 'devices' [ 3167.306695][T14655] kobject: 'sl1' (0000000029f65da9): kobject_uevent_env [ 3167.313705][T14655] kobject: 'sl1' (0000000029f65da9): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3167.327380][T14655] kobject: 'queues' (00000000d8301250): kobject_add_internal: parent: 'sl1', set: '' [ 3167.338153][T14655] kobject: 'queues' (00000000d8301250): kobject_uevent_env [ 3167.345496][T14655] kobject: 'queues' (00000000d8301250): kobject_uevent_env: filter function caused the event to drop! [ 3167.360109][T14655] kobject: 'rx-0' (0000000078eac32c): kobject_add_internal: parent: 'queues', set: 'queues' [ 3167.370969][T14655] kobject: 'rx-0' (0000000078eac32c): kobject_uevent_env [ 3167.378039][T14655] kobject: 'rx-0' (0000000078eac32c): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3167.392406][T14655] kobject: 'tx-0' (00000000d0eda2fa): kobject_add_internal: parent: 'queues', set: 'queues' [ 3167.402740][T14655] kobject: 'tx-0' (00000000d0eda2fa): kobject_uevent_env [ 3167.409903][T14655] kobject: 'tx-0' (00000000d0eda2fa): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3167.422456][T14636] kobject: 'sl0' (00000000cc8e264d): kobject_cleanup, parent (null) 19:37:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32, @ANYBLOB="17061e150d0c"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:37:03 executing program 5: r0 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000080)=@add_del={0x2, &(0x7f0000000000)='veth0_to_bridge\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xd) 19:37:03 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xcc5000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) clock_gettime(0x7, &(0x7f00000001c0)) [ 3167.433107][T14655] kobject: 'rx-0' (0000000078eac32c): kobject_cleanup, parent 00000000d8301250 [ 3167.443822][T14636] kobject: 'sl0' (00000000cc8e264d): calling ktype release [ 3167.451468][T14655] kobject: 'rx-0' (0000000078eac32c): auto cleanup 'remove' event [ 3167.461084][T14636] kobject: 'sl0': free name [ 3167.476652][T14655] kobject: 'rx-0' (0000000078eac32c): kobject_uevent_env [ 3167.493215][ T3877] kobject: 'loop4' (00000000a09d31a3): kobject_uevent_env [ 3167.508296][ T3877] kobject: 'loop4' (00000000a09d31a3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3167.521395][T14655] kobject: 'rx-0' (0000000078eac32c): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3167.554441][T14655] kobject: 'rx-0' (0000000078eac32c): auto cleanup kobject_del [ 3167.564908][T14655] kobject: 'rx-0' (0000000078eac32c): calling ktype release [ 3167.585096][T14655] kobject: 'rx-0': free name [ 3167.594108][T14655] kobject: 'tx-0' (00000000d0eda2fa): kobject_cleanup, parent 00000000d8301250 [ 3167.606800][T14655] kobject: 'tx-0' (00000000d0eda2fa): auto cleanup 'remove' event [ 3167.617096][T14655] kobject: 'tx-0' (00000000d0eda2fa): kobject_uevent_env [ 3167.627133][T14655] kobject: 'tx-0' (00000000d0eda2fa): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3167.643060][T14655] kobject: 'tx-0' (00000000d0eda2fa): auto cleanup kobject_del [ 3167.651547][T14655] kobject: 'tx-0' (00000000d0eda2fa): calling ktype release [ 3167.661620][T14655] kobject: 'tx-0': free name [ 3167.666494][T14655] kobject: 'queues' (00000000d8301250): kobject_cleanup, parent (null) [ 3167.676516][T14655] kobject: 'queues' (00000000d8301250): calling ktype release [ 3167.686736][T14655] kobject: 'queues' (00000000d8301250): kset_release [ 3167.694117][T14655] kobject: 'queues': free name [ 3167.699626][T14655] kobject: 'sl1' (0000000029f65da9): kobject_uevent_env [ 3167.706925][T14655] kobject: 'sl1' (0000000029f65da9): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3167.719530][T14893] kobject: 'veth0_to_bridge' (000000000798d1dc): kobject_add_internal: parent: 'net', set: 'devices' [ 3167.725165][ T3877] kobject: 'loop3' (00000000fae1d02a): kobject_uevent_env [ 3167.738192][T14893] kobject: 'veth0_to_bridge' (000000000798d1dc): kobject_uevent_env [ 3167.746063][ T3877] kobject: 'loop3' (00000000fae1d02a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3167.747052][T14893] kobject: 'veth0_to_bridge' (000000000798d1dc): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge' [ 3167.772530][T14893] kobject: 'queues' (0000000035ccc237): kobject_add_internal: parent: 'veth0_to_bridge', set: '' [ 3167.784514][T14893] kobject: 'queues' (0000000035ccc237): kobject_uevent_env [ 3167.792096][T14893] kobject: 'queues' (0000000035ccc237): kobject_uevent_env: filter function caused the event to drop! [ 3167.804963][T14893] kobject: 'rx-0' (000000008fcbd7e4): kobject_add_internal: parent: 'queues', set: 'queues' [ 3167.815534][T14893] kobject: 'rx-0' (000000008fcbd7e4): kobject_uevent_env [ 3167.824273][T14893] kobject: 'rx-0' (000000008fcbd7e4): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge/queues/rx-0' [ 3167.838546][T14893] kobject: 'tx-0' (000000001cce0462): kobject_add_internal: parent: 'queues', set: 'queues' [ 3167.848867][T14893] kobject: 'tx-0' (000000001cce0462): kobject_uevent_env [ 3167.855966][T14893] kobject: 'tx-0' (000000001cce0462): fill_kobj_path: path = '/devices/virtual/net/veth0_to_bridge/queues/tx-0' [ 3167.870527][T14893] kobject: 'brif' (00000000112df7fd): kobject_add_internal: parent: 'veth0_to_bridge', set: '' [ 3167.881638][T14893] kobject: 'batman_adv' (0000000016e5192d): kobject_add_internal: parent: 'veth0_to_bridge', set: '' [ 3167.895395][T14894] kobject: 'sl0' (00000000b3f6cffa): kobject_add_internal: parent: 'net', set: 'devices' [ 3167.912275][T14894] kobject: 'sl0' (00000000b3f6cffa): kobject_uevent_env [ 3167.943174][T14894] kobject: 'sl0' (00000000b3f6cffa): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3167.959695][ T3877] kobject: 'loop5' (000000007f87e100): kobject_uevent_env [ 3167.966857][ T3877] kobject: 'loop5' (000000007f87e100): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3167.977912][T14894] kobject: 'queues' (00000000e26bdf07): kobject_add_internal: parent: 'sl0', set: '' [ 3167.993023][T14894] kobject: 'queues' (00000000e26bdf07): kobject_uevent_env [ 3168.010652][T14894] kobject: 'queues' (00000000e26bdf07): kobject_uevent_env: filter function caused the event to drop! [ 3168.033008][T14894] kobject: 'rx-0' (0000000029a31da6): kobject_add_internal: parent: 'queues', set: 'queues' [ 3168.051791][T14894] kobject: 'rx-0' (0000000029a31da6): kobject_uevent_env [ 3168.078703][T14894] kobject: 'rx-0' (0000000029a31da6): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3168.100467][T14894] kobject: 'tx-0' (00000000af992cc3): kobject_add_internal: parent: 'queues', set: 'queues' [ 3168.128043][T14894] kobject: 'tx-0' (00000000af992cc3): kobject_uevent_env [ 3168.136250][T14894] kobject: 'tx-0' (00000000af992cc3): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3168.154083][T14731] kobject: 'sl1' (000000001ccf1749): kobject_add_internal: parent: 'net', set: 'devices' [ 3168.167251][T14731] kobject: 'sl1' (000000001ccf1749): kobject_uevent_env [ 3168.174532][T14731] kobject: 'sl1' (000000001ccf1749): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3168.187668][T14731] kobject: 'queues' (00000000e9379317): kobject_add_internal: parent: 'sl1', set: '' [ 3168.198755][T14731] kobject: 'queues' (00000000e9379317): kobject_uevent_env [ 3168.206012][T14731] kobject: 'queues' (00000000e9379317): kobject_uevent_env: filter function caused the event to drop! [ 3168.220148][T14731] kobject: 'rx-0' (000000007a4a0158): kobject_add_internal: parent: 'queues', set: 'queues' [ 3168.230620][T14731] kobject: 'rx-0' (000000007a4a0158): kobject_uevent_env [ 3168.239505][T14731] kobject: 'rx-0' (000000007a4a0158): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3168.252568][T14731] kobject: 'tx-0' (00000000378e4ccb): kobject_add_internal: parent: 'queues', set: 'queues' [ 3168.271096][T14731] kobject: 'tx-0' (00000000378e4ccb): kobject_uevent_env [ 3168.278174][T14731] kobject: 'tx-0' (00000000378e4ccb): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3168.302171][T14731] kobject: 'rx-0' (000000007a4a0158): kobject_cleanup, parent 00000000e9379317 [ 3168.313292][T14731] kobject: 'rx-0' (000000007a4a0158): auto cleanup 'remove' event [ 3168.321431][T14731] kobject: 'rx-0' (000000007a4a0158): kobject_uevent_env [ 3168.345003][T14731] kobject: 'rx-0' (000000007a4a0158): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3168.359511][T14731] kobject: 'rx-0' (000000007a4a0158): auto cleanup kobject_del [ 3168.367100][T14731] kobject: 'rx-0' (000000007a4a0158): calling ktype release [ 3168.376873][T14731] kobject: 'rx-0': free name [ 3168.381878][T14731] kobject: 'tx-0' (00000000378e4ccb): kobject_cleanup, parent 00000000e9379317 [ 3168.393750][T14731] kobject: 'tx-0' (00000000378e4ccb): auto cleanup 'remove' event [ 3168.402801][T14731] kobject: 'tx-0' (00000000378e4ccb): kobject_uevent_env [ 3168.413224][T14731] kobject: 'tx-0' (00000000378e4ccb): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3168.424997][T14731] kobject: 'tx-0' (00000000378e4ccb): auto cleanup kobject_del [ 3168.433434][T14731] kobject: 'tx-0' (00000000378e4ccb): calling ktype release [ 3168.440768][T14731] kobject: 'tx-0': free name [ 3168.445382][T14731] kobject: 'queues' (00000000e9379317): kobject_cleanup, parent (null) [ 3168.454855][T14731] kobject: 'queues' (00000000e9379317): calling ktype release [ 3168.462375][T14731] kobject: 'queues' (00000000e9379317): kset_release [ 3168.469102][T14731] kobject: 'queues': free name [ 3168.474072][T14731] kobject: 'sl1' (000000001ccf1749): kobject_uevent_env [ 3168.481090][T14731] kobject: 'sl1' (000000001ccf1749): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3168.491102][T14655] kobject: 'sl1' (0000000029f65da9): kobject_cleanup, parent (null) [ 3168.491545][T14894] kobject: 'rx-0' (0000000029a31da6): kobject_cleanup, parent 00000000e26bdf07 [ 3168.509452][T14655] kobject: 'sl1' (0000000029f65da9): calling ktype release [ 3168.516670][T14655] kobject: 'sl1': free name [ 3168.522272][T14894] kobject: 'rx-0' (0000000029a31da6): auto cleanup 'remove' event [ 3168.530251][T14894] kobject: 'rx-0' (0000000029a31da6): kobject_uevent_env [ 3168.537311][T14894] kobject: 'rx-0' (0000000029a31da6): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3168.549512][T14894] kobject: 'rx-0' (0000000029a31da6): auto cleanup kobject_del [ 3168.557093][T14894] kobject: 'rx-0' (0000000029a31da6): calling ktype release [ 3168.564449][T14894] kobject: 'rx-0': free name [ 3168.569136][T14894] kobject: 'tx-0' (00000000af992cc3): kobject_cleanup, parent 00000000e26bdf07 [ 3168.578068][T14894] kobject: 'tx-0' (00000000af992cc3): auto cleanup 'remove' event [ 3168.585942][T14894] kobject: 'tx-0' (00000000af992cc3): kobject_uevent_env [ 3168.593036][T14894] kobject: 'tx-0' (00000000af992cc3): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3168.605262][T14894] kobject: 'tx-0' (00000000af992cc3): auto cleanup kobject_del [ 3168.612913][T14894] kobject: 'tx-0' (00000000af992cc3): calling ktype release [ 3168.620451][T14894] kobject: 'tx-0': free name [ 3168.625061][T14894] kobject: 'queues' (00000000e26bdf07): kobject_cleanup, parent (null) [ 3168.634291][T14894] kobject: 'queues' (00000000e26bdf07): calling ktype release [ 3168.641915][T14894] kobject: 'queues' (00000000e26bdf07): kset_release [ 3168.648646][T14894] kobject: 'queues': free name [ 3168.653754][T14894] kobject: 'sl0' (00000000b3f6cffa): kobject_uevent_env [ 3168.660769][T14894] kobject: 'sl0' (00000000b3f6cffa): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3168.670808][T15030] kobject: 'sl1' (00000000abcfca27): kobject_add_internal: parent: 'net', set: 'devices' [ 3168.681237][T15030] kobject: 'sl1' (00000000abcfca27): kobject_uevent_env [ 3168.688217][T15030] kobject: 'sl1' (00000000abcfca27): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3168.701936][T15030] kobject: 'queues' (0000000010196db6): kobject_add_internal: parent: 'sl1', set: '' [ 3168.712708][T15030] kobject: 'queues' (0000000010196db6): kobject_uevent_env [ 3168.720008][T15030] kobject: 'queues' (0000000010196db6): kobject_uevent_env: filter function caused the event to drop! [ 3168.733702][T15030] kobject: 'rx-0' (0000000002ebb62e): kobject_add_internal: parent: 'queues', set: 'queues' [ 3168.743892][T15030] kobject: 'rx-0' (0000000002ebb62e): kobject_uevent_env [ 3168.751142][T15030] kobject: 'rx-0' (0000000002ebb62e): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3168.765640][T15030] kobject: 'tx-0' (00000000cb257b7b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3168.775894][T15030] kobject: 'tx-0' (00000000cb257b7b): kobject_uevent_env [ 3168.783092][T15030] kobject: 'tx-0' (00000000cb257b7b): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3168.795649][T14731] kobject: 'sl1' (000000001ccf1749): kobject_cleanup, parent (null) [ 3168.804626][T14894] kobject: 'sl0' (00000000b3f6cffa): kobject_cleanup, parent (null) [ 3168.821786][T14731] kobject: 'sl1' (000000001ccf1749): calling ktype release [ 3168.822512][T15030] kobject: 'rx-0' (0000000002ebb62e): kobject_cleanup, parent 0000000010196db6 [ 3168.838528][T14894] kobject: 'sl0' (00000000b3f6cffa): calling ktype release [ 3168.845763][T14894] kobject: 'sl0': free name [ 3168.848521][T15030] kobject: 'rx-0' (0000000002ebb62e): auto cleanup 'remove' event [ 3168.850336][T14731] kobject: 'sl1': free name [ 3168.858271][T15030] kobject: 'rx-0' (0000000002ebb62e): kobject_uevent_env 19:37:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) bind$x25(r0, &(0x7f0000000180)={0x9, @null=' \x00'}, 0x12) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) prctl$PR_SET_THP_DISABLE(0x29, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/loop-control\x00', 0x2, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) 19:37:04 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x10\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:37:04 executing program 1: clone(0x4008200fffb, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r0, 0xc0045540, 0x0) mknod(&(0x7f0000000340)='./file0\x00', 0x10001040, 0x0) execve(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) userfaultfd(0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f000073b000/0x4000)=nil, 0x3) tkill(0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) 19:37:04 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xcc5000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f0000000080)=0x1, 0x4) 19:37:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x8000, 0x31) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80228000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x64, r2, 0x400, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'erspan0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @dev={0xfe, 0x80, [], 0x10}}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x40}, 0x84) ioctl$SNDRV_TIMER_IOCTL_STATUS(r1, 0x80605414, &(0x7f0000000280)=""/39) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x8040, 0x0) r4 = openat(r3, &(0x7f0000000240)='./file0\x00', 0x400000, 0x5) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x408000, 0x0) ioctl$RTC_WKALM_RD(r4, 0x80287010, &(0x7f0000000080)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xd) setxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x2) [ 3168.890710][T15030] kobject: 'rx-0' (0000000002ebb62e): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3168.908848][ T3877] kobject: 'loop2' (000000000725137b): kobject_uevent_env [ 3168.916033][ T3877] kobject: 'loop2' (000000000725137b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3168.943015][T15030] kobject: 'rx-0' (0000000002ebb62e): auto cleanup kobject_del [ 3168.959790][T15030] kobject: 'rx-0' (0000000002ebb62e): calling ktype release [ 3168.984523][T15030] kobject: 'rx-0': free name [ 3168.993982][T15030] kobject: 'tx-0' (00000000cb257b7b): kobject_cleanup, parent 0000000010196db6 [ 3169.018624][T15030] kobject: 'tx-0' (00000000cb257b7b): auto cleanup 'remove' event 19:37:04 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:37:04 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0xcc5000000, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 19:37:04 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x8) 19:37:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x329) bind$bt_sco(r0, &(0x7f0000000140)={0x1f, {0x1000, 0x401, 0x3, 0x7, 0x2, 0x1000}}, 0x8) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3169.031492][T15030] kobject: 'tx-0' (00000000cb257b7b): kobject_uevent_env [ 3169.042776][T15030] kobject: 'tx-0' (00000000cb257b7b): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3169.042844][ T3877] kobject: 'loop5' (000000007f87e100): kobject_uevent_env [ 3169.056288][T15030] kobject: 'tx-0' (00000000cb257b7b): auto cleanup kobject_del [ 3169.077047][T15030] kobject: 'tx-0' (00000000cb257b7b): calling ktype release [ 3169.086397][T15030] kobject: 'tx-0': free name [ 3169.096581][T15030] kobject: 'queues' (0000000010196db6): kobject_cleanup, parent (null) [ 3169.111429][ T3877] kobject: 'loop5' (000000007f87e100): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3169.131558][T15030] kobject: 'queues' (0000000010196db6): calling ktype release [ 3169.146245][ T3877] kobject: 'loop3' (00000000fae1d02a): kobject_uevent_env [ 3169.154420][T15030] kobject: 'queues' (0000000010196db6): kset_release [ 3169.161733][ T3877] kobject: 'loop3' (00000000fae1d02a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3169.173776][T15030] kobject: 'queues': free name [ 3169.179694][T15030] kobject: 'sl1' (00000000abcfca27): kobject_uevent_env [ 3169.187854][ T3877] kobject: 'loop2' (000000000725137b): kobject_uevent_env [ 3169.196042][T15030] kobject: 'sl1' (00000000abcfca27): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3169.206830][ T3877] kobject: 'loop2' (000000000725137b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3169.217953][T15194] kobject: 'sl0' (0000000072ea306b): kobject_add_internal: parent: 'net', set: 'devices' [ 3169.232953][T15194] kobject: 'sl0' (0000000072ea306b): kobject_uevent_env [ 3169.243787][T15194] kobject: 'sl0' (0000000072ea306b): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3169.256618][T15194] kobject: 'queues' (000000002a208f2c): kobject_add_internal: parent: 'sl0', set: '' [ 3169.269042][T15194] kobject: 'queues' (000000002a208f2c): kobject_uevent_env [ 3169.285548][T15194] kobject: 'queues' (000000002a208f2c): kobject_uevent_env: filter function caused the event to drop! [ 3169.298569][T15194] kobject: 'rx-0' (000000008bb539d9): kobject_add_internal: parent: 'queues', set: 'queues' [ 3169.310397][T15194] kobject: 'rx-0' (000000008bb539d9): kobject_uevent_env [ 3169.318062][T15194] kobject: 'rx-0' (000000008bb539d9): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3169.330624][T15194] kobject: 'tx-0' (00000000177bf800): kobject_add_internal: parent: 'queues', set: 'queues' [ 3169.342981][T15194] kobject: 'tx-0' (00000000177bf800): kobject_uevent_env [ 3169.352234][T15194] kobject: 'tx-0' (00000000177bf800): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3169.366777][T15030] kobject: 'sl1' (00000000abcfca27): kobject_cleanup, parent (null) [ 3169.376779][T15030] kobject: 'sl1' (00000000abcfca27): calling ktype release 19:37:05 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f00000000c0)={0xffffffffffffffff, 0x1, 0x80000001}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x20, 0x4800) ioctl$SCSI_IOCTL_STOP_UNIT(r1, 0x6) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:37:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x80\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:37:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000200)=0xd) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x6c, 0x4080) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r1, 0x40505412, &(0x7f0000000180)={0x5, 0x5, 0xfffffffffffff9a1, 0x0, 0x11}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x4000, 0x0) ioctl$VIDIOC_EXPBUF(r2, 0xc0405610, &(0x7f0000000080)={0x6, 0x7, 0x8, 0x4000}) 19:37:05 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) [ 3169.377316][T15194] kobject: 'rx-0' (000000008bb539d9): kobject_cleanup, parent 000000002a208f2c [ 3169.395987][T15030] kobject: 'sl1': free name [ 3169.413280][T15194] kobject: 'rx-0' (000000008bb539d9): auto cleanup 'remove' event [ 3169.426156][ T3877] kobject: 'loop4' (00000000a09d31a3): kobject_uevent_env [ 3169.450679][T15194] kobject: 'rx-0' (000000008bb539d9): kobject_uevent_env [ 3169.462703][ T3877] kobject: 'loop4' (00000000a09d31a3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3169.481038][T15194] kobject: 'rx-0' (000000008bb539d9): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' 19:37:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x0f\xff\xff\xff\xf0\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3169.505576][T15194] kobject: 'rx-0' (000000008bb539d9): auto cleanup kobject_del [ 3169.531610][T15194] kobject: 'rx-0' (000000008bb539d9): calling ktype release [ 3169.540765][ T3877] kobject: 'loop5' (000000007f87e100): kobject_uevent_env [ 3169.551590][ T3877] kobject: 'loop5' (000000007f87e100): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3169.577229][T15194] kobject: 'rx-0': free name [ 3169.583336][T15194] kobject: 'tx-0' (00000000177bf800): kobject_cleanup, parent 000000002a208f2c [ 3169.608518][T15194] kobject: 'tx-0' (00000000177bf800): auto cleanup 'remove' event [ 3169.618074][T15194] kobject: 'tx-0' (00000000177bf800): kobject_uevent_env [ 3169.626537][T15194] kobject: 'tx-0' (00000000177bf800): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3169.642907][T15194] kobject: 'tx-0' (00000000177bf800): auto cleanup kobject_del [ 3169.663386][T15194] kobject: 'tx-0' (00000000177bf800): calling ktype release [ 3169.678577][T15194] kobject: 'tx-0': free name [ 3169.689743][T15194] kobject: 'queues' (000000002a208f2c): kobject_cleanup, parent (null) [ 3169.701459][T15194] kobject: 'queues' (000000002a208f2c): calling ktype release 19:37:05 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000240)='net/dev_mcast\x00\xc0\x87\xeaU\x01\x1e\x14\xc9\xe3G\xdd\x1fU\xa6\x02j\x1c\xb7\xe0g\x00\x80\x00\x00\x1c\t\x94\xa1\xe8\r\x90\xd4\x9dh\xbd\xbc\x91\xfa\xb9\xc1\xc7\xf0c\xe6v\xe8<\xf5\x0e-du4\xa1\x04XP\xa26e\xd8\x1c\xa0rp\x19?]\x00<\x10\xe3B9\x84L[n\x8d\x17!\xc0\xb5:\x91\xc2\xf6\xec\x1eT\x84d]\xb3\xdfsQG\xa2\xd2:p\xa6s8\xcbu\xc5H3\x8b\x81(p\xd1t\xab\xf5\x96\xb2mp\xe7\xd2\xbf\xb6U\xa07eT\xec\x97$\x97a\xbd') r1 = syz_open_procfs(0x0, &(0x7f0000000080)='clear_refs\x00') sendfile(r1, r0, &(0x7f0000000000)=0xf, 0x7ffff000) 19:37:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='memory.events\x00', 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r1, 0x29, 0xd2, &(0x7f0000000080)={{0xa, 0x4e23, 0x0, @empty, 0x6}, {0xa, 0x4e23, 0x20, @mcast1, 0x4}, 0xffffffff80000000, [0xba3, 0xc5d, 0x0, 0x200, 0x6, 0x1, 0x65c9, 0xff]}, 0x5c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)=0x0) r3 = getpgrp(0xffffffffffffffff) bind$nfc_llcp(r1, &(0x7f0000000200)={0x27, 0x1, 0x0, 0x2, 0x0, 0x5, "3091f4b32c2aafc8155dcf8400b3d129ca1b704a289f8f41a6696c845f715b55763ff0eacc1699dfeccab9ba98bf6ab96bd50e0d347c2381b6b9537cf54363", 0xd}, 0x60) fcntl$setpipe(r1, 0x407, 0x1) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r1, &(0x7f0000000180)={r1, r1}) uselib(&(0x7f00000001c0)='./file0\x00') setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x48f, &(0x7f0000000280)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x3, 'dh\x00', 0x4, 0x3e96, 0xa}, 0x2c) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000340)={0x20, 0x1, 0x4c, &(0x7f00000002c0)="c0dd7dbc959b8a555311cbb79edee5cd84673ae4eb4009645e87f5b38115a39bbd6f84d4dcbcb26e33e611e0ba08c34360936ed40db399fa222f65170f8d881ce7d4688c60397525373b3c3c"}) 19:37:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3169.709608][T15194] kobject: 'queues' (000000002a208f2c): kset_release [ 3169.716416][T15194] kobject: 'queues': free name [ 3169.721563][T15194] kobject: 'sl0' (0000000072ea306b): kobject_uevent_env [ 3169.728896][T15194] kobject: 'sl0' (0000000072ea306b): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3169.746123][T15296] kobject: 'sl1' (00000000b4b73cf3): kobject_add_internal: parent: 'net', set: 'devices' 19:37:05 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) 19:37:05 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3169.774892][T15296] kobject: 'sl1' (00000000b4b73cf3): kobject_uevent_env [ 3169.786877][T15296] kobject: 'sl1' (00000000b4b73cf3): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3169.800714][T15296] kobject: 'queues' (000000007186a48a): kobject_add_internal: parent: 'sl1', set: '' [ 3169.811410][T15296] kobject: 'queues' (000000007186a48a): kobject_uevent_env 19:37:05 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x80000, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) [ 3169.818994][T15296] kobject: 'queues' (000000007186a48a): kobject_uevent_env: filter function caused the event to drop! [ 3169.836556][ T3877] kobject: 'loop5' (000000007f87e100): kobject_uevent_env [ 3169.847767][ T3877] kobject: 'loop5' (000000007f87e100): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3169.849507][T15296] kobject: 'rx-0' (0000000051112b56): kobject_add_internal: parent: 'queues', set: 'queues' [ 3169.912777][T15296] kobject: 'rx-0' (0000000051112b56): kobject_uevent_env [ 3169.947201][T15296] kobject: 'rx-0' (0000000051112b56): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3169.968690][T15296] kobject: 'tx-0' (00000000cf4f7bc4): kobject_add_internal: parent: 'queues', set: 'queues' [ 3169.995720][ T3877] kobject: 'loop5' (000000007f87e100): kobject_uevent_env [ 3170.018555][ T3877] kobject: 'loop5' (000000007f87e100): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3170.030283][T15296] kobject: 'tx-0' (00000000cf4f7bc4): kobject_uevent_env [ 3170.037472][T15296] kobject: 'tx-0' (00000000cf4f7bc4): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3170.063176][T15268] kobject: 'sl0' (00000000710d696d): kobject_add_internal: parent: 'net', set: 'devices' [ 3170.073436][T15194] kobject: 'sl0' (0000000072ea306b): kobject_cleanup, parent (null) [ 3170.082928][T15268] kobject: 'sl0' (00000000710d696d): kobject_uevent_env [ 3170.090593][T15194] kobject: 'sl0' (0000000072ea306b): calling ktype release [ 3170.097813][T15194] kobject: 'sl0': free name [ 3170.102622][T15268] kobject: 'sl0' (00000000710d696d): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3170.116202][T15268] kobject: 'queues' (000000004425d1ca): kobject_add_internal: parent: 'sl0', set: '' [ 3170.127615][T15268] kobject: 'queues' (000000004425d1ca): kobject_uevent_env [ 3170.135391][T15268] kobject: 'queues' (000000004425d1ca): kobject_uevent_env: filter function caused the event to drop! [ 3170.148201][T15268] kobject: 'rx-0' (00000000676e8fd9): kobject_add_internal: parent: 'queues', set: 'queues' [ 3170.160593][T15268] kobject: 'rx-0' (00000000676e8fd9): kobject_uevent_env [ 3170.175314][T15268] kobject: 'rx-0' (00000000676e8fd9): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3170.200715][T15268] kobject: 'tx-0' (0000000016894c28): kobject_add_internal: parent: 'queues', set: 'queues' [ 3170.222672][T15268] kobject: 'tx-0' (0000000016894c28): kobject_uevent_env [ 3170.229976][T15268] kobject: 'tx-0' (0000000016894c28): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3170.248095][T15296] kobject: 'rx-0' (0000000051112b56): kobject_cleanup, parent 000000007186a48a [ 3170.269563][T15296] kobject: 'rx-0' (0000000051112b56): auto cleanup 'remove' event [ 3170.287139][T15296] kobject: 'rx-0' (0000000051112b56): kobject_uevent_env [ 3170.295355][T15296] kobject: 'rx-0' (0000000051112b56): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3170.306718][ T3877] kobject: 'loop3' (00000000fae1d02a): kobject_uevent_env [ 3170.314574][ T3877] kobject: 'loop3' (00000000fae1d02a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3170.328206][T15296] kobject: 'rx-0' (0000000051112b56): auto cleanup kobject_del [ 3170.342031][T15296] kobject: 'rx-0' (0000000051112b56): calling ktype release [ 3170.352029][T15296] kobject: 'rx-0': free name [ 3170.356707][T15296] kobject: 'tx-0' (00000000cf4f7bc4): kobject_cleanup, parent 000000007186a48a [ 3170.366156][T15296] kobject: 'tx-0' (00000000cf4f7bc4): auto cleanup 'remove' event [ 3170.374638][T15296] kobject: 'tx-0' (00000000cf4f7bc4): kobject_uevent_env [ 3170.382594][T15296] kobject: 'tx-0' (00000000cf4f7bc4): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3170.395029][T15296] kobject: 'tx-0' (00000000cf4f7bc4): auto cleanup kobject_del [ 3170.403173][T15296] kobject: 'tx-0' (00000000cf4f7bc4): calling ktype release [ 3170.411466][T15296] kobject: 'tx-0': free name [ 3170.416075][T15296] kobject: 'queues' (000000007186a48a): kobject_cleanup, parent (null) [ 3170.425332][T15296] kobject: 'queues' (000000007186a48a): calling ktype release [ 3170.432824][T15296] kobject: 'queues' (000000007186a48a): kset_release [ 3170.439588][T15296] kobject: 'queues': free name [ 3170.444602][T15296] kobject: 'sl1' (00000000b4b73cf3): kobject_uevent_env [ 3170.451765][T15296] kobject: 'sl1' (00000000b4b73cf3): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3170.462444][T15268] kobject: 'rx-0' (00000000676e8fd9): kobject_cleanup, parent 000000004425d1ca [ 3170.471506][T15268] kobject: 'rx-0' (00000000676e8fd9): auto cleanup 'remove' event [ 3170.480409][T15268] kobject: 'rx-0' (00000000676e8fd9): kobject_uevent_env [ 3170.487578][T15268] kobject: 'rx-0' (00000000676e8fd9): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3170.502312][T15268] kobject: 'rx-0' (00000000676e8fd9): auto cleanup kobject_del [ 3170.510606][T15268] kobject: 'rx-0' (00000000676e8fd9): calling ktype release [ 3170.517994][T15268] kobject: 'rx-0': free name [ 3170.525125][T15268] kobject: 'tx-0' (0000000016894c28): kobject_cleanup, parent 000000004425d1ca [ 3170.536341][T15268] kobject: 'tx-0' (0000000016894c28): auto cleanup 'remove' event [ 3170.551388][T15268] kobject: 'tx-0' (0000000016894c28): kobject_uevent_env [ 3170.560146][T15268] kobject: 'tx-0' (0000000016894c28): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3170.574790][T15268] kobject: 'tx-0' (0000000016894c28): auto cleanup kobject_del [ 3170.582748][T15268] kobject: 'tx-0' (0000000016894c28): calling ktype release [ 3170.592514][T15268] kobject: 'tx-0': free name [ 3170.597225][T15268] kobject: 'queues' (000000004425d1ca): kobject_cleanup, parent (null) [ 3170.606757][T15268] kobject: 'queues' (000000004425d1ca): calling ktype release [ 3170.617050][T15268] kobject: 'queues' (000000004425d1ca): kset_release [ 3170.623914][T15268] kobject: 'queues': free name [ 3170.629851][T15268] kobject: 'sl0' (00000000710d696d): kobject_uevent_env [ 3170.636892][T15268] kobject: 'sl0' (00000000710d696d): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3170.647593][T15344] kobject: 'sl1' (000000009cd404fe): kobject_add_internal: parent: 'net', set: 'devices' [ 3170.658013][T15344] kobject: 'sl1' (000000009cd404fe): kobject_uevent_env [ 3170.667287][T15344] kobject: 'sl1' (000000009cd404fe): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3170.683071][T15344] kobject: 'queues' (00000000843a93b1): kobject_add_internal: parent: 'sl1', set: '' [ 3170.696721][T15344] kobject: 'queues' (00000000843a93b1): kobject_uevent_env [ 3170.706004][T15344] kobject: 'queues' (00000000843a93b1): kobject_uevent_env: filter function caused the event to drop! [ 3170.721092][T15344] kobject: 'rx-0' (00000000919d1a0b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3170.731702][T15344] kobject: 'rx-0' (00000000919d1a0b): kobject_uevent_env [ 3170.741256][T15344] kobject: 'rx-0' (00000000919d1a0b): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3170.752867][T15344] kobject: 'tx-0' (00000000ffa2a393): kobject_add_internal: parent: 'queues', set: 'queues' [ 3170.766160][T15344] kobject: 'tx-0' (00000000ffa2a393): kobject_uevent_env [ 3170.773681][T15344] kobject: 'tx-0' (00000000ffa2a393): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3170.788424][T15268] kobject: 'sl0' (00000000710d696d): kobject_cleanup, parent (null) [ 3170.797830][T15296] kobject: 'sl1' (00000000b4b73cf3): kobject_cleanup, parent (null) [ 3170.808905][T15268] kobject: 'sl0' (00000000710d696d): calling ktype release [ 3170.817065][T15344] kobject: 'rx-0' (00000000919d1a0b): kobject_cleanup, parent 00000000843a93b1 [ 3170.827851][T15268] kobject: 'sl0': free name 19:37:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0xffffffffffffeffd, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)={r2, 0x0, 0x80000001, "20531e3d8add4f78bd094d5851b296b0"}) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3170.840261][T15296] kobject: 'sl1' (00000000b4b73cf3): calling ktype release [ 3170.853685][T15344] kobject: 'rx-0' (00000000919d1a0b): auto cleanup 'remove' event [ 3170.867575][ T3877] kobject: 'loop2' (000000000725137b): kobject_uevent_env [ 3170.881984][T15296] kobject: 'sl1': free name [ 3170.887238][ T3877] kobject: 'loop2' (000000000725137b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3170.906917][T15344] kobject: 'rx-0' (00000000919d1a0b): kobject_uevent_env [ 3170.915116][T15344] kobject: 'rx-0' (00000000919d1a0b): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3170.927590][T15344] kobject: 'rx-0' (00000000919d1a0b): auto cleanup kobject_del [ 3170.942509][T15344] kobject: 'rx-0' (00000000919d1a0b): calling ktype release [ 3170.951030][T15344] kobject: 'rx-0': free name [ 3170.955784][T15344] kobject: 'tx-0' (00000000ffa2a393): kobject_cleanup, parent 00000000843a93b1 [ 3170.965169][T15344] kobject: 'tx-0' (00000000ffa2a393): auto cleanup 'remove' event [ 3170.973152][T15344] kobject: 'tx-0' (00000000ffa2a393): kobject_uevent_env [ 3170.980366][T15344] kobject: 'tx-0' (00000000ffa2a393): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3170.991679][T15344] kobject: 'tx-0' (00000000ffa2a393): auto cleanup kobject_del [ 3170.999317][T15344] kobject: 'tx-0' (00000000ffa2a393): calling ktype release [ 3171.006600][T15344] kobject: 'tx-0': free name [ 3171.011340][T15344] kobject: 'queues' (00000000843a93b1): kobject_cleanup, parent (null) [ 3171.020606][T15344] kobject: 'queues' (00000000843a93b1): calling ktype release [ 3171.028039][T15344] kobject: 'queues' (00000000843a93b1): kset_release [ 3171.034753][T15344] kobject: 'queues': free name [ 3171.039892][T15344] kobject: 'sl1' (000000009cd404fe): kobject_uevent_env [ 3171.046870][T15344] kobject: 'sl1' (000000009cd404fe): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3171.057142][T15364] kobject: 'sl0' (00000000223de84f): kobject_add_internal: parent: 'net', set: 'devices' [ 3171.067630][T15364] kobject: 'sl0' (00000000223de84f): kobject_uevent_env [ 3171.074837][T15364] kobject: 'sl0' (00000000223de84f): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3171.085507][T15364] kobject: 'queues' (000000001da22446): kobject_add_internal: parent: 'sl0', set: '' [ 3171.096341][T15364] kobject: 'queues' (000000001da22446): kobject_uevent_env [ 3171.103720][T15364] kobject: 'queues' (000000001da22446): kobject_uevent_env: filter function caused the event to drop! [ 3171.114875][T15364] kobject: 'rx-0' (00000000c70b5160): kobject_add_internal: parent: 'queues', set: 'queues' [ 3171.127331][T15364] kobject: 'rx-0' (00000000c70b5160): kobject_uevent_env [ 3171.134573][T15364] kobject: 'rx-0' (00000000c70b5160): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3171.145989][T15364] kobject: 'tx-0' (000000008e13dc31): kobject_add_internal: parent: 'queues', set: 'queues' [ 3171.159325][T15364] kobject: 'tx-0' (000000008e13dc31): kobject_uevent_env [ 3171.166678][T15364] kobject: 'tx-0' (000000008e13dc31): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3171.179157][T15344] kobject: 'sl1' (000000009cd404fe): kobject_cleanup, parent (null) [ 3171.189043][T15364] kobject: 'rx-0' (00000000c70b5160): kobject_cleanup, parent 000000001da22446 [ 3171.198087][T15344] kobject: 'sl1' (000000009cd404fe): calling ktype release [ 3171.205433][T15344] kobject: 'sl1': free name [ 3171.210082][T15364] kobject: 'rx-0' (00000000c70b5160): auto cleanup 'remove' event [ 3171.225574][T15364] kobject: 'rx-0' (00000000c70b5160): kobject_uevent_env 19:37:06 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="0110000001000000"]) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) setsockopt(r0, 0x2, 0xfff, &(0x7f00000001c0)="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", 0x1000) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000011c0)=""/150) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x103000, 0x0) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f00000000c0)) close(r1) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:37:06 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x03\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:37:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) 19:37:06 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) 19:37:06 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) pipe(&(0x7f0000000240)) [ 3171.235319][T15364] kobject: 'rx-0' (00000000c70b5160): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3171.255079][ T3877] kobject: 'loop4' (00000000a09d31a3): kobject_uevent_env [ 3171.286074][T15364] kobject: 'rx-0' (00000000c70b5160): auto cleanup kobject_del [ 3171.294617][ T3877] kobject: 'loop4' (00000000a09d31a3): fill_kobj_path: path = '/devices/virtual/block/loop4' 19:37:07 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$tipc(0x1e, 0x5, 0x0) 19:37:07 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3171.328223][T15364] kobject: 'rx-0' (00000000c70b5160): calling ktype release [ 3171.363198][T15364] kobject: 'rx-0': free name 19:37:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$audion(&(0x7f0000000180)='/dev/audio#\x00', 0x100, 0x880) r3 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @remote, @multicast2}, &(0x7f0000000400)=0xc) recvmmsg(0xffffffffffffffff, &(0x7f0000004bc0)=[{{&(0x7f0000000440)=@can={0x1d, 0x0}, 0x80, &(0x7f0000000780)=[{&(0x7f00000004c0)=""/71, 0x47}, {&(0x7f0000000540)=""/195, 0xc3}, {&(0x7f0000000640)=""/122, 0x7a}, {&(0x7f00000006c0)=""/161, 0xa1}], 0x4, &(0x7f00000007c0)=""/230, 0xe6}, 0x8}, {{&(0x7f00000008c0)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000b00)=[{&(0x7f0000000940)=""/80, 0x50}, {&(0x7f00000009c0)=""/234, 0xea}, {&(0x7f0000000ac0)}], 0x3, &(0x7f0000000b40)=""/8, 0x8}}, {{&(0x7f0000000b80)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, &(0x7f0000001080)=[{&(0x7f0000000c00)=""/1, 0x1}, {&(0x7f0000000c40)=""/244, 0xf4}, {&(0x7f0000000d40)=""/91, 0x5b}, {&(0x7f0000000dc0)=""/216, 0xd8}, {&(0x7f0000000ec0)=""/211, 0xd3}, {&(0x7f0000000fc0)=""/139, 0x8b}], 0x6}, 0xffffffff00000000}, {{0x0, 0x0, &(0x7f0000001380)=[{&(0x7f0000001100)=""/193, 0xc1}, {&(0x7f0000001200)=""/89, 0x59}, {&(0x7f0000001280)=""/10, 0xa}, {&(0x7f00000012c0)=""/120, 0x78}, {&(0x7f0000001340)=""/12, 0xc}], 0x5, &(0x7f0000001400)=""/153, 0x99}, 0x10001}, {{&(0x7f00000014c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f0000001780)=[{&(0x7f0000001540)=""/50, 0x32}, {&(0x7f0000001580)=""/45, 0x2d}, {&(0x7f00000015c0)=""/151, 0x97}, {&(0x7f0000001680)=""/105, 0x69}, {&(0x7f0000001700)=""/118, 0x76}], 0x5, &(0x7f0000001800)=""/110, 0x6e}, 0x8}, {{&(0x7f0000001880)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000002d80)=[{&(0x7f0000001900)=""/151, 0x97}, {&(0x7f00000019c0)=""/211, 0xd3}, {&(0x7f0000001ac0)=""/1, 0x1}, {&(0x7f0000001b00)=""/241, 0xf1}, {&(0x7f0000001c00)=""/99, 0x63}, {&(0x7f0000001c80)=""/4096, 0x1000}, {&(0x7f0000002c80)=""/222, 0xde}], 0x7, &(0x7f0000002e00)=""/73, 0x49}, 0x80000001}, {{&(0x7f0000002e80)=@isdn, 0x80, &(0x7f0000003100)=[{&(0x7f0000002f00)=""/151, 0x97}, {&(0x7f0000002fc0)=""/54, 0x36}, {&(0x7f0000003000)=""/67, 0x43}, {&(0x7f0000003080)=""/3, 0x3}, {&(0x7f00000030c0)=""/30, 0x1e}], 0x5, &(0x7f0000003180)=""/8, 0x8}, 0x8001}, {{&(0x7f00000031c0)=@rc, 0x80, &(0x7f0000004500)=[{&(0x7f0000003240)=""/5, 0x5}, {&(0x7f0000003280)=""/247, 0xf7}, {&(0x7f0000003380)=""/4096, 0x1000}, {&(0x7f0000004380)=""/182, 0xb6}, {&(0x7f0000004440)}, {&(0x7f0000004480)=""/77, 0x4d}], 0x6, &(0x7f0000004580)=""/100, 0x64}, 0xf800000000000000}, {{&(0x7f0000004600)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000004740)=[{&(0x7f0000004680)=""/110, 0x6e}, {&(0x7f0000004700)=""/17, 0x11}], 0x2, &(0x7f0000004780)=""/135, 0x87}, 0x4}, {{&(0x7f0000004840)=@vsock={0x28, 0x0, 0x0, @host}, 0x80, &(0x7f0000004a80)=[{&(0x7f00000048c0)=""/171, 0xab}, {&(0x7f0000004980)=""/51, 0x33}, {&(0x7f00000049c0)=""/144, 0x90}], 0x3, &(0x7f0000004ac0)=""/195, 0xc3}, 0x100000001}], 0xa, 0x73ab2112dfa4b9fd, &(0x7f0000004e40)={0x77359400}) recvmmsg(0xffffffffffffff9c, &(0x7f000000b1c0)=[{{&(0x7f0000004e80)=@nfc_llcp, 0x80, &(0x7f0000005000)=[{&(0x7f0000004f00)=""/218, 0xda}], 0x1, &(0x7f0000005040)=""/4096, 0x1000}, 0xaf}, {{&(0x7f0000006040)=@nfc_llcp, 0x80, &(0x7f00000064c0)=[{&(0x7f00000060c0)=""/67, 0x43}, {&(0x7f0000006140)=""/103, 0x67}, {&(0x7f00000061c0)=""/138, 0x8a}, {&(0x7f0000006280)=""/22, 0x16}, {&(0x7f00000062c0)=""/18, 0x12}, {&(0x7f0000006300)=""/55, 0x37}, {&(0x7f0000006340)=""/58, 0x3a}, {&(0x7f0000006380)=""/228, 0xe4}, {&(0x7f0000006480)=""/27, 0x1b}], 0x9, &(0x7f0000006580)=""/5, 0x5}, 0xe1}, {{0x0, 0x0, &(0x7f00000068c0)=[{&(0x7f00000065c0)=""/165, 0xa5}, {&(0x7f0000006680)=""/131, 0x83}, {&(0x7f0000006740)=""/51, 0x33}, {&(0x7f0000006780)=""/171, 0xab}, {&(0x7f0000006840)=""/121, 0x79}], 0x5, &(0x7f0000006940)=""/207, 0xcf}, 0x9}, {{&(0x7f0000006a40)=@isdn, 0x80, &(0x7f0000006bc0)=[{&(0x7f0000006ac0)=""/204, 0xcc}], 0x1, &(0x7f0000006c00)=""/161, 0xa1}, 0x8}, {{0x0, 0x0, &(0x7f0000006dc0)=[{&(0x7f0000006cc0)=""/134, 0x86}, {&(0x7f0000006d80)}], 0x2, &(0x7f0000006e00)=""/119, 0x77}, 0x4}, {{&(0x7f0000006e80)=@sco, 0x80, &(0x7f00000081c0)=[{&(0x7f0000006f00)=""/78, 0x4e}, {&(0x7f0000006f80)=""/70, 0x46}, {&(0x7f0000007000)=""/4096, 0x1000}, {&(0x7f0000008000)=""/185, 0xb9}, {&(0x7f00000080c0)=""/201, 0xc9}], 0x5, &(0x7f0000008240)=""/222, 0xde}, 0x8000}, {{&(0x7f0000008340)=@can, 0x80, &(0x7f0000009580)=[{&(0x7f00000083c0)=""/4096, 0x1000}, {&(0x7f00000093c0)=""/194, 0xc2}, {&(0x7f00000094c0)=""/185, 0xb9}], 0x3, &(0x7f00000095c0)=""/132, 0x84}, 0xe8a7}, {{&(0x7f0000009680)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, 0x80, &(0x7f0000009900)=[{&(0x7f0000009700)=""/172, 0xac}, {&(0x7f00000097c0)=""/87, 0x57}, {&(0x7f0000009840)=""/152, 0x98}], 0x3, &(0x7f0000009940)=""/178, 0xb2}, 0x67f}, {{&(0x7f0000009a00)=@hci={0x1f, 0x0}, 0x80, &(0x7f000000abc0)=[{&(0x7f0000009a80)=""/81, 0x51}, {&(0x7f0000009b00)=""/106, 0x6a}, {&(0x7f0000009b80)=""/4096, 0x1000}, {&(0x7f000000ab80)=""/39, 0x27}], 0x4, &(0x7f000000ac00)=""/54, 0x36}, 0x40}, {{0x0, 0x0, &(0x7f000000b040)=[{&(0x7f000000ac40)=""/200, 0xc8}, {&(0x7f000000ad40)=""/96, 0x60}, {&(0x7f000000adc0)=""/97, 0x61}, {&(0x7f000000ae40)=""/139, 0x8b}, {&(0x7f000000af00)=""/65, 0x41}, {&(0x7f000000af80)=""/133, 0x85}], 0x6, &(0x7f000000b0c0)=""/222, 0xde}, 0x101}], 0xa, 0x40000040, &(0x7f000000b440)={0x0, 0x989680}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f000000b480)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000b4c0)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f000000b680)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f000000b6c0)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f000000b980)={{{@in6=@loopback, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f000000ba80)=0xe8) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f000000bb80)={0x0, @dev, @empty}, &(0x7f000000bbc0)=0xc) accept$packet(0xffffffffffffffff, &(0x7f000000bcc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f000000bd00)=0x14) sendmsg$TEAM_CMD_OPTIONS_GET(r2, &(0x7f000000c100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x608200}, 0xc, &(0x7f000000c0c0)={&(0x7f000000bd40)={0x350, r3, 0x0, 0x70bd26, 0x101, {}, [{{0x8, 0x1, r4}, {0x7c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffffff}}, {0x8, 0x6, r5}}}]}}, {{0x8, 0x1, r7}, {0x98, 0x2, [{0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x100000001, 0x2, 0x1, 0x72e}, {0x7, 0x5, 0x6, 0x2}, {0x5, 0x1, 0x9, 0x2}, {0x1, 0x8, 0x5, 0x5}, {0x7fffffff, 0x2, 0x7, 0x2}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7ff}}}]}}, {{0x8, 0x1, r8}, {0x3c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r9}, {0xfc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r12}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}, {{0x8, 0x1, r13}, {0xc8, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1b02}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}]}}]}, 0x350}, 0x1, 0x0, 0x0, 0x1}, 0x4000000) r15 = shmget$private(0x0, 0x2000, 0x2, &(0x7f0000ffc000/0x2000)=nil) shmctl$IPC_INFO(r15, 0x3, &(0x7f00000001c0)=""/121) ioctl$SIOCX25SCALLUSERDATA(r6, 0x89e5, &(0x7f0000000240)={0x47, "39e5deaedb4417c0d2ac08fa2a8fa486988ba0a084c463d2ffca5d5dbb44de8695063722b6347098f814a810ba72f9da7e53380472fb035da1e2fc49b471b35ae12035838fc3d56aa389b98107ba8c84cedf001da8bd33b189644e984c966d09eac10bfefefec195383b06557bed72cc2ad22b2279cc09c14b11d528d9e77792"}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) syz_open_pts(r0, 0x101202) 19:37:07 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) [ 3171.388211][ T3877] kobject: 'loop3' (00000000fae1d02a): kobject_uevent_env [ 3171.410449][T15364] kobject: 'tx-0' (000000008e13dc31): kobject_cleanup, parent 000000001da22446 [ 3171.425379][ T3877] kobject: 'loop3' (00000000fae1d02a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3171.456021][T15364] kobject: 'tx-0' (000000008e13dc31): auto cleanup 'remove' event [ 3171.470162][ T3877] kobject: 'loop5' (000000007f87e100): kobject_uevent_env [ 3171.478129][T15364] kobject: 'tx-0' (000000008e13dc31): kobject_uevent_env [ 3171.491861][ T3877] kobject: 'loop5' (000000007f87e100): fill_kobj_path: path = '/devices/virtual/block/loop5' 19:37:07 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) 19:37:07 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0xd) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='fdinfo/4\x00') getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000080)={@dev, @dev}, &(0x7f00000000c0)=0xc) [ 3171.508633][T15364] kobject: 'tx-0' (000000008e13dc31): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3171.538705][T15364] kobject: 'tx-0' (000000008e13dc31): auto cleanup kobject_del [ 3171.550151][ T3877] kobject: 'loop3' (00000000fae1d02a): kobject_uevent_env [ 3171.571782][ T3877] kobject: 'loop3' (00000000fae1d02a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3171.578787][T15364] kobject: 'tx-0' (000000008e13dc31): calling ktype release [ 3171.606235][ T3877] kobject: 'loop5' (000000007f87e100): kobject_uevent_env [ 3171.615728][T15364] kobject: 'tx-0': free name [ 3171.627464][T15364] kobject: 'queues' (000000001da22446): kobject_cleanup, parent (null) [ 3171.632330][ T3877] kobject: 'loop5' (000000007f87e100): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3171.638394][T15364] kobject: 'queues' (000000001da22446): calling ktype release [ 3171.654945][ T3877] kobject: 'loop3' (00000000fae1d02a): kobject_uevent_env [ 3171.656983][T15364] kobject: 'queues' (000000001da22446): kset_release [ 3171.667753][ T3877] kobject: 'loop3' (00000000fae1d02a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3171.681478][T15364] kobject: 'queues': free name [ 3171.686649][T15364] kobject: 'sl0' (00000000223de84f): kobject_uevent_env [ 3171.702789][T15364] kobject: 'sl0' (00000000223de84f): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3171.705261][ T3877] kobject: 'loop5' (000000007f87e100): kobject_uevent_env [ 3171.722145][T15387] kobject: 'sl1' (00000000bf720612): kobject_add_internal: parent: 'net', set: 'devices' [ 3171.732364][ T3877] kobject: 'loop5' (000000007f87e100): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 3171.733601][T15387] kobject: 'sl1' (00000000bf720612): kobject_uevent_env [ 3171.758941][T15387] kobject: 'sl1' (00000000bf720612): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3171.773646][T15387] kobject: 'queues' (00000000ed378039): kobject_add_internal: parent: 'sl1', set: '' [ 3171.784430][T15387] kobject: 'queues' (00000000ed378039): kobject_uevent_env [ 3171.794925][T15387] kobject: 'queues' (00000000ed378039): kobject_uevent_env: filter function caused the event to drop! [ 3171.807035][T15387] kobject: 'rx-0' (00000000b1e1d23a): kobject_add_internal: parent: 'queues', set: 'queues' [ 3171.820814][T15387] kobject: 'rx-0' (00000000b1e1d23a): kobject_uevent_env [ 3171.828245][T15387] kobject: 'rx-0' (00000000b1e1d23a): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3171.841548][T15387] kobject: 'tx-0' (000000007809b69b): kobject_add_internal: parent: 'queues', set: 'queues' [ 3171.853212][T15387] kobject: 'tx-0' (000000007809b69b): kobject_uevent_env [ 3171.861016][T15387] kobject: 'tx-0' (000000007809b69b): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3171.877639][T15368] kobject: 'sl0' (0000000092377b2c): kobject_add_internal: parent: 'net', set: 'devices' [ 3171.889482][T15368] kobject: 'sl0' (0000000092377b2c): kobject_uevent_env [ 3171.896551][T15368] kobject: 'sl0' (0000000092377b2c): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3171.909910][T15368] kobject: 'queues' (0000000089374e83): kobject_add_internal: parent: 'sl0', set: '' [ 3171.920801][T15368] kobject: 'queues' (0000000089374e83): kobject_uevent_env [ 3171.928107][T15368] kobject: 'queues' (0000000089374e83): kobject_uevent_env: filter function caused the event to drop! [ 3171.940472][T15368] kobject: 'rx-0' (0000000029c297d6): kobject_add_internal: parent: 'queues', set: 'queues' [ 3171.962632][T15368] kobject: 'rx-0' (0000000029c297d6): kobject_uevent_env [ 3171.979783][T15368] kobject: 'rx-0' (0000000029c297d6): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3172.002722][T15368] kobject: 'tx-0' (00000000738f66c4): kobject_add_internal: parent: 'queues', set: 'queues' [ 3172.023911][T15368] kobject: 'tx-0' (00000000738f66c4): kobject_uevent_env [ 3172.041084][T15368] kobject: 'tx-0' (00000000738f66c4): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3172.061273][T15364] kobject: 'sl0' (00000000223de84f): kobject_cleanup, parent (null) [ 3172.076124][T15387] kobject: 'rx-0' (00000000b1e1d23a): kobject_cleanup, parent 00000000ed378039 [ 3172.087744][T15364] kobject: 'sl0' (00000000223de84f): calling ktype release [ 3172.094758][T15387] kobject: 'rx-0' (00000000b1e1d23a): auto cleanup 'remove' event [ 3172.113959][T15364] kobject: 'sl0': free name [ 3172.115658][T15387] kobject: 'rx-0' (00000000b1e1d23a): kobject_uevent_env [ 3172.134358][T15387] kobject: 'rx-0' (00000000b1e1d23a): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3172.151312][T15387] kobject: 'rx-0' (00000000b1e1d23a): auto cleanup kobject_del [ 3172.161224][T15387] kobject: 'rx-0' (00000000b1e1d23a): calling ktype release [ 3172.169978][T15387] kobject: 'rx-0': free name [ 3172.175019][T15387] kobject: 'tx-0' (000000007809b69b): kobject_cleanup, parent 00000000ed378039 [ 3172.189915][T15387] kobject: 'tx-0' (000000007809b69b): auto cleanup 'remove' event [ 3172.198052][T15387] kobject: 'tx-0' (000000007809b69b): kobject_uevent_env [ 3172.206509][T15387] kobject: 'tx-0' (000000007809b69b): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3172.218933][T15387] kobject: 'tx-0' (000000007809b69b): auto cleanup kobject_del [ 3172.226589][T15387] kobject: 'tx-0' (000000007809b69b): calling ktype release [ 3172.234094][T15387] kobject: 'tx-0': free name [ 3172.239239][T15387] kobject: 'queues' (00000000ed378039): kobject_cleanup, parent (null) [ 3172.248347][T15387] kobject: 'queues' (00000000ed378039): calling ktype release [ 3172.255841][T15387] kobject: 'queues' (00000000ed378039): kset_release [ 3172.262556][T15387] kobject: 'queues': free name [ 3172.267529][T15387] kobject: 'sl1' (00000000bf720612): kobject_uevent_env [ 3172.274507][T15387] kobject: 'sl1' (00000000bf720612): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3172.284899][T15368] kobject: 'rx-0' (0000000029c297d6): kobject_cleanup, parent 0000000089374e83 [ 3172.293885][T15368] kobject: 'rx-0' (0000000029c297d6): auto cleanup 'remove' event [ 3172.301789][T15368] kobject: 'rx-0' (0000000029c297d6): kobject_uevent_env [ 3172.308882][T15368] kobject: 'rx-0' (0000000029c297d6): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3172.320944][T15368] kobject: 'rx-0' (0000000029c297d6): auto cleanup kobject_del [ 3172.328562][T15368] kobject: 'rx-0' (0000000029c297d6): calling ktype release [ 3172.341024][T15368] kobject: 'rx-0': free name [ 3172.347138][T15368] kobject: 'tx-0' (00000000738f66c4): kobject_cleanup, parent 0000000089374e83 [ 3172.356306][T15368] kobject: 'tx-0' (00000000738f66c4): auto cleanup 'remove' event [ 3172.364155][T15368] kobject: 'tx-0' (00000000738f66c4): kobject_uevent_env [ 3172.371286][T15368] kobject: 'tx-0' (00000000738f66c4): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3172.384109][T15368] kobject: 'tx-0' (00000000738f66c4): auto cleanup kobject_del [ 3172.391755][T15368] kobject: 'tx-0' (00000000738f66c4): calling ktype release [ 3172.399141][T15368] kobject: 'tx-0': free name [ 3172.403747][T15368] kobject: 'queues' (0000000089374e83): kobject_cleanup, parent (null) [ 3172.412905][T15368] kobject: 'queues' (0000000089374e83): calling ktype release [ 3172.420393][T15368] kobject: 'queues' (0000000089374e83): kset_release [ 3172.427065][T15368] kobject: 'queues': free name [ 3172.432297][T15368] kobject: 'sl0' (0000000092377b2c): kobject_uevent_env [ 3172.439300][T15368] kobject: 'sl0' (0000000092377b2c): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3172.451332][T15430] kobject: 'sl1' (00000000d5be9e8c): kobject_add_internal: parent: 'net', set: 'devices' [ 3172.463257][T15430] kobject: 'sl1' (00000000d5be9e8c): kobject_uevent_env [ 3172.472423][T15430] kobject: 'sl1' (00000000d5be9e8c): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3172.485846][T15430] kobject: 'queues' (00000000f8730af9): kobject_add_internal: parent: 'sl1', set: '' [ 3172.496649][T15430] kobject: 'queues' (00000000f8730af9): kobject_uevent_env [ 3172.504550][T15430] kobject: 'queues' (00000000f8730af9): kobject_uevent_env: filter function caused the event to drop! [ 3172.518806][T15430] kobject: 'rx-0' (000000004c1f7722): kobject_add_internal: parent: 'queues', set: 'queues' [ 3172.529079][T15430] kobject: 'rx-0' (000000004c1f7722): kobject_uevent_env [ 3172.537663][T15430] kobject: 'rx-0' (000000004c1f7722): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3172.551002][T15430] kobject: 'tx-0' (00000000cbc85670): kobject_add_internal: parent: 'queues', set: 'queues' [ 3172.563369][T15430] kobject: 'tx-0' (00000000cbc85670): kobject_uevent_env [ 3172.570674][T15430] kobject: 'tx-0' (00000000cbc85670): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3172.586175][T15387] kobject: 'sl1' (00000000bf720612): kobject_cleanup, parent (null) [ 3172.586182][T15368] kobject: 'sl0' (0000000092377b2c): kobject_cleanup, parent (null) [ 3172.586194][T15368] kobject: 'sl0' (0000000092377b2c): calling ktype release [ 3172.613781][T15387] kobject: 'sl1' (00000000bf720612): calling ktype release [ 3172.621148][T15387] kobject: 'sl1': free name [ 3172.626166][T15430] kobject: 'rx-0' (000000004c1f7722): kobject_cleanup, parent 00000000f8730af9 [ 3172.637583][T15368] kobject: 'sl0': free name 19:37:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x2, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(r0, 0x400442c8, &(0x7f00000000c0)=ANY=[@ANYRES32=r2, @ANYBLOB="00000000010020531e3d75dd4f78bd094d4851b296b0"]) getsockname$inet6(r0, &(0x7f0000000040), &(0x7f0000000080)=0x1c) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, 0x0) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) close(r1) syz_genetlink_get_family_id$tipc2(&(0x7f00000019c0)='TIPCv2\x00') fanotify_mark(0xffffffffffffffff, 0x4, 0x20, 0xffffffffffffffff, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) [ 3172.642284][T15430] kobject: 'rx-0' (000000004c1f7722): auto cleanup 'remove' event [ 3172.664206][ T3877] kobject: 'loop2' (000000000725137b): kobject_uevent_env [ 3172.673539][T15430] kobject: 'rx-0' (000000004c1f7722): kobject_uevent_env [ 3172.685726][ T3877] kobject: 'loop2' (000000000725137b): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 3172.711160][T15430] kobject: 'rx-0' (000000004c1f7722): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/rx-0' [ 3172.752010][T15430] kobject: 'rx-0' (000000004c1f7722): auto cleanup kobject_del [ 3172.771517][T15430] kobject: 'rx-0' (000000004c1f7722): calling ktype release [ 3172.781090][T15430] kobject: 'rx-0': free name [ 3172.789067][T15430] kobject: 'tx-0' (00000000cbc85670): kobject_cleanup, parent 00000000f8730af9 [ 3172.798030][T15430] kobject: 'tx-0' (00000000cbc85670): auto cleanup 'remove' event [ 3172.806908][T15430] kobject: 'tx-0' (00000000cbc85670): kobject_uevent_env [ 3172.814453][T15430] kobject: 'tx-0' (00000000cbc85670): fill_kobj_path: path = '/devices/virtual/net/sl1/queues/tx-0' [ 3172.826132][T15430] kobject: 'tx-0' (00000000cbc85670): auto cleanup kobject_del [ 3172.833861][T15430] kobject: 'tx-0' (00000000cbc85670): calling ktype release [ 3172.841272][T15430] kobject: 'tx-0': free name [ 3172.845856][T15430] kobject: 'queues' (00000000f8730af9): kobject_cleanup, parent (null) [ 3172.855391][T15430] kobject: 'queues' (00000000f8730af9): calling ktype release [ 3172.862899][T15430] kobject: 'queues' (00000000f8730af9): kset_release [ 3172.869874][T15430] kobject: 'queues': free name [ 3172.874884][T15430] kobject: 'sl1' (00000000d5be9e8c): kobject_uevent_env [ 3172.881887][T15430] kobject: 'sl1' (00000000d5be9e8c): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3172.891914][T15451] kobject: 'sl0' (000000005525fedb): kobject_add_internal: parent: 'net', set: 'devices' [ 3172.902380][T15451] kobject: 'sl0' (000000005525fedb): kobject_uevent_env [ 3172.909580][T15451] kobject: 'sl0' (000000005525fedb): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3172.922582][T15451] kobject: 'queues' (000000007ba97eb6): kobject_add_internal: parent: 'sl0', set: '' [ 3172.933390][T15451] kobject: 'queues' (000000007ba97eb6): kobject_uevent_env [ 3172.940818][T15451] kobject: 'queues' (000000007ba97eb6): kobject_uevent_env: filter function caused the event to drop! [ 3172.954561][T15451] kobject: 'rx-0' (0000000029a31da6): kobject_add_internal: parent: 'queues', set: 'queues' [ 3172.964785][T15451] kobject: 'rx-0' (0000000029a31da6): kobject_uevent_env [ 3172.973335][T15451] kobject: 'rx-0' (0000000029a31da6): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' [ 3172.986202][T15451] kobject: 'tx-0' (000000002054c649): kobject_add_internal: parent: 'queues', set: 'queues' [ 3172.996447][T15451] kobject: 'tx-0' (000000002054c649): kobject_uevent_env [ 3173.018634][T15451] kobject: 'tx-0' (000000002054c649): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3173.032509][T15430] kobject: 'sl1' (00000000d5be9e8c): kobject_cleanup, parent (null) [ 3173.042463][T15451] kobject: 'rx-0' (0000000029a31da6): kobject_cleanup, parent 000000007ba97eb6 [ 3173.058490][T15430] kobject: 'sl1' (00000000d5be9e8c): calling ktype release 19:37:08 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, &(0x7f0000000040)=ANY=[@ANYRES32, @ANYBLOB="007b304444c3792c0d7e359f8c74c9bf"]) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) close(r0) syz_genetlink_get_family_id$tipc2(0x0) fanotify_mark(0xffffffffffffffff, 0x4, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file0\x00') 19:37:08 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x05\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:37:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x200096dc) 19:37:08 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) 19:37:08 executing program 5: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/sys/net/ipv4/vs/sync_version\x00', 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) sendto$isdn(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="3f260000000100009e2b400f2358fa1a0716dd625fc3c9501eb97d1b3bd8752fc10f69b74f861a1923db6be1dbd88a914f257d8775e8625128037db3753bd34829df6c9361261abfcb2fdc75f878756c642548cc31a8e877575984f07ab0185991e8f2e4dfa840063c66e940c6e0c815b873057128e6c1d638aa76b044a96a3e"], 0x4a, 0x8080, &(0x7f00000027c0)={0x22, 0x0, 0x1, 0x9, 0x4}, 0x6) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_SIOCETHTOOL(r3, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000000)=@ethtool_ringparam={0xd}}) membarrier(0x25, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0xd) [ 3173.065728][T15430] kobject: 'sl1': free name [ 3173.078490][T15451] kobject: 'rx-0' (0000000029a31da6): auto cleanup 'remove' event [ 3173.086325][T15451] kobject: 'rx-0' (0000000029a31da6): kobject_uevent_env 19:37:08 executing program 3: socket$inet6_dccp(0xa, 0x6, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) [ 3173.122463][ T3877] kobject: 'loop4' (00000000a09d31a3): kobject_uevent_env [ 3173.138504][ T3877] kobject: 'loop4' (00000000a09d31a3): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 3173.161292][T15451] kobject: 'rx-0' (0000000029a31da6): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/rx-0' 19:37:08 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 'syz1\x00', 'syz1\x00'}, 0x118) [ 3173.198693][T15451] kobject: 'rx-0' (0000000029a31da6): auto cleanup kobject_del [ 3173.206748][ T3877] kobject: 'loop3' (00000000fae1d02a): kobject_uevent_env [ 3173.222713][ T3877] kobject: 'loop3' (00000000fae1d02a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3173.234903][T15451] kobject: 'rx-0' (0000000029a31da6): calling ktype release 19:37:08 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, 0x10) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) 19:37:09 executing program 3: openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x141102, 0x0) [ 3173.265869][T15451] kobject: 'rx-0': free name [ 3173.276811][T15451] kobject: 'tx-0' (000000002054c649): kobject_cleanup, parent 000000007ba97eb6 19:37:09 executing program 0: r0 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, 'syz1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\a\x00', 'syz1\x00', 'syz1\x00'}, 0x118) 19:37:09 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000240)={0x2, 0x0, @multicast1}, 0x10) [ 3173.311021][T15451] kobject: 'tx-0' (000000002054c649): auto cleanup 'remove' event [ 3173.319311][ T3877] kobject: 'loop3' (00000000fae1d02a): kobject_uevent_env [ 3173.326456][ T3877] kobject: 'loop3' (00000000fae1d02a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3173.336841][T15451] kobject: 'tx-0' (000000002054c649): kobject_uevent_env [ 3173.352552][T15451] kobject: 'tx-0' (000000002054c649): fill_kobj_path: path = '/devices/virtual/net/sl0/queues/tx-0' [ 3173.382560][T15451] kobject: 'tx-0' (000000002054c649): auto cleanup kobject_del [ 3173.393942][T15451] kobject: 'tx-0' (000000002054c649): calling ktype release [ 3173.402657][ T3877] kobject: 'loop3' (00000000fae1d02a): kobject_uevent_env [ 3173.407154][T15451] kobject: 'tx-0': free name [ 3173.410267][ T3877] kobject: 'loop3' (00000000fae1d02a): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 3173.416854][T15451] kobject: 'queues' (000000007ba97eb6): kobject_cleanup, parent (null) [ 3173.443246][T15451] kobject: 'queues' (000000007ba97eb6): calling ktype release [ 3173.453156][T15451] kobject: 'queues' (000000007ba97eb6): kset_release [ 3173.460413][T15451] kobject: 'queues': free name [ 3173.465553][T15451] kobject: 'sl0' (000000005525fedb): kobject_uevent_env [ 3173.474405][T15451] kobject: 'sl0' (000000005525fedb): fill_kobj_path: path = '/devices/virtual/net/sl0' [ 3173.486593][T15475] kobject: 'sl1' (000000008feda332): kobject_add_internal: parent: 'net', set: 'devices' [ 3173.502699][T15475] kobject: 'sl1' (000000008feda332): kobject_uevent_env [ 3173.510735][T15475] kobject: 'sl1' (000000008feda332): fill_kobj_path: path = '/devices/virtual/net/sl1' [ 3173.522136][T15475] kobject: 'queues' (0000000076ac107a): kobject_add_internal: parent: 'sl1', set: '' [ 3173.537920][T15475] kobject: 'queues' (0000000076ac107a): kobject_uevent_env [ 3173.548754][T15475] kobject: 'queues' (0000000076ac107a): kobject_uevent_env: filter function caused the event to drop! [ 3173.560213][T15475] kobject: 'rx-0' (00000000d613f5b7): kobject_add_internal: parent: 'queues', set: 'queues' [ 3173.576629][T15475] kobject: 'rx-0' (00000000d613f5b7): kobject_uevent_env [ 3173.587332][T15475] kobject: '