[ 42.027048] audit: type=1800 audit(1550034676.716:25): pid=7758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 42.054209] audit: type=1800 audit(1550034676.726:26): pid=7758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 42.087341] audit: type=1800 audit(1550034676.726:27): pid=7758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [ 42.118672] audit: type=1800 audit(1550034676.726:28): pid=7758 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="ssh" dev="sda1" ino=2417 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.90' (ECDSA) to the list of known hosts. 2019/02/13 05:11:29 fuzzer started 2019/02/13 05:11:32 dialing manager at 10.128.0.26:44601 2019/02/13 05:11:32 syscalls: 1 2019/02/13 05:11:32 code coverage: enabled 2019/02/13 05:11:32 comparison tracing: enabled 2019/02/13 05:11:32 extra coverage: extra coverage is not supported by the kernel 2019/02/13 05:11:32 setuid sandbox: enabled 2019/02/13 05:11:32 namespace sandbox: enabled 2019/02/13 05:11:32 Android sandbox: /sys/fs/selinux/policy does not exist 2019/02/13 05:11:32 fault injection: enabled 2019/02/13 05:11:32 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/02/13 05:11:32 net packet injection: enabled 2019/02/13 05:11:32 net device setup: enabled 05:14:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x297ef) syzkaller login: [ 211.623516] IPVS: ftp: loaded support on port[0] = 21 05:14:06 executing program 1: openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x60ec, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x29, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f00000004c0)='/group.stat\x00<#\xfbW*\x1f\x02\x94\xe6\xf3x\xb4\x1a\xd5KM\x9d\x9a\x1fc\xf8xZ\xd1\x88\xa7\xe1\xc8\x88u\xe0[\x18\xa4\xcb:\x9c\xd1-\xce\xa4@\xd8\x99\xc2,e+:G\x1bJ\x7f\xa2\xf3\xfd\xf6\xe04\xd8\x04\xe5\xf0\xdfK\x1d\xeeH;\x15v$\xc5\x9c\x01\x00\xe8\x9ej5|\x00\x00\x00', 0x2761, 0x0) ioctl$VIDIOC_SUBDEV_ENUM_DV_TIMINGS(0xffffffffffffffff, 0xc0945662, 0x0) write$cgroup_int(r1, &(0x7f0000000080), 0x297ef) ioctl$KVM_GET_CLOCK(r1, 0x8030ae7c, 0x0) setsockopt$TIPC_MCAST_REPLICAST(0xffffffffffffffff, 0x10f, 0x86) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000480)={0x0, @multicast1}, &(0x7f0000000540)=0xc) sendmsg$xdp(r0, &(0x7f0000000940)={&(0x7f0000000580)={0x2c, 0x0, r2, 0x39}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x20004000) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000140)={'veth1_to_team\x00', {0x2, 0x0, @rand_addr=0x93db}}) ioctl$KVM_SET_GUEST_DEBUG(0xffffffffffffffff, 0x4048ae9b, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, 0x0) [ 211.745808] chnl_net:caif_netlink_parms(): no params data found [ 211.797561] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.805624] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.814567] device bridge_slave_0 entered promiscuous mode [ 211.823062] bridge0: port 2(bridge_slave_1) entered blocking state [ 211.829489] bridge0: port 2(bridge_slave_1) entered disabled state [ 211.843613] device bridge_slave_1 entered promiscuous mode [ 211.857238] IPVS: ftp: loaded support on port[0] = 21 05:14:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/fib_trie\x00') sendmsg(0xffffffffffffffff, &(0x7f0000002fc8)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[]}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x400000000000) [ 211.897676] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 211.924133] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 211.981326] team0: Port device team_slave_0 added [ 211.987700] team0: Port device team_slave_1 added [ 212.078963] chnl_net:caif_netlink_parms(): no params data found [ 212.089392] IPVS: ftp: loaded support on port[0] = 21 05:14:06 executing program 3: r0 = syz_open_dev$loop(&(0x7f00000004c0)='/dev/loop#\x00', 0x0, 0x100082) r1 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r0, r1, &(0x7f0000000240)=0x600, 0x20000102000007) [ 212.253594] device hsr_slave_0 entered promiscuous mode [ 212.292208] IPVS: ftp: loaded support on port[0] = 21 05:14:07 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(0xffffffffffffffff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x40000141042, 0x0) getresuid(0x0, &(0x7f0000000440), 0x0) r1 = open(&(0x7f0000000240)='./bus\x00', 0x141042, 0x0) write$binfmt_misc(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="ef"], 0x1) sendfile(r1, r1, &(0x7f00000000c0), 0x0) sendfile(r0, r1, &(0x7f0000000140), 0x8fff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) [ 212.321836] device hsr_slave_1 entered promiscuous mode [ 212.456013] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.462587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 212.469653] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.476079] bridge0: port 1(bridge_slave_0) entered forwarding state 05:14:07 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20, @local}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3}}, &(0x7f00000000c0)='syzkaller\x00', 0x1, 0x169, &(0x7f0000000180)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2000000000000005, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={r0, r1}) write$binfmt_elf32(r2, &(0x7f0000000140)=ANY=[], 0xff3e) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) close(0xffffffffffffffff) [ 212.607600] IPVS: ftp: loaded support on port[0] = 21 [ 212.645916] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.654359] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.662928] device bridge_slave_0 entered promiscuous mode [ 212.672832] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.679202] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.687367] device bridge_slave_1 entered promiscuous mode [ 212.761121] IPVS: ftp: loaded support on port[0] = 21 [ 212.767081] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.775037] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.797949] chnl_net:caif_netlink_parms(): no params data found [ 212.817355] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 212.829828] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 212.930528] team0: Port device team_slave_0 added [ 212.938770] team0: Port device team_slave_1 added [ 212.959924] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.966473] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.973900] device bridge_slave_0 entered promiscuous mode [ 212.984363] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.990864] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.998221] device bridge_slave_1 entered promiscuous mode [ 213.004788] chnl_net:caif_netlink_parms(): no params data found [ 213.032161] 8021q: adding VLAN 0 to HW filter on device bond0 [ 213.103425] device hsr_slave_0 entered promiscuous mode [ 213.160711] device hsr_slave_1 entered promiscuous mode [ 213.239923] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.275217] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.281722] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.288773] device bridge_slave_0 entered promiscuous mode [ 213.295717] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.302168] bridge0: port 2(bridge_slave_1) entered disabled state [ 213.309510] device bridge_slave_1 entered promiscuous mode [ 213.317774] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.388553] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 213.397515] team0: Port device team_slave_0 added [ 213.405925] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.413706] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.422503] 8021q: adding VLAN 0 to HW filter on device team0 [ 213.435655] team0: Port device team_slave_1 added [ 213.449716] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 213.553430] device hsr_slave_0 entered promiscuous mode [ 213.610864] device hsr_slave_1 entered promiscuous mode [ 213.668269] chnl_net:caif_netlink_parms(): no params data found [ 213.693988] team0: Port device team_slave_0 added [ 213.700710] team0: Port device team_slave_1 added [ 213.723739] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.731920] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.739653] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.746101] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.753696] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.762502] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.770093] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.776496] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.783557] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 213.801615] chnl_net:caif_netlink_parms(): no params data found [ 213.873466] device hsr_slave_0 entered promiscuous mode [ 213.920547] device hsr_slave_1 entered promiscuous mode [ 214.033674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 214.063908] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 214.073921] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 214.097668] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.104241] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.112073] device bridge_slave_0 entered promiscuous mode [ 214.118805] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.125315] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.132736] device bridge_slave_1 entered promiscuous mode [ 214.143956] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 214.153190] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 214.161166] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 214.168821] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 214.176702] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.184611] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.192703] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.200200] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.208280] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 214.215482] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 214.245789] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 214.272646] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.281939] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.291506] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.297919] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.305142] device bridge_slave_0 entered promiscuous mode [ 214.312557] bridge0: port 2(bridge_slave_1) entered blocking state [ 214.318917] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.326374] device bridge_slave_1 entered promiscuous mode [ 214.356313] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 214.375534] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.388904] team0: Port device team_slave_0 added [ 214.398917] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 214.437891] team0: Port device team_slave_1 added [ 214.464986] team0: Port device team_slave_0 added 05:14:09 executing program 0: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) prctl$PR_SET_NAME(0xf, &(0x7f00000000c0)='\x00') r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000180)='/proc/capi/capi20\x00', 0x200, 0x0) setsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f00000001c0)=0x6, 0x4) [ 214.534294] device hsr_slave_0 entered promiscuous mode [ 214.580788] device hsr_slave_1 entered promiscuous mode 05:14:09 executing program 0: r0 = socket$inet6(0xa, 0x4, 0x0) r1 = syz_open_dev$cec(&(0x7f0000004740)='/dev/cec#\x00', 0x2, 0x2) symlinkat(&(0x7f0000004680)='./file0\x00', r1, &(0x7f0000004700)='./file0\x00') ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") getsockopt$inet_buf(r0, 0x84, 0x8, &(0x7f0000dcffe8)=""/24, &(0x7f0000004640)=0x18) r2 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x400000, 0x0) setsockopt$TIPC_IMPORTANCE(r2, 0x10f, 0x7f, &(0x7f0000000080)=0xfffffffffffffffa, 0x4) recvmsg$kcm(r2, &(0x7f0000004600)={&(0x7f00000000c0)=@pptp={0x18, 0x2, {0x0, @loopback}}, 0x80, &(0x7f0000003540)=[{&(0x7f0000000040)=""/2, 0x2}, {&(0x7f0000000180)=""/106, 0x6a}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/132, 0x84}, {&(0x7f00000012c0)=""/4096, 0x1000}, {&(0x7f00000022c0)=""/4096, 0x1000}, {&(0x7f00000032c0)=""/219, 0xdb}, {&(0x7f00000033c0)=""/119, 0x77}, {&(0x7f0000003440)=""/255, 0xff}], 0x9, &(0x7f0000003600)=""/4096, 0x1000}, 0x0) [ 214.635514] team0: Port device team_slave_1 added [ 214.680134] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.698846] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.707655] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.721504] 8021q: adding VLAN 0 to HW filter on device team0 05:14:09 executing program 0: syz_emit_ethernet(0xba, &(0x7f0000000080)={@broadcast, @link_local, [], {@mpls_uc={0x8847, {[], @generic="93381fc791d621a88079048b65e716fa22b307a23c5fa2b8c42f9b9139a2121996eac43afb37b25a401b4422500ce0a3f38982ee2156d4e0726c3792f517fe025b699bcc36c60547bce19bac231f317f405a5e0b4c9e20e7a3c996aeb1d17d65e6de83d748ffd6e6b0822f51e419892b1fba91df5dd9fb3034c0bcc5aae5d915a97da093b66bfce4c3643ebbed2b8c7835b71c6884a6d61b24c92e8f7ec7b5414fe20a0bc81a6241e17dbe25"}}}}, 0x0) [ 214.763121] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 214.776761] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 214.784600] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 214.801519] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready 05:14:09 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x80000000, 0x14000) ioctl$FS_IOC_FSGETXATTR(r0, 0x8004550f, &(0x7f0000000080)={0x3f00}) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000000c0)=""/88) [ 214.809222] bridge0: port 1(bridge_slave_0) entered blocking state [ 214.815635] bridge0: port 1(bridge_slave_0) entered forwarding state 05:14:09 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x4f83, 0x10000) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000001c0)={0x0, {{0xa, 0x4e24, 0x0, @remote, 0xa98}}}, 0x88) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0xc0802, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000280)={0x7ff, 0x10001}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000640)={"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"}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000140)={0x7, 0x4000000000000000, 0x3, 0x4, 0x1}) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, 0x0) [ 214.863734] 8021q: adding VLAN 0 to HW filter on device bond0 [ 214.913565] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 214.931349] device hsr_slave_0 entered promiscuous mode [ 214.962738] device hsr_slave_1 entered promiscuous mode [ 214.981400] hrtimer: interrupt took 27920 ns [ 215.022559] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.039024] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.051135] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.058959] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.066981] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.073396] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.081987] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.099172] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.128484] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.135762] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.143308] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.151726] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.159610] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.166009] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.172842] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.180877] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.188621] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.196347] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.202713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.209527] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.217354] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.224892] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.232847] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.240796] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.249711] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.257044] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.279376] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.287839] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.295867] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.302279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.309546] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.317449] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.325154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.332832] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.375596] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.397520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.405738] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.418520] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.426229] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.432587] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.439929] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.449169] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.457968] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.466144] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.475125] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.483665] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.493789] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.502066] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.509738] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.517677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready 05:14:10 executing program 0: r0 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x4f83, 0x10000) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000001c0)={0x0, {{0xa, 0x4e24, 0x0, @remote, 0xa98}}}, 0x88) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0xc0802, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000280)={0x7ff, 0x10001}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000640)={"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"}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000140)={0x7, 0x4000000000000000, 0x3, 0x4, 0x1}) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, 0x0) [ 215.525450] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.533462] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.541196] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.558019] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.566692] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.608486] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.619712] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 215.627152] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.635664] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 215.643907] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 215.653520] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 215.661581] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 215.671280] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 215.687738] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.709099] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 215.722716] 8021q: adding VLAN 0 to HW filter on device team0 [ 215.746415] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 215.754756] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 215.766034] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 215.775654] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 215.783873] bridge0: port 1(bridge_slave_0) entered blocking state [ 215.790204] bridge0: port 1(bridge_slave_0) entered forwarding state [ 215.814686] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 215.830741] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 215.838148] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 215.847150] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 215.854968] bridge0: port 2(bridge_slave_1) entered blocking state [ 215.861377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 215.871695] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 215.879758] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 215.902146] 8021q: adding VLAN 0 to HW filter on device bond0 [ 215.913280] 8021q: adding VLAN 0 to HW filter on device batadv0 05:14:10 executing program 1: r0 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0x4f83, 0x10000) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x2d, &(0x7f00000001c0)={0x0, {{0xa, 0x4e24, 0x0, @remote, 0xa98}}}, 0x88) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0xc0802, 0x0) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f0000000280)={0x7ff, 0x10001}) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$sock_SIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_LAPIC(r4, 0x4400ae8f, &(0x7f0000000640)={"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"}) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r3, 0x6, 0x23, &(0x7f00000000c0)={&(0x7f0000ffa000/0x4000)=nil, 0x4000}, &(0x7f0000000100)=0x10) ioctl$KVM_DEASSIGN_PCI_DEVICE(r3, 0x4040ae72, &(0x7f0000000140)={0x7, 0x4000000000000000, 0x3, 0x4, 0x1}) ioctl$KVM_SET_MP_STATE(r4, 0x4004ae99, &(0x7f0000000040)=0x2) ioctl$KVM_RUN(r4, 0xae80, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x8208ae63, 0x0) [ 215.943547] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 215.964575] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 215.979530] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 215.999388] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.007350] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.015095] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.024014] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.084312] 8021q: adding VLAN 0 to HW filter on device team0 [ 216.132247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 216.148255] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 216.173193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.185327] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready 05:14:10 executing program 0: r0 = socket$inet(0x10, 0x3, 0xc) ioctl$sock_ifreq(r0, 0x896d, &(0x7f0000000040)={'erspan0\x00', @ifru_flags=0x1800}) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000000000)="240000000b0607031dfffd946fa2830020200a0009000100061d85680c1baba20400ff7e", 0x24}], 0x1, 0x0, 0x2ed}, 0x0) [ 216.213779] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 216.235322] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 216.249165] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 216.276625] bridge0: port 1(bridge_slave_0) entered blocking state [ 216.283091] bridge0: port 1(bridge_slave_0) entered forwarding state [ 216.322437] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 216.337122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 216.356367] bridge0: port 2(bridge_slave_1) entered blocking state [ 216.362804] bridge0: port 2(bridge_slave_1) entered forwarding state 05:14:11 executing program 2: r0 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0xfffffffffffffff9, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000300)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000440)=0xe8) renameat2(r0, &(0x7f00000004c0)='./file0\x00', r0, &(0x7f0000000500)='./file0\x00', 0x7) lstat(&(0x7f0000000480)='./file0\x00', 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f00000007c0)=ANY=[@ANYBLOB="3c0100003cf9c5640c3367515e8e1700000026bd7000ffdbdf257f000000000000330000e4ab1e01010000000000000000000000000000000000000000000000001414bb0000000000000000000000004e230006000000000000a0207e000000000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="00000080000000000000000000000000000000000000000000000000000000004e2300004e2000090a00a0a0ff000000", @ANYRES32=r2, @ANYRES32=0x0, @ANYBLOB="000000000000000087000000000000005fcc5a1b0000000008000000000000000400000000000000080000000000000006000000000000003f000000000000000400000000000000000000000000000000000000000000000000000001000000f58c00000000000000010100000000000300000006000000080000002abd700014000d00ff010000000000000000000000000001"], 0x13c}, 0x1, 0x0, 0x0, 0x4000}, 0x800) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmget(0x2, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'gcm(twofish)\x00'}, 0x58) get_mempolicy(&(0x7f00000001c0), &(0x7f0000000200), 0xbe6d, &(0x7f0000ffb000/0x3000)=nil, 0x2) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="b7f2288a911993f0265df5cf1cdd8b55", 0x10) r4 = accept$alg(r3, 0x0, 0x0) sendmsg$alg(r4, &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r4, &(0x7f0000000040)=[{{&(0x7f0000000140)=@ethernet={0x0, @remote}, 0x80, &(0x7f0000001600)=[{&(0x7f0000001540)=""/165, 0x7e0}], 0x1, &(0x7f0000001680)=""/72, 0x3e}}], 0x1, 0x0, &(0x7f0000002240)) ioctl$sock_TIOCOUTQ(r4, 0x5411, &(0x7f0000000240)) 05:14:11 executing program 1: r0 = socket(0x10, 0x802, 0x0) write(r0, &(0x7f0000000080)="240000001a0025f0006bb48972fc1d658af804ff3dc94007f7fdff041c020b3e9e966ea38dac4909d499b976021f20425b16599390aefe019ee716e8ad88d754004374dcd9ab347b10ed318dc6cebef0d6014648314c9c384d67c8e8fcf62593f9b51bd21b28fa818b5815560985c7d2b8aa865a265db6ea12cb61268c620201f392ad8db1e6030f443070a78550442bd02fda70b7afeb5ca1cd5ec757ce04fe7925cb3a0ac0c158eac680d39b17", 0xfffffffffffffd5a) [ 216.411158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 216.418518] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 216.457263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 216.471194] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 216.491120] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 216.511640] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 216.526496] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 216.537626] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 216.554668] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.562206] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 216.570872] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 216.578730] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 216.590192] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 216.598024] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 216.608772] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 216.628150] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 216.640370] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 05:14:11 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000001c0)=""/246) pwritev(r0, &(0x7f0000000080), 0xbe, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x121001, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x200, 0x4000) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x38, 0x18, 0x7, 0x8, 0xb, 0x1f, 0x0, 0xcb, 0xffffffffffffffff}) [ 216.805151] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 05:14:11 executing program 5: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x2000, 0x0) ioctl$VIDIOC_QUERY_DV_TIMINGS(r3, 0x80845663, &(0x7f0000000100)={0x0, @reserved}) ioctl$KVM_SET_VCPU_EVENTS(r2, 0x4040aea0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x1}) ioctl$KVM_SET_MP_STATE(r2, 0x4004ae99, &(0x7f0000000040)=0xa) ioctl$KVM_RUN(r2, 0xae80, 0x0) 05:14:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x0) gettid() sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)={0x38, 0x1, 0x0, 0x108, 0x70bd2a, 0x25dfdbfd, {0x2, 0x0, 0x3}, [@nested={0x10, 0x5c, [@generic, @typed={0xc, 0x69, @u64=0x4}]}, @nested={0x14, 0x8f, [@typed={0x8, 0x0, @ipv4=@loopback}, @typed={0x8, 0x92, @fd=r0}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4004) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000140)="420fb507b805000000b98de92d630f01c1f2430f3566b869008ec0f0814b00ec480000470f017a00f3f7e4470f017cc0423e26460f21f6410f01df", 0x3b}], 0x1, 0x0, &(0x7f0000000000), 0x101) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x4000}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x80004, 0x0) syz_open_dev$cec(&(0x7f0000000380)='/dev/cec#\x00', 0x2, 0x2) r4 = socket$inet(0x2, 0x1, 0x1f) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x20040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20ncci\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, 0x0, 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f000000e000/0x4000)=nil) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0x78, "d408adc5d08c5b5b4ec4ec79aa0f7ed1dec7ff1c16fa5580b5d9c4df207e67e802bed836d5132abce70008dde10c8459292dd75159adc7d2f820a2c3765c77d26e9bb8507b2ddbb21fb273ef76f415a9472b526a48b2442851b167029783e7185519b49165a318d1c1c33d6315ade61891a61b769e263044"}, &(0x7f00000000c0)=0x80) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000300)={r7, 0x5}, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) fsync(r6) 05:14:11 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(r1, &(0x7f0000002f40)={0x0, 0x0, &(0x7f0000002f00)={&(0x7f0000000100)=ANY=[@ANYBLOB="3c00000010000104000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c0012000c000100626f6e64000000000c00000000001500000000002ccb50f84094053d5a8e87ea3398071fba5c1809bf2df7cbba8251d30c77843885016b4f31c7adcb07f969130677a3c92b941642e09f039af4376ab1dfabece745c33a73036eb9dd20e5e053cec24c10da5f44b19a086d30a85069835c703fe86db1b2d7f111dc3fb7ed3e26ba4023eb4d8167536b78d760525267f50847acb8c5a383e98d7900a56cb1260c8c098a3322983dd9b25bc8313e58d8980c861bdad327d0c71df7c714cf5e36eafef73c39e20ddb229b0c"], 0x3c}}, 0x0) 05:14:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x8) r1 = add_key$keyring(&(0x7f00000018c0)='keyring\x00', &(0x7f0000001900)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000001940)={r1, 0x17ad, 0x71ad}, &(0x7f0000001980)={'enc=', 'oaep', ' hash=', {'streebog512-generic\x00'}}, &(0x7f0000001a00)="f0b1c7a784d1e40742c3386b59138904b91b6e14de3c2cb9d1cd5bc6e08b5994b55826cd8eeb020a03c037885e30876c617f3c07a75363050657bc6c0f026c18a214ce9e788668cd89ccd50837867df1fb4d17e3da92577d73c659f7fd1b9fd1c8b8290303d92a2c4db05eccd6685ce1ab1c1b5785d44079b9a43d79228ef980889a723b1a7673ce3d3421d3b03e6474254f0e6c72216e486421178e7bac456927f7950adcb1eafcb57b65071e21dfbccd529e", &(0x7f0000002640)=""/4096) flock(r0, 0x1) getsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000000)={@empty, 0x0}, &(0x7f0000000080)=0x14) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f0000001880)={&(0x7f0000000100), 0xc, &(0x7f0000001840)={&(0x7f0000000200)=@updpolicy={0x10c, 0x19, 0x409, 0x70bd26, 0x25dfdbff, {{@in=@multicast2, @in=@multicast1, 0x4e23, 0x800000000, 0x4e21, 0x101, 0x2, 0xa0, 0xa0, 0x7f, r2, r3}, {0xff, 0x1f, 0x8001, 0x9, 0x6, 0xc00, 0x3, 0x40000000000000}, {0x0, 0x40, 0x10001, 0x6}, 0x0, 0x6e6bbe, 0x1, 0x0, 0x1, 0x3}, [@etimer_thresh={0x8, 0xc, 0x100000000}, @coaddr={0x14, 0xe, @in6=@local}, @user_kmaddress={0x2c, 0x13, {@in6=@local, @in=@local}}, @mark={0xc, 0x15, {0x35075b, 0x3}}]}, 0x10c}, 0x1, 0x0, 0x0, 0x48805}, 0x4) syz_extract_tcp_res(&(0x7f0000000040), 0x200, 0x2) sendmmsg(r0, &(0x7f0000001c40)=[{{&(0x7f0000000340)=@can={0x1d, r2}, 0x80, &(0x7f00000000c0)=[{&(0x7f00000003c0)="31a4fd5d15ba80fb54d6fac3e5a9f080ae6b3507d970f551da2a86a50415766c9ee540914e2df52a11f88058bcd78ea0220a282deb1ba95e943379b530e6b4ef2f36163229ca9edc38ff2238cea13f8d4c", 0x51}, {&(0x7f0000000440)="97732b98db641e37c16ce71af7f66fbb5a111781f134bebdf8953c774c5cc99179ad3d5ffae5ed3cb22c627daadcb7364793bd784a51c6e18eb5511df63e3ef95a63bff52106f0a0550f5724ed4fb1cc5f9820aea92d5581108b800dc1536bf812aa5329bc6afe7964c236e90aa2d30ca13b22038eeb9a268fc8e5707dfb37b1983417f525edd2eacf9a59524e099abcc14c2caf4844fdeca8c89131ec5e4a0d67847e64c06e9bdc6136e2448f", 0xad}, {&(0x7f0000000500)="04c0f77d1778452364f0d28bec30b10aed7d9faaddc347ec6e522a1b467895631ff807a340f1024a6cd79f961d3716198472e12507d7687bf2447ddc59d5789f1223ea851bd7783dd90e1b3b870353ccb3e75534ce07750999b1cf6858834d0cfb5ba00c15accf7a362bebac172d2e431ef3751100ac097f63ec2f6f4b7904705efe973c5da028a363dc8ed9a407033a8cf27f206235b89f38200a7210a9209552d6172891cd6f4631658287c0f0ff3c89ba2c9e82545a8998fc75dad65f3a6ba8c0be3507b4ecba335d1ccd7570ba8c5a62d5886eceabf1b054f0", 0xdb}], 0x3, &(0x7f0000000600)=[{0x70, 0x11f, 0x100000001, "dccb4aa847ca4da6444058686c4165dddd5627290eee95083e0bfbab2386269ffe959a425c402465fe3988440a7140bd6f0cb4acefb35d820391ae658434f7187e41c48244e4390d593cc0554fa5cd07989d16093e7acafc498a4e"}, {0xc0, 0x1, 0x7, "cadb86604ce08461698734e2a90bc9ca5ab289317ed48d8b277cf1ac7a379c51d490ac978a9257bf7c70131d86098105c656f18d527a74a6ef8c085d2c6fd755588918cbbd10ba3a2d042bceb71f856d864077ad56b99657b7087e6ff38cb00430b319807a7d2fac594ea13b1dd24011531fd573c237a0f1b319e520b81bf5f19ee696dac7aa2ca7022018db1fda34af3aa60272e65ceef68b33f478b6647d7bd072c77c5e60468c3934"}, {0x78, 0x18d, 0x9, "97ac517a17958f9a4754a18ed1247e13e1de084d5ea92a2ee930c1d1252595e2fa7039dd3e8935e25cdf9f7c8a0cb0d10c2b6a27d161a661c33fb02a0d756bfab787cebcd32332c80639f26b755c0f8befc62afcdae1d51fbbb82f0fbaae114c7d928f4ee627df"}, {0x1010, 0x102, 0x6, "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"}], 0x11b8}, 0xfffffffffffffffc}, {{&(0x7f00000017c0)=@nfc={0x27, 0x1, 0x2, 0x5}, 0x80, &(0x7f0000001cc0), 0x0, &(0x7f0000002280)=[{0xe0, 0x105, 0x800, "dde35809b425a58c256a7f39f6c499d85b22c95d7fe0d459007bbe6404bece6692f4a513c0c077fcf07c8e8eee3e6d1687024d3245e2e0339795e5f422ec43ed1621980b8317b5857c32a21eaae68c61738f4c8166fbcd09f4ca505c3afaf045a71d4ef4aab85ed091c142e8686255f4363be6afe436b8c8f918985a6789bbda987a6f7208ef4ff3adf3d3cce26397a5341235bc4b67af57d81d37d8bfdc88a49fd89c56803de46640724f26240099ed5e6a108f6170983d91e8a8ad2906f82afd14a4488c221cc92a123ec81484"}, {0x48, 0x1ff, 0x8, "5fa5bfb47ff6820acd16856eaef75e6b631a6379ccc1c812ce8c25110cd6731b9e3c5e603844eb0d14352767a0c3abaffdcbeee5"}, {0x78, 0xff, 0x6, "000bdc0383e23a8621a54516c0d9bd9dab9c2ea494f98538d352cbf09b1c8ef62003c750f58cd080462d9b38bdd24fdc04b0662af7f741580935553d5a8afbc2ae748adc350b7efda0a4f79bf8bb050cbdc732d0f320269517db38eace3732a866d7c909ee"}, {0x20, 0x0, 0x8, "329a04752bc431e521ff58dae5a340"}, {0xd0, 0x0, 0x6, "2355aecaf94b4f3b04c915c30001bea525ef13301d98e6fce9dd4b47305bf804ec1c4a1bb610005bf15241b38bd29e9d9a6c48a80406cf493fa57c36fa190151f55eae19460553ed797b8fcd246a92b45ef0bd338da5080753330efe7462c463b399483de00a5e286606cea089c7b74f399fce219c00000dc5ff1d12215463c93b9a20982f714393fba000f7c1ed83a900efabcfa0e80e86333df3c80ba65579f4dd5f68dbaa69f238a9e02425ee3280ddef64291d1e42d981033c46"}, {0xf8, 0x116, 0x7fffffff, "93bf33ab1de7e42fa0d576514f959b09975439b4ec5356a020b600fc79d4734fbcd8e3b4e09e920858c679bd76a0beeeda163b34a7d39d3299e2f4adfb75871b96c3cfb4fdd685d40c87c1ea77a2842d37acfb75acf15fa3944aa88936f50ebce14ef5685e83bfa5f25f804f5f3fd28283160adc3aa5e443344e6b67e4ad2dda2dfa44a78ce95ff69bd7d3b1acd74bb04830d64cb9a47b43afec36b09abc3145e0a3aab44be2daa336b2dabd49d7cd68c938f5673e39c7599ff7e7fdd41ac7009cb10e8b3f2fea7f750804aea44a8d38b5f83e8a7d0b0fc82b7d779ef6c2721d6e2b"}, {0x20, 0x10f, 0x7, "603916cc0d9c22ade5ee00010d"}], 0x3a8}}], 0x2, 0x4) 05:14:11 executing program 2: r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000180)={0x0, 0x1000, "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"}, &(0x7f00000000c0)=0x1008) r1 = inotify_init1(0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r0, 0x12, 0x2, &(0x7f00000011c0)=""/126, &(0x7f0000000100)=0x7e) fcntl$setown(r1, 0x8, 0xffffffffffffffff) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) rt_sigqueueinfo(r2, 0x0, 0x0) 05:14:11 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clock_gettime(0x4, &(0x7f0000000000)) mq_timedsend(0xffffffffffffffff, 0x0, 0x0, 0x471c6b56, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) 05:14:11 executing program 5: r0 = creat(0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x6, 0x1, 0x4, 0x100, {r2, r3/1000+10000}, {0x1, 0x1, 0x6, 0x4, 0x5, 0x7, "fdf9e8d1"}, 0xc0, 0x4, @userptr=0xffffffff, 0x4}) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) ioctl$KVM_SET_ONE_REG(r0, 0x4010aeac, &(0x7f0000000000)={0xafe0, 0x4}) 05:14:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video0\x00', 0x2, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x601) r2 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x3ff, 0x2) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x1ff, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, 0x0, 0x3db) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000004c0), 0x4) getgroups(0x8, &(0x7f0000000500)=[0xee00, 0xee01, 0xffffffffffffffff, 0x0, 0xee01, 0x0, 0x0, 0xee00]) setgid(r5) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @bt={0x1, 0x0, 0x3, 0x4, 0x99c, 0x24000, 0x7, 0xd}}) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000080)) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) ioctl$BLKTRACETEARDOWN(r6, 0x1276, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x20) 05:14:11 executing program 4: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, 0x0}, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000001c0)=""/246) pwritev(r0, &(0x7f0000000080), 0xbe, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x121001, 0x0) syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x200, 0x4000) ioctl$RTC_ALM_SET(r1, 0x40247007, &(0x7f00000000c0)={0x38, 0x18, 0x7, 0x8, 0xb, 0x1f, 0x0, 0xcb, 0xffffffffffffffff}) 05:14:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d0081e753fcfb7c55885c313200e00f80ecdb4cb9d91f63190400000000000000fb120001000e00da1b", 0x2e}], 0x1}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x800, 0x0) accept$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000001c0)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}, 0x61, r2}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r1}, 0x10) 05:14:11 executing program 0: r0 = getpgrp(0x0) r1 = gettid() rt_sigprocmask(0x2, &(0x7f0000000000)={0xffffffffffffff7f}, 0x0, 0xffffffffffffffd5) r2 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffdb0}, 0x8, 0x0) rt_tgsigqueueinfo(r0, r1, 0x1f, &(0x7f0000000100)={0x0, 0x0, 0x1}) read(r2, &(0x7f0000481000)=""/128, 0x80) 05:14:12 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) getpid() capset(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x4000, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/ipc\x00') epoll_create1(0x100000080000) gettid() clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimensat(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{}, {r2, r3/1000+10000}}, 0x100) close(0xffffffffffffffff) socket$can_raw(0x1d, 0x3, 0x1) close(r0) ioctl$SG_SET_DEBUG(r1, 0x227e, 0x0) getsockopt(0xffffffffffffffff, 0x1fefffd, 0x5, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x87, "ea1ba220a95418d557cdae9a09dceb4815d6e7a4a4571cbd024546ad64aaf64e6264f7f23a07593d19c352cf3a64d74bdc18e065bf52ec704019707c5421ec71b9a598f0afd9f30d70487806abe65daf8981b89b30541eb0e5d23615d3f40ab046bae98f749f50f037005f05fe21bdb0b8f8b59e00719996f942e717a0895630b50d8c02ced9b4"}, &(0x7f00000000c0)=0x8f) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r4, 0xf78, 0x3, [0x3, 0x2a8d2d8f, 0x1f]}, &(0x7f0000000140)=0xe) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000400)={0x7fffffff, 0x1000, "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"}) write(r1, 0x0, 0xfffffe20) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000240), 0x2) [ 217.352594] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 217.395002] kvm: emulating exchange as write 05:14:12 executing program 0: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$binder(&(0x7f0000000580)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000440)={0xb5, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="440000ff7f00c9fac28b0606ecdc0400ab58c65f9f6b142cbd1986ec6882bb58ee21df982ddea18a2a941bbd5b56df7cea1f81235840aa7a5c6d2be50c2b3f160ea7a9ecc9365212b31ef3f71d7b8f48910aea0088d4dd50b16e66af40b61dd29a6248a753c5edf73d75ae72f96eb88dbeff5ee86c7e81194c70896d690b1d02278831cfb74dd38c1ef5b89b89336cbccbe5bff5dd45c71d05e70d1dc92eaffb1a721617708116ad1ad146d00b932b5cb2b53f5cd6"], 0xffffffffffffffd7, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80, 0x52) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000000)={'filter\x00', 0x3, [{}, {}, {}]}, 0x58) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000140)={0x34, 0x0, &(0x7f0000000100)}) [ 217.435256] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. [ 217.547437] binder: 8101:8102 unknown command -16777148 [ 217.607275] binder: 8101:8102 ioctl c0306201 20000440 returned -22 [ 217.671843] binder: 8101:8109 unknown command -16777148 [ 217.677265] binder: 8101:8109 ioctl c0306201 20000440 returned -22 05:14:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x0) gettid() sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)={0x38, 0x1, 0x0, 0x108, 0x70bd2a, 0x25dfdbfd, {0x2, 0x0, 0x3}, [@nested={0x10, 0x5c, [@generic, @typed={0xc, 0x69, @u64=0x4}]}, @nested={0x14, 0x8f, [@typed={0x8, 0x0, @ipv4=@loopback}, @typed={0x8, 0x92, @fd=r0}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4004) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000140)="420fb507b805000000b98de92d630f01c1f2430f3566b869008ec0f0814b00ec480000470f017a00f3f7e4470f017cc0423e26460f21f6410f01df", 0x3b}], 0x1, 0x0, &(0x7f0000000000), 0x101) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x4000}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x80004, 0x0) syz_open_dev$cec(&(0x7f0000000380)='/dev/cec#\x00', 0x2, 0x2) r4 = socket$inet(0x2, 0x1, 0x1f) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x20040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20ncci\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, 0x0, 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f000000e000/0x4000)=nil) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0x78, "d408adc5d08c5b5b4ec4ec79aa0f7ed1dec7ff1c16fa5580b5d9c4df207e67e802bed836d5132abce70008dde10c8459292dd75159adc7d2f820a2c3765c77d26e9bb8507b2ddbb21fb273ef76f415a9472b526a48b2442851b167029783e7185519b49165a318d1c1c33d6315ade61891a61b769e263044"}, &(0x7f00000000c0)=0x80) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000300)={r7, 0x5}, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) fsync(r6) 05:14:12 executing program 5: socketpair$unix(0x1, 0x0, 0x0, 0x0) getpid() capset(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x4000, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/ipc\x00') epoll_create1(0x100000080000) gettid() clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimensat(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{}, {r2, r3/1000+10000}}, 0x100) close(0xffffffffffffffff) socket$can_raw(0x1d, 0x3, 0x1) close(r0) ioctl$SG_SET_DEBUG(r1, 0x227e, 0x0) getsockopt(0xffffffffffffffff, 0x1fefffd, 0x5, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x87, "ea1ba220a95418d557cdae9a09dceb4815d6e7a4a4571cbd024546ad64aaf64e6264f7f23a07593d19c352cf3a64d74bdc18e065bf52ec704019707c5421ec71b9a598f0afd9f30d70487806abe65daf8981b89b30541eb0e5d23615d3f40ab046bae98f749f50f037005f05fe21bdb0b8f8b59e00719996f942e717a0895630b50d8c02ced9b4"}, &(0x7f00000000c0)=0x8f) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r4, 0xf78, 0x3, [0x3, 0x2a8d2d8f, 0x1f]}, &(0x7f0000000140)=0xe) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000400)={0x7fffffff, 0x1000, "6b31b7cec2d78a1a7d1e31ebc71192b01239feecfd32349227941c7ef13e907d40fb01b6026b2a5aba26e324fc5a6576cfb41afe3da8b4edcf38cfe339d5c69562d7e1d58429d57c720910ad47156ebc6ef94ab8aa6cfe61c7f856fc07cb542a11834a3cf446ee63d25b0309ed8c3fd735bdb9ee0c771472424ce7470c0b276ea479528df3680b3da668e25acdd5363a118e894f1ed22f1db0244e76499c442654b6d1e7d11c4258d54cafd997005b180c30bc4b504d725c873eb42f8d4d544d31e80aa629a6afb34eccb4ad4c60bc42feea08d45c2a65fdf3fe3623e6aa74c1078a00f766f7bfce4c0eecc0b921a312c95ba7e6d22be2cba011af64feda140cafd3b6286b5ebfde66e9bb6fd07546cfd2f43503ab4dc517d366cbdc3f55ad3e88f090ea3acde8efb5c7ab2e507790c1945215b4e2c5de1fae5d7cdd4cf5c2365522425fc20ec20e7b1c8ad16874019b4a52c7e1c0a6ed77d511fdadef951368a43f6ec8001c30d1f4537a07d3dadb943e8816625f781fa0f9ce45a51ffa9b203a4744290422b20bc9b3552659ed0aa59b423e8ea4321ae2dbabb4b766a909fc157b15736bc0f3d971c9faa644f8374d033fffe7bdb8c0e6b0f109b21fddadbfc3027e1eaf4840ad64e07bcdf3e01c8fb20834e6be090b6e063b3df4c6bcdd1063ea5cc27af51b15d7e60ba66b5fb020a8653989791e93f0236abfd193ef367706d40ceea0bbbb566af101e6655ee0122d6c836e2021fcc04f007fb4b2b78ce7582925eb10385094f0884f32d44c1ae5b94b5bcc23a0ba247da8d586abbc4ec4093e486f9d710ae60a82f17ca724b04ab4f3a3e7577fd28ade5e335583aecf6ccd01208ab94bc06b9507fdc5bf824625a2a22c6cfa35af576611d16c4663571b8f3f3e19cd8ad3d9c7ddf342ff84716bd4554581d1b80f824399978efb20836d7c7d17c2b87aae8debeb59fcccd56578f66034c0e06922bbd1c8c50271992248d14d7cf32eac1c9342b4faf73e5fb5e37c7df08a96c3bb82f94c2888d91a4fc0080496274fca47b1d7e9950acafdf7ee9fed397b94a912cb3a255d5542b08605d67a4c0aa6bb77683cd24456d1ee0842a7c31f5d3c131842941f208f33baab11fb3812ad14d0d54b8c04adcb156ff98bd261fe82157636439227ab36dd490e226fb942c1c3e36e063369698ea74fce1820b1241a9b7f3dabf7bae7ef57bb305f1d6b1b0f45175e39739acd04caca7ea2610205ccd87f6294d161e33c1b6dc0ce16328d6739e224641f123f22e4d724ec6ea4f420deaca9813743bb3f37c1bbc68d17b5089093c78b9ecd6a0003fdbbcdbf445ed869a5f1849fe9994892e03e09b7642834dc103a170e4ccf98dd4d2d60d0e7afdb6c4e4c166287591af1da7ff02ac0a6f5ad49ce84364f728176e3c0eb0346933b596aac225d8ca0fcb3d3f90d6ab560a53c8883849535cba14d7afe8945d56209c367a22859468463347fadcc4525e1cea57cc07d230fec147050495d1a2f1fd0b7203fdb86c9f87488f27f5d762f237877308b0d2a9ecd16958e69b687a843bbe056d39170f23afc7edec6d5ec2c9fc5d656d5a89cf9a14d4e37cd5dcba1da3c3041d7ad39f34e80bc57b1d7cb86ed16042913531c2194b7893552791971ffb007f307a10df498eadf339b2e2ab6149292e892b30428c06263e70c70b931ff0c88621ea5e9d223eeafd36989cfdfcf18232a10878b9caf58cad805e0ace4d123698b68a128e0b916fb3569bda00f007d653f2713f455ca589e63455445704277aebccb111ecedd6ea1f9503c681a094bb608f8980eb6886dd2184cef6d9f75410e5f43554c5a373d3b6fc2cfd7c1c991b6e0fae4dc543dc3c3e9622a4936b0789261febac94b97c52fbf105162b1566e9afed116c51bd4c27280e11f4ab0aab8228afcc53387f310c61b943f31d3b2e97758bf1064b5480cea86216d980c89dbd9ef9869c7bd88d507fa49c995dd4eee0c058c63b2e7bf64efb5e28439c908038c3a6da57ac75771009757c1335c33c29476fa3a0b7682403aad4cbcdf4fd1af11cf948a6eec18171d93472adbd5404423e69b923fb7d6edb82e75cb8bd4aba89786bee2e86ed9cac58ba61b13394c0b058ef087b367029ded2021d7629430df290fc15e57af95021a592ad36bfb78d30b75476adf88cfe16b5dc70f80c7f372f1a88d9782a7ff1a4d1022035495d35252487651a21cf3158a68cf93b6879d35df02f65c6c356e2f9d42da8debef2b5ec261e635093bcc0ea8efaa1398f5ecb0d946212ea3651887966b8d4bd4ab55e640a60f91faff29408ac4a5d91594dd76501a801857e8187d8b985367937adb2f58996cbb79b3d2f825505864f8b4ad050e4be1122daa5c47576f1359b35d4280331848974348deec00694ede697617131967086b2c4572011f018339e87f15a805e77830830f39664febf112cbb5117186fb94d5858e3792456a05405279eab0d1aad9da037c2663ff1805c08d12ea53fe0c30fe7b4b52e1d1894e4b8e7626c2c8bcc3c5861711f8e926c9e3046b0701352a1b313c03767eb4d5e696ef50df179c013018343100caf353f1cfe826b83ddebae99e325b32ef4af3256fa3b70403740616eab2368e0d93e39620fd2d67d91a8d730403e7aa6e07f92b122ea141a2b9d1df30e42cd3eba0e25bfaea4aec634584fb5bec323c64af4d937d9bde2593564bfe5c6d95acdb66eec29c9d44f36d9057543506117901b836a2ba154f234804e062a62e016dcec8388e5d095e15640a2fde7c1f3758a40894a97fb11c608f6bd9786c2075515d87416f1c45725aee979d513fee0ce4416199b487ef1aa41d76135e46bc44f3264827ee3f0a5a7c76eb3f5053a15bee27fa57d9381cc0d57fc9f9473b74fe8c8d8f1d452d9b602538925c4731b29f2f2f8c3050a5b844af2be7d1bc5be813f02fad29a0716a9bf8779d5ae419870efbc655996e04093431becccf419d0634f9200f6bcb8704d3962e1235656e9a4739a966bdb6021b7600734f62f7538dd3c915cbce08acd92114324a466861d8e44721fbc3e6b090be9c3facbcd69d78df47c7cc7fe14a04381304964ca86b92dbc44a1e417bad8cc9a2b5cf778c5e71d31f21f062493ab002fffc8e260e050c4789033a558363095e44560a1ac1d97b4877e369ae6ebe138f92b1a9ebf1cf5539f2ddf5dba8039720a1b2880359caf3c0050992b9fead3c9d20b36958268cf1198c4a965c80a19c4cdbaf8f33d6949b7f47ef90483643af34d3eee6d2647381e7ffab8e13562eacb0082a1f0a8dca41eb057f1a7e431c5acab536267ca741ea1fa63599b26af3ea544bc9217635e896ae71fbde5b5afc16f48830cbfccdbde95916caa95db75afe2a965eead6fbec85ab4022d030a0ba6d2377369d6a93345604517debb164f8fdb938b1347b5f9d92d8ae3a74ed92cfd649fc7bf9955b08f8abce92bbf2ef8401083b880bad375aa221e8572db56179dbf4a3bd43427b90451b41271a1c7578dcf1a5b9cd6e56f332e03229e695506dadf5c18ada0576ad0cb8ac2731fd2b099d3922e8fca8485f64021559ccb87745488a8e3209dc3960dc6cc1bd3f357413fc5fe52493cbfe558e5ee7558224b98affb1b0e5df6daff5cbf42450833ac8e85f0fc33fc75f3e84e8d34487ecfd2f9ba0079ea0c8704a7bd7252d6618cf053336ffe82c4a85c36486dd46ee5d88f2744d67cb360972c9d74384d56b53b79376bceb735129123841bb75e6a5e8ef8b52ba236329ba3107ad8bb4dacc5320d559ff1d4e5e0859c67b474733fea78c22cf93f530d50c1894e7ab8e9f04d4e3f19b030707c84a3b33623df2cbdefd867af45898364ebe711bd1a2dbca4f14e4b77cefdb67f2203a9509630f310cf523c94f9af123f0ff36cf2fd779012eedcd45e12c4a346e47b0a3ee8d547f79a712482f41b03eb835a513db3b294c339a4766040feb3f5daa963aaa34fc8db22089702416fc5c744ba2d10b9c176221aa0587c2e84408bb00a1472b3e42d78efff2f9dc77f2c06d2bb92e94bddab03a629501c6bc42ba26a3223b3d3cdc2fc020177c41d056b251847012b47d1327dc4ade298ec028165a6adf0664568b7366b48afb43aa90da59248d86b928bb2175b93e1d3803c34d823348fc48999133f54b973d3024b55475dbaf9bb09bed7ccdb1127f0d23debf524b41012a951c8a7d5f2ee0078f8b37d3c518f81cbb53bc753cb4e0781feef62124ba5da07de2fe9a7fb59f259f6612045db36eec0db58d1dbd5a1cc608d3a2576b5ed3620886b3761b7f9c1c2a28c52e04a2b99b995ce63b6b969749387d394a656d00b5fd238179e8fbc041f8b2a883a0262780c67523a8cf96014c15bbb529e2a29603ebcf4149b6fb7334b8aacfe2c1764f53e3ea6a098b2afb961699dbbd1574199396d2337df3dadb49514b75c403dc8218a9fe9a6ff5942a79a1b67b461d83c6a0126468a9000468293f710ef6c81ad5d1587bdcf7a07d725b526ecfa2b962126e8c6d420e73e8dabe40a26316f37ec3d36ec7f84cc450ca732f0ce29efb9e13218de1dcda55a387cd74ef15c8c4151844ae6a88de35f3a59cf303dd61e6fd59b491a2f9a564c7079b9b8217b1532c67e95557af52bb550f9e43eec41a5e232fb63340b435a9e029afbc38a9ae70ff457ef0a78a875a0c1ba02332f010693704f68e653ae3c1e58befe16fccf7bb813ea291c773965ea078b01c5fa5c9bd362f8a90f88219cc99e59c3d39abb55fb2d16e7cecfd2e16fcdd9f7fed1816936464dca76363111cd35a3d4754521162294f54bce206cec559deea3491a9205b3e87b61437b0bbf865b84176fd2bc6e8ee8e62b8758513af88c7516e472c0f980f4513143009dbea9959e94d13dbfb5ce7f7cf493da8a5a374af9701fac906382fbb00b09d87186340929bcae15d660f0d529034b4be27b97e3248f68b497fa8cb796fd022d03d6830364f2ccd5d01ee6cb6826fb317b2e382000b5ee9054bfa5075017a894cfae9f88534549764a0c9f9d3cba3b00d664729ee4d8e7c8bf5ef7129db9b7b25e9b63a14ab2c5b05b5286253c04a4ada7698a25eaaddd890f1b11921bc858f62f34cfdc617162f64037d2c223c401d154073e860ee6fe09016143214d9f4306319aeb31907c7451c1db94cfffe398d9ecfa8b31d93ba809eb87e63df4c773e5cefc9859ad69ddd14494682bf4e2c37e08051fab1cefc2c270e687ff27a32fabe3c0e22bd80fc3d2aee85e76229fe7f399506e530708329d0f16f757b8da27dba9b7f7ebe00e277bfcce3bb4865fe4b0c7cac8eba335145277bead5ae65f49d5ebe2b22a871ba0582129a7e9dd1eaac1a71bada8b89befc70166401da43f0b2c18b9bbe4140adc1fff8c9bd24e3c873d6114bb46cb44036365f3edd1b61ac7f8a620acff6623ca3444f0a08b6d74523595add5bd608ae09bcebb28216e46244ef3f3ea03ef92cf58ae41d1903771334e21e485c9c0a06db49c326ade2567cf452bf209d981c26188e01155ab105817eb8bd25c9533d3ab7558554bd438d63747160b533a2ff0287785939bd057014ebd4bb8f4235b73643a6d280750c4f46ae50ad193696ef08a8e187c03aed6f663029d439ebc13c6d1554be52e9c3098d62905569602277c4d63b331abec93870a94b7ff45d69f2918b971a0b6b715c9dae0605e165d030317d0c106a783867da7ab00d47f37416b9e7141a21e092b101f488040b14c4d99c99f7ccfe5bd12480985765004b5543"}) write(r1, 0x0, 0xfffffe20) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000240), 0x2) 05:14:12 executing program 4: socketpair$unix(0x1, 0x0, 0x0, 0x0) getpid() capset(0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffeffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$audio(0xffffffffffffff9c, 0x0, 0x4000, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000003c0)='ns/ipc\x00') epoll_create1(0x100000080000) gettid() clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimensat(r1, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)={{}, {r2, r3/1000+10000}}, 0x100) close(0xffffffffffffffff) socket$can_raw(0x1d, 0x3, 0x1) close(r0) ioctl$SG_SET_DEBUG(r1, 0x227e, 0x0) getsockopt(0xffffffffffffffff, 0x1fefffd, 0x5, 0x0, 0x0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000000)={0x0, 0x87, "ea1ba220a95418d557cdae9a09dceb4815d6e7a4a4571cbd024546ad64aaf64e6264f7f23a07593d19c352cf3a64d74bdc18e065bf52ec704019707c5421ec71b9a598f0afd9f30d70487806abe65daf8981b89b30541eb0e5d23615d3f40ab046bae98f749f50f037005f05fe21bdb0b8f8b59e00719996f942e717a0895630b50d8c02ced9b4"}, &(0x7f00000000c0)=0x8f) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000100)={r4, 0xf78, 0x3, [0x3, 0x2a8d2d8f, 0x1f]}, &(0x7f0000000140)=0xe) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000400)={0x7fffffff, 0x1000, "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"}) write(r1, 0x0, 0xfffffe20) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000240), 0x2) 05:14:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000180)="2e0000001d0081e753fcfb7c55885c313200e00f80ecdb4cb9d91f63190400000000000000fb120001000e00da1b", 0x2e}], 0x1}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x800, 0x0) accept$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f00000001c0)={@ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x14}}, 0x61, r2}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000240)={&(0x7f0000000200)='./file0\x00', r1}, 0x10) 05:14:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x20000, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0xf000, 0x1000, &(0x7f0000027000/0x1000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000014000/0x18000)=nil, &(0x7f0000000300)=[@textreal={0x8, &(0x7f0000000000)="360fae08670f01d1b8c80e8ee0f2a566b9af0300000f320fc75ac70f019af5ffba210066ed0fc79e9c5ebaa000b80118ef", 0x31}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000140)) ioctl$KVM_RUN(r2, 0xae80, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x1, 0x0) ioctl$FS_IOC_GETFLAGS(r2, 0x80086601, &(0x7f00000001c0)) setsockopt$inet6_tcp_TCP_QUEUE_SEQ(0xffffffffffffffff, 0x6, 0x15, 0x0, 0x0) ioctl$KVM_SET_SIGNAL_MASK(r2, 0x4004ae8b, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) [ 217.997859] netlink: 26 bytes leftover after parsing attributes in process `syz-executor.1'. 05:14:12 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty, 0x9}, 0x1c) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080), 0x2) fcntl$getown(r2, 0x9) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000340), 0x2) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000100)=0x6c74) close(r0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x1, {0xa, 0x4e23, 0x8, @empty, 0x100000000}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) 05:14:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000140)='/dev/video0\x00', 0x2, 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x601) r2 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x3ff, 0x2) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(0xffffffffffffffff, 0x80dc5521, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000002c0)={0x0, @in, [0x5, 0x3, 0x0, 0x1ff, 0x4, 0x0, 0x2, 0x0, 0x4, 0x100000000, 0x555, 0x100, 0x9, 0x8]}, 0x0) ioctl$sock_inet6_SIOCADDRT(r3, 0x89a0, &(0x7f0000000100)={@local, @empty, @loopback, 0x3}) syz_genetlink_get_family_id$team(0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x4000, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, 0x0, 0x3db) setsockopt$inet6_tcp_TLS_TX(r2, 0x6, 0x1, &(0x7f00000004c0), 0x4) getgroups(0x8, &(0x7f0000000500)=[0xee00, 0xee01, 0xffffffffffffffff, 0x0, 0xee01, 0x0, 0x0, 0xee00]) setgid(r5) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_open_dev$ndb(&(0x7f00000000c0)='/dev/nbd#\x00', 0xffffffffffffffff, 0x0) ioctl$VIDIOC_SUBDEV_DV_TIMINGS_CAP(r0, 0xc0905664, &(0x7f0000000200)={0x0, 0x0, [], @bt={0x1, 0x0, 0x3, 0x4, 0x99c, 0x24000, 0x7, 0xd}}) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f0000000340)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000], 0x0, 0xfff, 0x5, 0x3, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000080)) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) ioctl$BLKTRACETEARDOWN(r6, 0x1276, 0x0) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video1\x00', 0x2, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x20) 05:14:12 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000bc0)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000040)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f0000001380)=""/4096, 0x1000) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000000)=0xe1c) 05:14:12 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRES32], &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') lstat(&(0x7f0000000200)='./file0//ile0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x400, 0x200000) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f00000003c0)=""/151) chown(&(0x7f00000000c0)='./file0\x00', r0, 0x0) 05:14:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x0) gettid() sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)={0x38, 0x1, 0x0, 0x108, 0x70bd2a, 0x25dfdbfd, {0x2, 0x0, 0x3}, [@nested={0x10, 0x5c, [@generic, @typed={0xc, 0x69, @u64=0x4}]}, @nested={0x14, 0x8f, [@typed={0x8, 0x0, @ipv4=@loopback}, @typed={0x8, 0x92, @fd=r0}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4004) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000140)="420fb507b805000000b98de92d630f01c1f2430f3566b869008ec0f0814b00ec480000470f017a00f3f7e4470f017cc0423e26460f21f6410f01df", 0x3b}], 0x1, 0x0, &(0x7f0000000000), 0x101) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x4000}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x80004, 0x0) syz_open_dev$cec(&(0x7f0000000380)='/dev/cec#\x00', 0x2, 0x2) r4 = socket$inet(0x2, 0x1, 0x1f) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x20040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20ncci\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, 0x0, 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f000000e000/0x4000)=nil) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0x78, "d408adc5d08c5b5b4ec4ec79aa0f7ed1dec7ff1c16fa5580b5d9c4df207e67e802bed836d5132abce70008dde10c8459292dd75159adc7d2f820a2c3765c77d26e9bb8507b2ddbb21fb273ef76f415a9472b526a48b2442851b167029783e7185519b49165a318d1c1c33d6315ade61891a61b769e263044"}, &(0x7f00000000c0)=0x80) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000300)={r7, 0x5}, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) fsync(r6) 05:14:13 executing program 4: unshare(0x400) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x100) ioctl$SNDRV_TIMER_IOCTL_GINFO(r1, 0xc0f85403, &(0x7f0000000080)={{0xffffffffffffffff, 0x0, 0xffffffff, 0x3, 0x7}, 0xffffffffffffffe1, 0xfffffffffffffff7, 'id0\x00', 'timer0\x00', 0x0, 0x4eb484c8, 0xffff, 0x1, 0x30a0}) r2 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r2, 0x5204, 0x0) 05:14:13 executing program 0: connect$pppoe(0xffffffffffffffff, &(0x7f00000000c0)={0x18, 0x0, {0x2, @broadcast, 'batadv0\x00'}}, 0x1e) sendmmsg(0xffffffffffffffff, &(0x7f0000005b40), 0x40000000000014d, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x602000, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNINFO(r0, 0x800443d3, &(0x7f0000000100)={{0x9, 0x10001, 0xffffffff, 0x649, 0x1, 0x200}, 0x100000001, 0xdc9b}) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) sendto(r0, &(0x7f0000000040)="e59a7b603d712fc3771ac22b356559c6f9c8fc73f624e37704a0b049aa209c1bbf9b8196f8bf7364b8f20f8da22599ebcba049ab08132ec44751cf647a07a0c9c3809bccf255968783f8a7fca5089b6aa27d8291ac", 0x55, 0x8000, 0x0, 0x0) 05:14:13 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x200000, 0x0) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000000040)) unshare(0x8000000) shmget(0xffffffffffffffff, 0x4000, 0x0, &(0x7f0000ab5000/0x4000)=nil) socket$bt_hidp(0x1f, 0x3, 0x6) unshare(0x40000000100) 05:14:13 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0xb1, 0x8000) ioctl$EVIOCSABS0(r0, 0x401845c0, &(0x7f0000000040)={0x3, 0x9, 0x2, 0x400, 0x3ff, 0x3}) syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x223}, @dev={0xac, 0x14, 0x14, 0x11}}, @icmp=@parameter_prob={0x5, 0x4, 0x0, 0x0, 0x0, 0x0, {0x10, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14, 0x4011, 0x0, @local={0xac, 0x223}, @dev, {[@timestamp={0x8, 0x2c, 0x0, 0x0, 0x0, [{[@rand_addr]}, {[@multicast2]}, {[@multicast1]}, {}, {[@loopback]}, {}]}]}}}}}}}, 0x0) 05:14:13 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0xdf, @loopback, 0x5}, 0xfffffefb) listen(r0, 0x5) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000040)=0xfffffffffffffe01, 0x4) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) write(r1, &(0x7f0000000100), 0x20158) accept4(r0, &(0x7f0000000100)=@nfc_llcp, &(0x7f0000000000)=0x80, 0x0) 05:14:13 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000100)=ANY=[@ANYRESHEX, @ANYRES32], &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)='cgroup2\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0//ile0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rmdir(&(0x7f0000000340)='./file0//ile0\x00') lstat(&(0x7f0000000200)='./file0//ile0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_open_dev$dspn(&(0x7f0000000380)='/dev/dsp#\x00', 0x400, 0x200000) ioctl$KVM_PPC_GET_PVINFO(r1, 0x4080aea1, &(0x7f00000003c0)=""/151) chown(&(0x7f00000000c0)='./file0\x00', r0, 0x0) 05:14:13 executing program 4: r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newlink={0x38, 0x10, 0xf0b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @gre={{0x8, 0x1, 'gre\x00'}, {0xc, 0x2, [@IFLA_GRE_LOCAL={0x8, 0x4}]}}}]}, 0x38}}, 0x0) sendmmsg$alg(r0, &(0x7f0000000140), 0x492492492492805, 0x0) accept(r0, &(0x7f0000000100)=@un=@abs, &(0x7f0000000000)=0x80) 05:14:13 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty, 0x9}, 0x1c) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080), 0x2) fcntl$getown(r2, 0x9) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000340), 0x2) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000100)=0x6c74) close(r0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x1, {0xa, 0x4e23, 0x8, @empty, 0x100000000}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) 05:14:13 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 219.106922] device team0 entered promiscuous mode [ 219.124751] device team_slave_0 entered promiscuous mode [ 219.134284] device team_slave_1 entered promiscuous mode 05:14:14 executing program 0: r0 = creat(&(0x7f00006e9ff8)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000100)=@v3, 0x18, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffdb4e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=@known='security.capability\x00', &(0x7f00000001c0)=""/140, 0xffffffffffffffc7) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x9}, 0x14) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e24, 0x7, @empty, 0x868}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@multicast2, @in=@initdev}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000003c0)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000500)={0x8001, 0x1000, 0x80000000000, 0x200}) r3 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000440)={0xa, 0x4, 0xfa00, {r2}}, 0xc) 05:14:14 executing program 1: r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000a00)='/dev/userio\x00', 0x22001, 0x0) socket$inet6(0xa, 0x0, 0x0) r1 = dup(0xffffffffffffffff) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty, 0x9}, 0x1c) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$USERIO_CMD_SET_PORT_TYPE(r0, &(0x7f0000000000)={0x1, 0x1}, 0x2) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000140)={0x7ffffffff000, 0x10, 0xfa00, {&(0x7f00000000c0)}}, 0x2) write$USERIO_CMD_SEND_INTERRUPT(0xffffffffffffffff, &(0x7f0000000080), 0x2) fcntl$getown(r2, 0x9) write$USERIO_CMD_SEND_INTERRUPT(r0, &(0x7f0000000340), 0x2) ioctl$TIOCPKT(r1, 0x5420, &(0x7f0000000100)=0x6c74) close(r0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r1, &(0x7f00000001c0)={0x10, 0x30, 0xfa00, {&(0x7f0000000180)={0xffffffffffffffff}, 0x1, {0xa, 0x4e23, 0x8, @empty, 0x100000000}}}, 0x38) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r1, &(0x7f0000000200)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r3}}, 0x18) 05:14:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x1, 0x0) gettid() sendmsg$nl_netfilter(r2, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={&(0x7f0000000680)={0x38, 0x1, 0x0, 0x108, 0x70bd2a, 0x25dfdbfd, {0x2, 0x0, 0x3}, [@nested={0x10, 0x5c, [@generic, @typed={0xc, 0x69, @u64=0x4}]}, @nested={0x14, 0x8f, [@typed={0x8, 0x0, @ipv4=@loopback}, @typed={0x8, 0x92, @fd=r0}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x8000}, 0x4004) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000000000/0x18000)=nil, &(0x7f0000000180)=[@text64={0x40, &(0x7f0000000140)="420fb507b805000000b98de92d630f01c1f2430f3566b869008ec0f0814b00ec480000470f017a00f3f7e4470f017cc0423e26460f21f6410f01df", 0x3b}], 0x1, 0x0, &(0x7f0000000000), 0x101) ioctl$KVM_RUN(r3, 0xae80, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x4000}) ioctl$KVM_CREATE_PIT2(0xffffffffffffffff, 0x4040ae77, &(0x7f0000000000)) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm-control\x00', 0x80004, 0x0) syz_open_dev$cec(&(0x7f0000000380)='/dev/cec#\x00', 0x2, 0x2) r4 = socket$inet(0x2, 0x1, 0x1f) ioctl$sock_inet_SIOCDELRT(r4, 0x890c, 0x0) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x20040, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r6 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000540)='/proc/capi/capi20ncci\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, 0x0, 0x0) ioctl$KVM_GET_REGS(r3, 0x8090ae81, 0x0) shmget$private(0x0, 0x4000, 0x0, &(0x7f000000e000/0x4000)=nil) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r5, 0x84, 0x1b, &(0x7f0000000440)={0x0, 0x78, "d408adc5d08c5b5b4ec4ec79aa0f7ed1dec7ff1c16fa5580b5d9c4df207e67e802bed836d5132abce70008dde10c8459292dd75159adc7d2f820a2c3765c77d26e9bb8507b2ddbb21fb273ef76f415a9472b526a48b2442851b167029783e7185519b49165a318d1c1c33d6315ade61891a61b769e263044"}, &(0x7f00000000c0)=0x80) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x18, &(0x7f0000000300)={r7, 0x5}, 0x8) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) fsync(r6) 05:14:14 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r2, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)) ioctl$TCGETS(r2, 0x540a, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @dev, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0xfffffffffffffc7c) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x10000, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r3, &(0x7f00000001c0)="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"}, 0x10) 05:14:14 executing program 0: r0 = creat(&(0x7f00006e9ff8)='./file0\x00', 0x0) setxattr$security_capability(&(0x7f0000000280)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000100)=@v3, 0x18, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xffffffffffffdb4e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=@known='security.capability\x00', &(0x7f00000001c0)=""/140, 0xffffffffffffffc7) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f00000001c0)={0x0, 0x9}, 0x14) r1 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e24, 0x7, @empty, 0x868}, 0x1c) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000002c0)={{{@in=@multicast2, @in=@initdev}}, {{@in=@local}, 0x0, @in=@remote}}, &(0x7f0000000080)=0xe8) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000013c0)={{{@in, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x2}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@local, 0x0, 0x32}, 0x0, @in6, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5}}, 0xe8) connect$inet6(r1, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x18}}}, 0x1c) sendmmsg(r1, &(0x7f0000000240), 0x5c3, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x4, &(0x7f00000003c0)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) ioctl$KVM_ASSIGN_DEV_IRQ(r0, 0x4040ae70, &(0x7f0000000500)={0x8001, 0x1000, 0x80000000000, 0x200}) r3 = add_key$keyring(&(0x7f0000000480)='keyring\x00', &(0x7f00000004c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffa) keyctl$update(0x2, r3, 0x0, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000440)={0xa, 0x4, 0xfa00, {r2}}, 0xc) [ 219.609828] 8021q: adding VLAN 0 to HW filter on device team0 05:14:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000040)=0x7, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) r4 = geteuid() setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x80, 0x4e23, 0x100000000, 0x0, 0x0, 0x20, 0x2d, r3, r4}, {0x0, 0x1, 0x0, 0x8000, 0x5, 0x7fff, 0x7, 0x2}, {0x8, 0x1, 0x0, 0x4e5}, 0x6f9, 0x6e6bbc, 0x1, 0x0, 0x3, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d3, 0xff}, 0x2, @in=@multicast2, 0x3503, 0x3, 0x3, 0x8, 0x1, 0x69400, 0x7f}}, 0xe8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r2, 0x8}}, 0x48) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f00000000c0)={0x2, @sdr}) 05:14:14 executing program 4: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_SET_PIT2(r2, 0xae78, 0x0) dup3(r2, r2, 0x80000) 05:14:14 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r2, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)) ioctl$TCGETS(r2, 0x540a, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @dev, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0xfffffffffffffc7c) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x10000, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r3, &(0x7f00000001c0)="e5e838b4d7540114b7adf7444ad854bfa3cbf138dd87fa24c60cb747609db664f9f95dcea9725be29c2dcdbbde42c9b9c54eae23d1b71032baec592d708c8fa3584100f541d9c10b641734d8304bb36c5478b915bd5b62853d94540d9bc5d9294a62d969420e04ce64c06ee54376016eb26749cc194f9fc40f10196c88d99b393d1536f539d7959568345785d5fde06850e91b295e02ad37067e744334cc3e44dc9153f6ff0e9781283cf225c480b077121df5b755f1406bbc3651cde242b56d0ac8376789194669289667e16abe3d12969d691a9f46fcc31b880ab96cbc769dc955720c49b38486932462f2fe6f0cbab679276a721610ce26f94f"}, 0x10) 05:14:14 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r2, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)) ioctl$TCGETS(r2, 0x540a, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @dev, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0xfffffffffffffc7c) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x10000, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r3, &(0x7f00000001c0)="e5e838b4d7540114b7adf7444ad854bfa3cbf138dd87fa24c60cb747609db664f9f95dcea9725be29c2dcdbbde42c9b9c54eae23d1b71032baec592d708c8fa3584100f541d9c10b641734d8304bb36c5478b915bd5b62853d94540d9bc5d9294a62d969420e04ce64c06ee54376016eb26749cc194f9fc40f10196c88d99b393d1536f539d7959568345785d5fde06850e91b295e02ad37067e744334cc3e44dc9153f6ff0e9781283cf225c480b077121df5b755f1406bbc3651cde242b56d0ac8376789194669289667e16abe3d12969d691a9f46fcc31b880ab96cbc769dc955720c49b38486932462f2fe6f0cbab679276a721610ce26f94f"}, 0x10) 05:14:15 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000200)='/dev/input/mice\x00', 0x0, 0xc0881) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000240)={{0x0, 0x3, 0x5c, 0x1, 0xfff}, 0x9, 0x8001}) bind(r0, &(0x7f0000000180)=@isdn, 0x80) getpeername$unix(r1, &(0x7f00000002c0), &(0x7f0000000340)=0x6e) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000000)) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_ports\x00', 0x2, 0x0) getsockopt$packet_buf(r2, 0x107, 0x5, &(0x7f0000000080)=""/130, &(0x7f0000000140)=0x82) [ 220.477479] 8021q: adding VLAN 0 to HW filter on device team0 05:14:15 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r2, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)) ioctl$TCGETS(r2, 0x540a, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @dev, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0xfffffffffffffc7c) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x10000, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r3, &(0x7f00000001c0)="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"}, 0x10) 05:14:15 executing program 4: r0 = socket(0x400000000010, 0x3, 0x0) clock_gettime(0x0, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x12, &(0x7f0000000100), 0x10) r1 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/qat_adf_ctl\x00', 0x88400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r1, 0xc02c5341, &(0x7f0000000300)) read$alg(r0, &(0x7f0000000200)=""/233, 0xe9) write(r0, &(0x7f0000000000)="2400000021002551071c0165ff00fc020200000000100f000ee1000c08000f0000000000", 0x24) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r2, 0x0, 0x70bd2a, 0x25dfdbfb, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x10) 05:14:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000040)=0x7, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) r4 = geteuid() setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x80, 0x4e23, 0x100000000, 0x0, 0x0, 0x20, 0x2d, r3, r4}, {0x0, 0x1, 0x0, 0x8000, 0x5, 0x7fff, 0x7, 0x2}, {0x8, 0x1, 0x0, 0x4e5}, 0x6f9, 0x6e6bbc, 0x1, 0x0, 0x3, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d3, 0xff}, 0x2, @in=@multicast2, 0x3503, 0x3, 0x3, 0x8, 0x1, 0x69400, 0x7f}}, 0xe8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r2, 0x8}}, 0x48) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f00000000c0)={0x2, @sdr}) 05:14:15 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:15 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 220.619647] QAT: Invalid ioctl 05:14:15 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r2, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)) ioctl$TCGETS(r2, 0x540a, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @dev, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0xfffffffffffffc7c) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) r3 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x10000, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000002c0)={r3, &(0x7f00000001c0)="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"}, 0x10) 05:14:15 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000300)={0x26, 'hash\x00', 0x0, 0x0, 'tgr128\x00'}, 0x58) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000)='/dev/hwrng\x00', 0x0, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x18, &(0x7f0000000040)=0x7, 0x4) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x40000000013f}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000001c0)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @loopback}, {0xa, 0x0, 0x0, @dev}, r2}}, 0x48) getsockname$packet(r1, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000440)=0x14) r4 = geteuid() setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@mcast1, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e24, 0x80, 0x4e23, 0x100000000, 0x0, 0x0, 0x20, 0x2d, r3, r4}, {0x0, 0x1, 0x0, 0x8000, 0x5, 0x7fff, 0x7, 0x2}, {0x8, 0x1, 0x0, 0x4e5}, 0x6f9, 0x6e6bbc, 0x1, 0x0, 0x3, 0x3}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d3, 0xff}, 0x2, @in=@multicast2, 0x3503, 0x3, 0x3, 0x8, 0x1, 0x69400, 0x7f}}, 0xe8) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f00000002c0)={0x3, 0x40, 0xfa00, {{}, {0xa, 0x0, 0x6, @local}, r2, 0x8}}, 0x48) openat$cgroup_subtree(r1, &(0x7f0000000240)='cgroup.subtree_control\x00', 0x2, 0x0) r5 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_TRY_FMT(r5, 0xc0d05640, &(0x7f00000000c0)={0x2, @sdr}) 05:14:15 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0xa000, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x8000, 0x0) sendfile(r0, r1, &(0x7f0000000080), 0x333d) r2 = socket$netlink(0x10, 0x3, 0x2000008000000004) writev(r2, &(0x7f00000000c0)=[{&(0x7f00000001c0)="580000001400192340834b80040d8c560a067fbc45ff810040010000000058000b4824ca945f64009400050028925a01000000000000008000f0fffeffe809000000fff5dd0000001000010002080800414900000006fcff", 0x58}], 0x1) 05:14:15 executing program 1: setrlimit(0x7, &(0x7f0000becff0)) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) clone(0x3002001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) 05:14:15 executing program 2: r0 = socket(0x400000000010, 0x3, 0x0) write(r0, &(0x7f0000000000)="1700000021002511070007e1000c08004d913962a93dfbaebd5c08c0acab571be782abce2a69b69a5b67686069619c33714e05ca05abdcd26b22a398e2edee12f4935379c2ed3df124146e227740f8a9539741c50092047b949e0abdbf267aea35950bbe2400bd5073cbf680454c7afe9788eb84e8e6fa5deffd57", 0xffffff3d) 05:14:15 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r2, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)) ioctl$TCGETS(r2, 0x540a, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @dev, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0xfffffffffffffc7c) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x10000, 0x0) 05:14:15 executing program 1: r0 = openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000180)='/dev/video36\x00', 0x2, 0x0) ioctl$VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f00000004c0)={0x2, @sliced={0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff]}}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000000)={0xffffffffffffff9c}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e20, 0xe8f, @mcast1, 0x4}}, [0xb73, 0x100000000, 0x6, 0x0, 0x4, 0x84, 0x6, 0x800, 0x0, 0x3, 0x6, 0x10001, 0x6, 0x1, 0x100000000]}, &(0x7f0000000140)=0x100) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f00000001c0)={r2, 0x3}, &(0x7f0000000200)=0x8) 05:14:15 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x8, &(0x7f0000000040)=0xfffffffffffffffd, 0x4) r1 = dup2(r0, r0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in=@dev, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in=@loopback, @in=@multicast1, 0x4e22, 0x2, 0x4e23, 0x3ff, 0xa, 0xa0, 0xa0, 0x5f, 0x0, r2}, {0x800, 0x0, 0x6, 0x3, 0x10001, 0x7, 0x9}, {0x7, 0x7fff, 0xbee}, 0xca2, 0x6e6bbe, 0x1, 0x1, 0x0, 0x2}, {{@in6=@remote, 0x4d6, 0x5be7f51ca1b952d8}, 0x2, @in=@remote, 0x34ff, 0x4, 0x2, 0x7, 0x7, 0x8, 0x1}}, 0xe8) getsockopt$inet6_tcp_int(r1, 0x6, 0x8, &(0x7f0000000100), &(0x7f0000000140)=0x4) [ 221.230438] QAT: Invalid ioctl [ 221.242430] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.254676] device team0 entered promiscuous mode [ 221.259542] device team_slave_0 entered promiscuous mode [ 221.265363] device team_slave_1 entered promiscuous mode 05:14:16 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_TSC_KHZ(0xffffffffffffffff, 0xaea2, 0x0) perf_event_open(0x0, 0x0, 0x1000002, 0xffffffffffffffff, 0x0) getresuid(0x0, 0x0, &(0x7f0000000080)) openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x40040, 0x0) r0 = socket$xdp(0x2c, 0x3, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x20002, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x10800, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x0, 0x0) ioctl$PPPIOCGMRU(r1, 0x80047453, &(0x7f0000000100)) unshare(0x40000000) socket$inet(0x10, 0xffffffffffffffff, 0x1d) syz_open_dev$loop(0x0, 0x100000001, 0x0) 05:14:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r2, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$TIOCSETD(r2, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r2, 0x400455c8, 0x2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000180)) ioctl$TCGETS(r2, 0x540a, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @dev, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0xfffffffffffffc7c) ioctl$EXT4_IOC_MIGRATE(r1, 0x6609) [ 221.286753] 8021q: adding VLAN 0 to HW filter on device team0 [ 221.392264] IPVS: ftp: loaded support on port[0] = 21 05:14:16 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:16 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208d, 0x0, 0xbdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x7}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000400)=""/19) socket$inet(0x2, 0x3, 0x2) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffff9c, &(0x7f00000005c0)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x0, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e22, 0x1, @mcast1, 0xfffffffffffffc00}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000500)}}, 0x18) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x10, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r7, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x13a) ioctl$KVM_S390_INTERRUPT_CPU(r5, 0x4010ae94, &(0x7f0000000000)={0x1, 0xfff, 0xe5bb}) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) setsockopt$netlink_NETLINK_PKTINFO(r5, 0x10e, 0x3, &(0x7f0000000200)=0x400000000006, 0x1) getsockname(r4, &(0x7f0000000140)=@ipx, &(0x7f0000000280)=0x33) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) dup2(r3, 0xffffffffffffffff) 05:14:16 executing program 2: r0 = creat(&(0x7f0000000140)='./bus\x00', 0x0) ftruncate(r0, 0x8200) r1 = open(&(0x7f000000fffa)='./bus\x00', 0x14103a, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r1, 0x29, 0x40, &(0x7f0000000200)=@mangle={'mangle\x00', 0x1f, 0x6, 0x918, 0x138, 0x0, 0x138, 0x138, 0x138, 0x848, 0x848, 0x848, 0x848, 0x848, 0x6, &(0x7f0000000180), {[{{@ipv6={@ipv4={[], [], @initdev={0xac, 0x1e, 0x1, 0x0}}, @mcast2, [0xff, 0xff000000, 0xffffff00], [0xffffffff, 0xff], 'tunl0\x00', 'veth1_to_team\x00', {0xff}, {}, 0x5e, 0xfffffffffffffffa, 0x6, 0x1}, 0x0, 0xf8, 0x138, 0x0, {}, [@common=@inet=@ipcomp={0x30, 'ipcomp\x00', 0x0, {0x4d6, 0x4d3, 0x1}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x1ff, 0x0, @ipv4=@multicast2, 0x4e20}}}, {{@ipv6={@dev={0xfe, 0x80, [], 0x20}, @loopback, [0xffffff00, 0xffffffff, 0xffffff00, 0xff000000], [0xffffff00, 0x0, 0xffffffff, 0xffffffff], 'bcsh0\x00', 'bond_slave_1\x00', {0xff}, {}, 0x0, 0x9, 0x1, 0x3}, 0x0, 0xf0, 0x138, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0x1}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@remote, @ipv6=@mcast2, 0x7, 0x20, 0x40}}}, {{@uncond, 0x0, 0xf0, 0x130, 0x0, {}, [@common=@icmp6={0x28, 'icmp6\x00', 0x0, {0xb, 0xfffffffffffffff7, 0x4}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x86e, 0x1000, @ipv4=@dev={0xac, 0x14, 0x14, 0x1f}, 0x4e24}}}, {{@uncond, 0x0, 0x1b0, 0x1d8, 0x0, {}, [@inet=@rpfilter={0x28, 'rpfilter\x00', 0x0, {0xc}}, @common=@unspec=@conntrack1={0xc0, 'conntrack\x00', 0x1, {{@ipv4=@dev={0xac, 0x14, 0x14, 0x22}, [0xff000000, 0xffffffff, 0x0, 0xffffffff], @ipv6=@dev={0xfe, 0x80, [], 0x23}, [0xff, 0xff, 0xffffff00, 0xff000000], @ipv6=@remote, [0xffffff00, 0xff, 0xffffffff, 0xffffffff], @ipv6=@mcast1, [0xff0000ff, 0xffffff00, 0xff000000, 0xffffff00], 0x2, 0x8, 0x2b, 0x4e24, 0x4e22, 0x4e21, 0x537d, 0x20, 0x28}, 0xc0}}]}, @HL={0x28, 'HL\x00', 0x0, {0x3, 0x100}}}, {{@uncond, 0x0, 0x2a8, 0x2d0, 0x0, {}, [@common=@srh1={0x90, 'srh\x00', 0x1, {0x3a, 0x4, 0x3e, 0xa0000000, 0xa622, @loopback, @initdev={0xfe, 0x88, [], 0x0, 0x0}, @mcast2, [0xffffffff, 0xffffff00, 0xffffffff], [0xffffffff, 0xffffffff, 0xffffffff, 0xff], [0xffffff00, 0xffffffff, 0xff000000, 0xff000000], 0x208, 0x10}}, @common=@inet=@hashlimit2={0x150, 'hashlimit\x00', 0x2, {'syzkaller0\x00', {0x1, 0x5, 0x0, 0x5f, 0x42b6, 0xb62, 0x8, 0x60, 0x78}, 0x7ff}}]}, @HL={0x28, 'HL\x00', 0x0, {0x2, 0x9}}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x978) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x800002, 0x80400000011, r1, 0x0) seccomp(0x1, 0x0, &(0x7f0000007ff0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x50000}]}) syz_execute_func(&(0x7f0000000080)="0faef24029450ff3440f1157f1174c464119467d597f8a540b6f55f40fb11d00398041ed620f71f6452b610df34c0f38f6a30a000000c40fb3ccc928808fcd78a3000006b5d31e0ff7c6") 05:14:16 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r1, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x2) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) ioctl$TCGETS(r1, 0x540a, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @dev, 0x1}}, 0x5c) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(0xffffffffffffffff, 0x6, 0x1d, &(0x7f0000002000)={0x0, 0x0, 0x1}, 0xfffffffffffffc7c) 05:14:16 executing program 2: r0 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x793, 0x0) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r1, 0x0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) r3 = socket$inet6(0xa, 0x3, 0x3c) connect$inet6(r3, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x2c5) ioctl$KVM_S390_UCAS_UNMAP(r1, 0x4018ae51, &(0x7f0000000340)={0xfffffffffffffffd, 0x100001001, 0x8000000000000}) ioctl$DRM_IOCTL_NEW_CTX(r1, 0x40086425, &(0x7f00000002c0)={0x0, 0x3}) r4 = msgget(0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000000940)={@empty, 0x22, r5}) msgsnd(r4, &(0x7f0000000380)=ANY=[@ANYBLOB="0000000000000000019eb56986f1f7a65627858835824cdabe2b2f38bdaa3221ac2f6bf00e541eba3a318387d1c105da4fc56f7de2213f985e73aa29b0662733dd89c5631419c52ae4b999458cca9a59942dfe1ff59dff206d66d58d34a67a61f8c3ca1d1dda946d43b4b746db4156ecc138ccdc556b19641ba471d4dd8edd02d59d37a9333b127fbca8d234400aa7b86ee18634ab260109671de2e1ad12b00b81a2db43868c32f4e4625d3031283be656a588390015d1c485f0a8ea0ef52aec467d93e4db2cbcf9901a143e036c8414050003db331d1314dbfa6aa4facc643fd32a02c910f2"], 0x1, 0x800) r6 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/md0\x00', 0x80000, 0x0) r7 = getpgid(0x0) ptrace$setopts(0x4206, r7, 0x2, 0x10) fcntl$getownex(r3, 0x10, &(0x7f0000000100)={0x0, 0x0}) ioctl$BLKTRACESETUP(r6, 0xc0481273, &(0x7f00000001c0)={[], 0x2, 0x5, 0x5, 0x9, 0xffffffff, r8}) write$binfmt_script(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="2321202e2f66696c73cc0a60ab51ed05df0d0d49d6ca010023df39a4a85312a0030000004242515e54235359f38670106700c423bbaae6cf9f4b0d4620b7d34bdae5273b0faf499d4208dbc3632ca7032012345e217c489e0e0100000086b32d11860888ea9e9ad25d8852f678a3ada658d3bf28cbd8fc7575bbf060228e4e3eb9065ec6df52406459f217bbc717418421d64afe976e48f3e3bfaf7472eef27d1df75721188600d6ced0f6"], 0xa9) fchdir(r1) syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x6, 0x111000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x40031, 0xffffffffffffffff, 0x0) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0x4018920a, 0x20004002) readv(r0, &(0x7f00000001c0)=[{&(0x7f00000003c0)=""/189, 0xbd}], 0x1) perf_event_open(&(0x7f0000000040)={0x4, 0x70, 0x0, 0x7a2b2fb6, 0x3, 0x100000000, 0x0, 0x6, 0x10001, 0xd, 0x64, 0x682, 0x0, 0x401, 0x3863f4b2, 0x9, 0x40000, 0x8140, 0x9, 0x7fff, 0x1dc2, 0x7fff, 0x1ff, 0x800, 0x4, 0x2, 0xc7, 0x7ff, 0x6b15, 0x4, 0x7f, 0xf0, 0x1f772c66, 0x9, 0x400, 0x80000000, 0xffff, 0x9, 0x0, 0x8, 0x4, @perf_config_ext={0x81, 0x7}, 0x20000, 0x10000, 0x20, 0x0, 0xd603, 0x5, 0x6edc0000}, r7, 0xffffffffffffffff, r2, 0x9) 05:14:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r1, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x2) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) ioctl$TCGETS(r1, 0x540a, 0x0) setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000002000)={{}, {0xa, 0x0, 0x0, @dev, 0x1}}, 0x5c) 05:14:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x40000) setsockopt$inet_tcp_int(r0, 0x6, 0x4, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) geteuid() mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getpeername$inet6(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) bpf$OBJ_GET_PROG(0x7, 0x0, 0xfffffffffffffdb2) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x100000000020c49a, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100)=0x3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$netlink(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x0, 0x0, 0x0) r3 = request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='IDLETIMER\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) 05:14:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r1, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x2) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) ioctl$TCGETS(r1, 0x540a, 0x0) 05:14:16 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r1, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x2) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)) [ 222.018033] 8021q: adding VLAN 0 to HW filter on device team0 [ 222.249096] IPVS: ftp: loaded support on port[0] = 21 [ 222.288178] 8021q: adding VLAN 0 to HW filter on device team0 05:14:18 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208d, 0x0, 0xbdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x7}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000400)=""/19) socket$inet(0x2, 0x3, 0x2) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffff9c, &(0x7f00000005c0)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x0, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e22, 0x1, @mcast1, 0xfffffffffffffc00}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000500)}}, 0x18) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x10, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r7, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x13a) ioctl$KVM_S390_INTERRUPT_CPU(r5, 0x4010ae94, &(0x7f0000000000)={0x1, 0xfff, 0xe5bb}) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) setsockopt$netlink_NETLINK_PKTINFO(r5, 0x10e, 0x3, &(0x7f0000000200)=0x400000000006, 0x1) getsockname(r4, &(0x7f0000000140)=@ipx, &(0x7f0000000280)=0x33) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) dup2(r3, 0xffffffffffffffff) 05:14:18 executing program 1: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000380)=0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x208d, 0x0, 0xbdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x7, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180)}, 0x0, 0x0, 0x0, 0x7}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000400)=""/19) socket$inet(0x2, 0x3, 0x2) write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffff9c, &(0x7f00000005c0)={0x16, 0x98, 0xfa00, {&(0x7f00000002c0), 0x0, 0xffffffffffffffff, 0x30, 0x1, @in6={0xa, 0x4e22, 0x1, @mcast1, 0xfffffffffffffc00}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r0, &(0x7f0000000100)={0x11, 0x10, 0xfa00, {&(0x7f0000000500)}}, 0x18) r4 = socket$nl_route(0x10, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2000000, 0x10, r4, 0x0) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x20100, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) connect$inet6(r7, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, 0x0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x13a) ioctl$KVM_S390_INTERRUPT_CPU(r5, 0x4010ae94, &(0x7f0000000000)={0x1, 0xfff, 0xe5bb}) setsockopt$inet6_tcp_TCP_ULP(r7, 0x6, 0x1f, &(0x7f0000000180)='tls\x00', 0x4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r6) setsockopt$netlink_NETLINK_PKTINFO(r5, 0x10e, 0x3, &(0x7f0000000200)=0x400000000006, 0x1) getsockname(r4, &(0x7f0000000140)=@ipx, &(0x7f0000000280)=0x33) setsockopt$SO_VM_SOCKETS_BUFFER_SIZE(0xffffffffffffffff, 0x28, 0x0, 0x0, 0x0) dup2(r3, 0xffffffffffffffff) 05:14:18 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r1, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x2) 05:14:18 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:18 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, 0x0) r0 = syz_open_dev$midi(&(0x7f00000001c0)='/dev/midi#\x00', 0x0, 0x40000) setsockopt$inet_tcp_int(r0, 0x6, 0x4, 0x0, 0x0) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ARPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x63, &(0x7f0000000040)={'IDLETIMER\x00'}, &(0x7f0000000080)=0x1e) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x8000002}, 0x1c) geteuid() mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/net/pfkey\x00', 0x2000, 0x0) getpeername$inet6(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) getsockopt$inet_mtu(r1, 0x0, 0xa, 0x0, 0x0) madvise(&(0x7f0000003000/0x4000)=nil, 0x4000, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x373) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, 0x0) ioctl$EXT4_IOC_PRECACHE_EXTENTS(0xffffffffffffffff, 0x6612) bpf$OBJ_GET_PROG(0x7, 0x0, 0xfffffffffffffdb2) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000b63fe4)={0xa, 0x2}, 0x1c) splice(r2, 0x0, r1, 0x0, 0x100000000020c49a, 0x0) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000100)=0x3, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) socket$netlink(0x10, 0x3, 0x6) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) ioctl$GIO_UNISCRNMAP(0xffffffffffffffff, 0x4b69, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x0, 0x0, 0x0) r3 = request_key(&(0x7f00000000c0)='syzkaller\x00', &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000180)='IDLETIMER\x00', 0xfffffffffffffffe) keyctl$assume_authority(0x10, r3) 05:14:18 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r1, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$KDADDIO(r1, 0x400455c8, 0x2) 05:14:18 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r1, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$KDADDIO(r1, 0x400455c8, 0x2) 05:14:18 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl(r1, 0x70, &(0x7f0000000000)="d3b43d7b531611a3fabe281be1cc83f7f788c277c6de86590ad63d3c112bc003d6c4521293f042c08c88cc060db1f184357e4de6362808c002f80c91467d146decb34c450cbc1617570422548cda712101a0031e8b7b0eda31cbb5a1ee9d44b3f86194d399914645e00a2c487b36aa03e44462fccb97b5a52abecb288b56160d2a3db6add5ccc17a802e2cc8138fa24989c2d8e3843f3796d189f67b") ioctl$KDADDIO(r1, 0x400455c8, 0x2) 05:14:19 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r1, 0x400455c8, 0x2) 05:14:19 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x100, 0x0) ioctl$SG_SCSI_RESET(r2, 0x2284, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) connect$l2tp(0xffffffffffffffff, &(0x7f0000000180)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x26) sendmmsg(r0, &(0x7f0000005fc0), 0x8000000000000fc, 0x8000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x4000000004002, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0x280400, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(r4, 0x84, 0x23, 0x0, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000480)={{{@in=@remote, @in6=@mcast2}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000140)=0xe8) sendmsg$nl_netfilter(r4, &(0x7f0000000380)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x48000}, 0x814) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000a40)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0001802000000000000000000000000000000000000000000000000000028015345434d41524b0000000000000000000000000000000000000000000000000000000300000073797374656d5f753a6f626a6563745f723a7379736f67645f696e697472635f657865635f743a733000000000000000000000000000000000000000000000c1fd000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000cb0685d5afa07a6a0fed000000000000000000000000000000000000000000000000000000000000000000000000ffffffffac1414aaffffffffffffff002926ab51aa7d00000000000000000000000000000000000000ffff00ffff00000000000000000000000000000000000000000000000000000000000000000000ffffffff00000000001fed63100000000fffb4d573797a6b616c6c65723000000000000065727370616e3000000000000000000000000000000000000000ff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ac1414aa000008800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000000000000000000000000000000000000f0006001000000000000000000000000000000000000000000000000000070004e464c4f47000000000000000000000000000000000000000000000000000000000000000c000000000051abae66548b6ad5b1978d623974d3c9a684935bf254168418cc825a267f604d6d201eb99c086c7b8c752cb17a5512d16e762b599fff351c0cd4f56f2a142a76000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c000e8000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff0000"], 0x1) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000001c0)=ANY=[@ANYBLOB]) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1e, 0x0, "46385e8e4f69a5559b4eeb29627d87b6f31ace16a1d37075a5a20b69a80a8792588a60b4bc23a9ba3a938df8f6199c856d1ee502670f3a8d44a662f290020fb2", "8fbef735f308f582ab3e8d9d046da315243cd4fdec84deea4ca91a885542c66d", [0x40, 0x200]}) write$binfmt_misc(r3, &(0x7f0000000440)={'syz1'}, 0x1200e) sendmsg$nl_netfilter(r4, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000600)={0x0}, 0x1, 0x0, 0x0, 0x40000}, 0xc0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000400)={0xffffffffffffffff, r1, 0x0, 0x17, &(0x7f00000003c0)='ppp0}!wlan0ppp1proc&}}\x00', 0xffffffffffffffff}, 0x30) ioctl$VIDIOC_G_AUDOUT(0xffffffffffffffff, 0x80345631, &(0x7f0000000100)) 05:14:19 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x802, 0x0) write(r2, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000240)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000500)={0x0, 0x2000}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r5, 0x4010641c, &(0x7f00000004c0)={0x0, &(0x7f00000003c0)=""/199}) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000007c0)={"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"}) r6 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x3, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, &(0x7f0000000400), 0x10000000000002a2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000000)={0x4, 0xffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@local, @in=@broadcast}}}, &(0x7f00000002c0)=0xe8) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) r7 = socket$rds(0x15, 0x5, 0x0) bind$rds(r7, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r7, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) [ 224.391704] 8021q: adding VLAN 0 to HW filter on device team0 [ 224.409957] 8021q: adding VLAN 0 to HW filter on device team0 05:14:19 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x2) 05:14:19 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:19 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:19 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x2) 05:14:19 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FS_IOC_FIEMAP(r0, 0x5451, 0x0) 05:14:19 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:19 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x2) 05:14:19 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:19 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_ABSBIT(r0, 0x40045567, 0x0) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x3) r1 = dup(r0) write$uinput_user_dev(r1, &(0x7f0000000040)={'syz1\x00', {}, 0x0, [], [0xffff]}, 0x45c) 05:14:20 executing program 4: openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='attr/keycreate\x00') recvmmsg(0xffffffffffffffff, &(0x7f0000002500)=[{{0x0, 0x0, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000240)=""/160, 0xa0}, {&(0x7f0000000300)=""/61, 0x3d}], 0x3, &(0x7f0000000500)=""/166, 0xa6}, 0x1}, {{0x0, 0x0, &(0x7f0000000ac0)}}, {{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x4, 0x100, &(0x7f0000002740)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) 05:14:20 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:20 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xa59, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) fallocate(r1, 0x0, 0x0, 0x4003ff) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4006, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) 05:14:20 executing program 0: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000140)) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 05:14:20 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:20 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cpuset.effective_mems\x00', 0x26e1, 0x0) write$P9_RRENAME(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r0, &(0x7f0000000080), 0x2001007f) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 05:14:20 executing program 4: clone(0x3102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x2c) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={@empty, @local, @mcast1, 0x3, 0x0, 0x0, 0x128}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/current\x00', 0x2, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) 05:14:20 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:20 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 225.451761] ptrace attach of "/root/syz-executor.4"[8479] was attempted by "/root/syz-executor.4"[8480] 05:14:20 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:20 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:20 executing program 1: perf_event_open(&(0x7f0000000000)={0x40000000000002, 0x70, 0x1e, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) 05:14:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 05:14:20 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x12) ioctl$UI_DEV_CREATE(r0, 0x5501) 05:14:20 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 05:14:20 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = accept4(r0, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r2, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) [ 225.901693] input: syz1 as /devices/virtual/input/input13 05:14:20 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 225.969154] input: syz1 as /devices/virtual/input/input14 05:14:20 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 226.269753] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 226.302404] 8021q: adding VLAN 0 to HW filter on device team0 05:14:21 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 05:14:21 executing program 1: r0 = socket$inet6(0xa, 0x100800000000002, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x8000000003b, &(0x7f0000000140)=ANY=[@ANYBLOB="000000977d8d6645"], 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') sendfile(r0, r1, 0x0, 0x88001) sendmmsg(r0, &(0x7f0000005780), 0x4000000000000d2, 0x0) 05:14:21 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:21 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 05:14:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 05:14:21 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:21 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 226.830624] 8021q: adding VLAN 0 to HW filter on device team0 05:14:21 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='gid_map\x00') r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x2, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x4000000000000005) r3 = dup3(r2, r0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x0) write(r1, &(0x7f0000c34fff), 0xffffff0b) writev(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)='>', 0x1}], 0x1) ioctl$TCXONC(r3, 0x540a, 0x1) 05:14:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 05:14:21 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:21 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:21 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:21 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 05:14:21 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:21 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, 0x0) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 05:14:22 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 05:14:22 executing program 4: lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 227.737521] 8021q: adding VLAN 0 to HW filter on device team0 05:14:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x2f, 0x4) connect$inet(r1, &(0x7f00000004c0)={0x2, 0x0, @broadcast}, 0x10) 05:14:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 05:14:22 executing program 4: lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:22 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:22 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:22 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 05:14:22 executing program 4: lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:22 executing program 4: mknod$loop(0x0, 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:22 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x2) 05:14:22 executing program 4: mknod$loop(0x0, 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x2) 05:14:23 executing program 1: r0 = socket$inet(0x2, 0x2, 0x2200000088) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(0xffffffffffffffff, 0x6, 0x23, &(0x7f0000000200)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, 0x0) recvmsg(r0, &(0x7f00000002c0)={0x0, 0xfffffffffffffc51, &(0x7f00000000c0), 0x160, 0x0, 0xff71}, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x8084, &(0x7f0000319ff0)={0x2, 0x4e20}, 0x10) sendto$inet(r0, &(0x7f0000000000)="5f3b778deabb1c927e4705cc513b81c53377e8a6eebb45bb87656ec9f326fd4c4ce1daab4928e697c1d6e2897ff533e495e50ce8c9690b10c9080e48009650460102c701a2", 0x45, 0x0, 0x0, 0x0) 05:14:23 executing program 4: mknod$loop(0x0, 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(0xffffffffffffffff, 0x400455c8, 0x2) 05:14:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:23 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) [ 228.483769] 8021q: adding VLAN 0 to HW filter on device team0 05:14:23 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:23 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x4e22, @loopback}, {0x2, 0x0, @loopback}, {0x2, 0x0, @remote}, 0x27}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) 05:14:23 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 05:14:23 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:23 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) ioctl$TIOCSBRK(r2, 0x5427) bind$inet6(r0, &(0x7f0000000080), 0x1c) listen(r0, 0x0) 05:14:23 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:23 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x0, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 228.835158] Bluetooth: hci0: sending frame failed (-49) 05:14:23 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(0x0, &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:23 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(0x0, &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 229.103195] 8021q: adding VLAN 0 to HW filter on device team0 05:14:23 executing program 3: r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:23 executing program 1: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="340d1e65bcbb9000c429fd00344f8a9d80ee0300000ab1e0e165afa5704713684273118e16763e55e1f82284b2921ff923ce4f30e1f1fe85d9"], 0x1) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x200000220000002c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) ptrace$cont(0x1f, r0, 0x0, 0x0) 05:14:23 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:23 executing program 2: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uinput\x00', 0x802, 0x0) ioctl$UI_SET_LEDBIT(r0, 0x40045569, 0xb) write$uinput_user_dev(r0, &(0x7f0000000640)={'syz1\x00'}, 0x45c) ioctl$UI_SET_EVBIT(r0, 0x40045564, 0x11) ioctl$UI_DEV_CREATE(r0, 0x5501) [ 229.287564] input: syz1 as /devices/virtual/input/input15 [ 229.316998] input: failed to attach handler leds to device input15, error: -6 [ 229.385616] input: syz1 as /devices/virtual/input/input16 [ 229.414984] input: failed to attach handler leds to device input16, error: -6 [ 229.605646] 8021q: adding VLAN 0 to HW filter on device team0 [ 230.891132] Bluetooth: hci0: command 0x1003 tx timeout [ 230.896924] Bluetooth: hci0: sending frame failed (-49) [ 232.970346] Bluetooth: hci0: command 0x1001 tx timeout [ 232.975758] Bluetooth: hci0: sending frame failed (-49) [ 235.050338] Bluetooth: hci0: command 0x1009 tx timeout 05:14:34 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 05:14:34 executing program 3: r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:34 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0xfffffffffffffdc6, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) write(r1, &(0x7f0000000380), 0xfffffffe) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000140)={'lo\x00\x00\x00$\x00\x00\x00\x00\x00\x00\b\x00\x00\x11', 0xff}) r3 = accept4(r0, 0x0, 0x0, 0x800) perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0xee67, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(r3, &(0x7f00000000c0), 0xfffffdda, 0x0, 0x0, 0x0) 05:14:34 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(0x0, &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:34 executing program 2: openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000500)='/dev/uinput\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), 0x0) 05:14:34 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 239.360544] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 05:14:34 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:34 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:34 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:34 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 239.697585] 8021q: adding VLAN 0 to HW filter on device team0 05:14:34 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:34 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 239.795486] Invalid argument reading file caps for ./file0 [ 239.868057] Invalid argument reading file caps for ./file0 [ 241.450364] Bluetooth: hci0: command 0x1003 tx timeout [ 241.455771] Bluetooth: hci0: sending frame failed (-49) [ 243.530449] Bluetooth: hci0: command 0x1001 tx timeout [ 243.535864] Bluetooth: hci0: sending frame failed (-49) [ 245.610360] Bluetooth: hci0: command 0x1009 tx timeout 05:14:44 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x0) 05:14:44 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', 0x0, 0x0, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:44 executing program 3: r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:44 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x200, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 05:14:44 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x4, 0x800000032, 0xffffffffffffffff, 0x0) socket$inet(0x2, 0x0, 0x0) pipe(0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cgroup.events\x00', 0x0, 0x0) 05:14:44 executing program 5: socket$nl_crypto(0x10, 0x3, 0x15) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:44 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x200, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 249.592911] Invalid argument reading file caps for ./file0 05:14:44 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(0x0, 0x0, 0x0) 05:14:44 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x0, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:44 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000100)="0adc1f023c123f3188a070") bind$inet6(r2, &(0x7f00001fefe4)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x4e22}, 0x1c) r4 = accept4(r2, 0x0, 0x0, 0x10000000080800) sendto(r1, &(0x7f0000000200), 0xffffffffffffff46, 0x0, 0x0, 0xfffffffffffffd33) splice(r4, 0x0, r0, 0x0, 0x80000000, 0x0) 05:14:44 executing program 5: r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 249.837760] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 250.090518] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.690301] Bluetooth: hci0: command 0x1003 tx timeout [ 251.695708] Bluetooth: hci0: sending frame failed (-49) [ 253.770347] Bluetooth: hci0: command 0x1001 tx timeout [ 253.775782] Bluetooth: hci0: sending frame failed (-49) [ 255.850374] Bluetooth: hci0: command 0x1009 tx timeout 05:14:54 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(0x0, 0x0, 0x0) 05:14:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x200, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 05:14:54 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x0, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:54 executing program 5: r0 = socket(0x0, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c000000300029080000000000000000030000001800000010000100ff401e4b40ce15405700000000000001"], 0x1}}, 0x0) 05:14:54 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0af51f023c123f3188a070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000200)={0x0, {}, {}, {}, 0x2a4, 0x0, 0x0, 0x0, 0x4}) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0x0, @multicast2}, {0x2, 0x0, @broadcast}, 0xab852ebbe6fbd72e}) 05:14:54 executing program 4: mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(0x0, 0x0, 0x0) 05:14:54 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x4) connect$inet6(r0, &(0x7f00000000c0), 0x1a) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) connect$unix(r1, &(0x7f0000000200)=@file={0x0, './file0\x00'}, 0x6e) clone(0x8000000000900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) shutdown(r1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, 0x0) 05:14:54 executing program 0: clone(0x3102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) syz_execute_func(&(0x7f0000000380)="64ff0941c3470f71e762c4c27d794e0066420fe2e33e0f1110c442019dccd3196f") r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) clone(0x40084000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) clone(0x2102001ffd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000080), 0x1c) r1 = dup2(r0, r0) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r1, 0x6, 0x16, &(0x7f0000000440), 0x131f64) sendmsg$NBD_CMD_CONNECT(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)}, 0x0) 05:14:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x200, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 05:14:54 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x0, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:54 executing program 5: r0 = socket(0x0, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:54 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x2) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) ioctl$EVIOCGREP(0xffffffffffffffff, 0x80084503, 0x0) ioctl$EVIOCSABS3F(r0, 0x401845ff, 0x0) 05:14:54 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x200, 0x4) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 05:14:54 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:54 executing program 5: r0 = socket(0x0, 0x802, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 260.234805] IPVS: ftp: loaded support on port[0] = 21 05:14:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x200, 0x4) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 05:14:55 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:55 executing program 5: r0 = socket(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:55 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000240)=0xc) r1 = syz_open_procfs(r0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x5452, 0x0) syz_open_dev$binder(0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(&(0x7f00000003c0)=@nullb='/dev/nullb0\x00', &(0x7f0000000400)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000280)={0x80000000000080fb, 0x1}) [ 260.795409] IPVS: ftp: loaded support on port[0] = 21 05:14:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket(0x10, 0x802, 0x0) write(r2, 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sequencer2\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r3, 0x4068aea3, &(0x7f0000000240)) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x2) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r3, 0x4010ae67, &(0x7f0000000500)={0x0, 0x2000}) syz_kvm_setup_cpu$x86(r3, 0xffffffffffffffff, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000180)="2e65f32efe0a6766c7442400008000006766c7442402000000006766c744240600000000670f011c24b866000f00d066b88044a2b20f23c80f21f866350400d0000f23f80f0766b80500000066b9080000000f01c10f0766b8010000000f01c10f01dfb835008ee0", 0x68}], 0x1, 0x0, &(0x7f00000000c0), 0x0) ioctl$DRM_IOCTL_SET_SAREA_CTX(r5, 0x4010641c, &(0x7f00000004c0)={0x0, &(0x7f00000003c0)=""/199}) ioctl$KVM_SET_LAPIC(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000007c0)={"a523fb9656eb871ffcd7ffeb51d84e738a55eba841ae487e33cdd921e8a51ce6c924020f0ac3562dd8cdeb31deac16f46da4ac16ee8165bce439eddce671c5b0a1103ea3f86a43cbb78504f6f9c77c2f09dc27632ec6036ee52a87e321e707c0cfe15576c26d52d0334c8d4693e127b3a046a5ed7796c9c5017cfd58ec871ed76369846fea9ebfa2f7f96496abf4ef57ed1ecd930eb9e13396875f01e932804ffe8a34c8fbedd97cdfb3176ec59fbbfd20a6ff17795431c3908530e4f5f703480a5211cc6a7e2084e4a9b6aedf60b7b8084b00ca2cbed255b4cc4679c967432fea5e95119f9635e94794aab6ef54f290677fa08d0ee2cc8eae468efd02417055d3f3ccc86b629dfb878c4d115c16c75fe352cffa93648cf49577256b5d2faf0634335c97ffff966ae90cbf81250d5a6e9d364c4c684059c593f9950e66cf81cd9f36d73fade4f0cbb795010364d13ff32c12efd91d0ebb6533700945f2db6113a630bd521eec89a74c46e1733b72d6e4d2ccee3b40f99809a9a4fb5fc2d1c53e1366d455bcbe81893100ab56b2556b55c1a0c5787356b464c3bf7011488e55f587a6d4420d46d69a74ee5bbfbcb0d6cb00aae8c3dfd6dd2e9f76d7a542f20553207b668dce69f1b463ee9166e81bb109f461b8885f15c9e525d72260ccdbd69e3345612158114780b9409ea856cb724faa6ed27ba836b35c10e7c7d43f2fa34f98f16a00f31565e16a213eaf4a7f438c89733ebe6d16328b930fd942bc64d631dd1f2aa1cc2ccdaff2324076c83e1ba4d2a0e40e010c96b42e7a4a76cd7a89ef592b9b3030f62d9fbd565ee5908ab90b42620b61e5d1e08621a31d21003cd12a450461636472fa64a7e1b98778bfb482fb4b4da31b42ee98b10f9c0f4c085d08c37ee2e3a9e4a5aff72a0ab844fcbfa224842c85f6cdfd25829c44760e3859624f891df4824f7d17938ac2def6721639176fad9512ee9b4c5de1412cf3083e1d5ee2d29b63267ccba535409da7bef05d3fa79a3ef037ee609e01ad345ee17f48b5e8510f767de35df4dfb856f7533ad88866c6b01fe345107ba7191a8809e2e014492acf9c4f35cad664198a65c55f884490f4b30b4526324be842c393f336f16bea2bf6c6b917fdb751e12ff689ab4ffa44625a8b2bc1de4e88682abe5ce9d1942792747681ad23c31046d825140987f19a9cf10323c3f50a20f35a6d1dd8ca6758296b4537a0da1a853011b777623c8774b3689897cf9264a7782470847f36a8093faee04114663438ab39d8a777fb3e10cb4a2402a939a98d387087c5ca5fd8fbc4d96ae698b5bb84a0a8484e2b85743e623a033eb5b1889ccfb4b95885bc69d4c1cb819b95e7923e557c9ec9ec10e94d1e1295fc2f256fa095036f6cfc04c414fc57fc72c120614a586089c93741e97a61c46600"}) r6 = syz_open_dev$radio(&(0x7f0000000200)='/dev/radio#\x00', 0x3, 0x2) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000140)=[@text64={0x40, &(0x7f0000000100)="460f300f07c483614804ee08440f20c03506000000440f22c0c402f93473230f09f20f013cb9b805000000b9c00000000f01d90fc728c4c1f9e79f2e000000", 0x3f}], 0x1, 0x0, &(0x7f0000000400), 0x10000000000002a2) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$VIDIOC_S_CTRL(r1, 0xc008561c, &(0x7f0000000000)={0x4, 0xffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@local, @in=@broadcast}}}, &(0x7f00000002c0)=0xe8) ioctl$TUNDETACHFILTER(r6, 0x401054d6, 0x0) r7 = socket$rds(0x15, 0x5, 0x0) bind$rds(r7, &(0x7f0000000040)={0x2, 0x4e21, @remote}, 0x10) sendmsg$rds(r7, &(0x7f0000000340)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, 0x0}, 0x0) 05:14:55 executing program 5: r0 = socket(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:55 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x200, 0x4) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 05:14:55 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:57 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) 05:14:57 executing program 4 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 05:14:57 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000240)=0xc) r1 = syz_open_procfs(r0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, 0x0) r2 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x5452, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000280)={0x80000000000080fb, 0x1}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a1, 0x0) 05:14:57 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 05:14:57 executing program 0 (fault-call:2 fault-nth:0): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:57 executing program 5: r0 = socket(0x11, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) [ 263.080539] FAULT_INJECTION: forcing a failure. [ 263.080539] name failslab, interval 1, probability 0, space 0, times 1 [ 263.119342] CPU: 0 PID: 8967 Comm: syz-executor.0 Not tainted 5.0.0-rc6+ #69 [ 263.126600] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.135965] Call Trace: [ 263.138663] dump_stack+0x172/0x1f0 [ 263.142380] should_fail.cold+0xa/0x1b [ 263.146293] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 263.151460] ? lock_downgrade+0x810/0x810 [ 263.155664] ? ___might_sleep+0x163/0x280 [ 263.159889] __should_failslab+0x121/0x190 [ 263.164192] should_failslab+0x9/0x14 [ 263.168039] kmem_cache_alloc+0x2be/0x710 [ 263.172250] ? ksys_write+0x166/0x1f0 [ 263.172297] getname_flags+0xd6/0x5b0 [ 263.172315] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.172334] getname+0x1a/0x20 [ 263.172350] __x64_sys_execve+0x73/0xc0 [ 263.172380] do_syscall_64+0x103/0x610 [ 263.185320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.185333] RIP: 0033:0x457e39 [ 263.185350] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.185358] RSP: 002b:00007fdf87cebc78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b 05:14:57 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000240)=0xc) r1 = syz_open_procfs(r0, 0x0) ioctl$UI_ABS_SETUP(r1, 0x401c5504, 0x0) r2 = openat$dsp(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(0xffffffffffffffff, 0x5452, 0x0) syz_open_dev$binder(&(0x7f0000d59ff3)='/dev/binder#\x00', 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x32, &(0x7f0000000000)=r1, 0x4) creat(&(0x7f00000000c0)='./file0\x00', 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000140)='btrfs\x00', 0x0, 0x0) ioctl$PPPIOCSNPMODE(r1, 0x4008744b, &(0x7f0000000280)={0x80000000000080fb, 0x1}) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x89a1, 0x0) [ 263.185373] RAX: ffffffffffffffda RBX: 00007fdf87cebc90 RCX: 0000000000457e39 [ 263.185384] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 263.245913] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 263.253194] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf87cec6d4 [ 263.260481] R13: 00000000004be434 R14: 00000000004cec80 R15: 0000000000000003 [ 263.273978] FAULT_INJECTION: forcing a failure. 05:14:57 executing program 5: r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:58 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 05:14:58 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x4, 0x0) socket$unix(0x1, 0x3fffffff, 0x0) bind$unix(r0, 0x0, 0x0) listen(0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) utime(0x0, 0x0) ioctl$FIONREAD(0xffffffffffffffff, 0x541b, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) syz_genetlink_get_family_id$tipc(0x0) ptrace$PTRACE_SECCOMP_GET_FILTER(0x420c, 0x0, 0x100000000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)) write$P9_RGETLOCK(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="3946bdf93eefccbb87a68c3d13d32c46e49dad45be977fe1fe0b5f18f0d199d3b1f642fb998c41847a5510c743c20a00b94e2b63687ee508bea409bdd1b3c5a173e25cb6d89484a255e74217c50d2688dc34e44e51a1f3509c6b05723ec6a19e431c13120b5f63af7cbfdeceb0d4770316dba35add46f6983654bb83444a614ffe5f9ce944eea15a0a6ff246a939c5554a8a5501e9a9faf03ee86b427e60f30698092e8fa97fce1ec9bb7db5462a35faaaf09693903b378ccfc9807a316a88078d92bc610dbf8fc703acf73f"], 0xcc) r3 = socket$inet6(0xa, 0x400000000001, 0x0) r4 = dup(r3) bind$inet6(r3, &(0x7f0000000600)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_int(r4, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) setsockopt$inet_tcp_int(r4, 0x6, 0x18, &(0x7f00000001c0), 0x4) r5 = open(&(0x7f0000000000)='./bus\x00', 0x100000141042, 0x0) ftruncate(r5, 0x10099b7) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x5}]}, 0x10) sendfile(r3, r5, 0x0, 0x8000fffffffe) connect$unix(r4, &(0x7f0000006780)=@file={0x0, './bus\x00'}, 0x6e) [ 263.273978] name failslab, interval 1, probability 0, space 0, times 1 05:14:58 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) [ 263.390582] CPU: 0 PID: 8976 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #69 [ 263.397869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.407235] Call Trace: [ 263.409840] dump_stack+0x172/0x1f0 [ 263.413490] should_fail.cold+0xa/0x1b [ 263.417410] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 263.422527] ? lock_downgrade+0x810/0x810 [ 263.426686] ? ___might_sleep+0x163/0x280 [ 263.430847] __should_failslab+0x121/0x190 [ 263.435102] should_failslab+0x9/0x14 [ 263.438915] kmem_cache_alloc_trace+0x2d1/0x760 [ 263.443696] ? ldsem_wake+0x40/0x40 [ 263.447392] h5_open+0x4e4/0x5f0 [ 263.450807] ? h5_rx_crc+0x20/0x20 [ 263.454348] ? ___might_sleep+0x163/0x280 [ 263.458522] hci_uart_tty_ioctl+0x2d4/0xa70 [ 263.462928] tty_ioctl+0xac9/0x14d0 [ 263.466571] ? hci_uart_init_work+0x150/0x150 [ 263.471079] ? tty_vhangup+0x30/0x30 [ 263.474820] ? mark_held_locks+0x100/0x100 [ 263.479147] ? proc_fail_nth_write+0x9d/0x1e0 [ 263.483656] ? proc_cwd_link+0x1d0/0x1d0 [ 263.487766] ? __f_unlock_pos+0x19/0x20 [ 263.491753] ? find_held_lock+0x35/0x130 [ 263.495820] ? __fget+0x340/0x540 [ 263.499279] ? find_held_lock+0x35/0x130 [ 263.503348] ? __fget+0x340/0x540 [ 263.506849] ? tty_vhangup+0x30/0x30 [ 263.510573] do_vfs_ioctl+0xd6e/0x1390 [ 263.514470] ? ioctl_preallocate+0x210/0x210 [ 263.517227] FAULT_INJECTION: forcing a failure. [ 263.517227] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 263.518888] ? __fget+0x367/0x540 [ 263.534150] ? iterate_fd+0x360/0x360 [ 263.538027] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 263.543573] ? fput+0x128/0x1a0 [ 263.546931] ? security_file_ioctl+0x93/0xc0 [ 263.551348] ksys_ioctl+0xab/0xd0 [ 263.554839] __x64_sys_ioctl+0x73/0xb0 [ 263.558732] do_syscall_64+0x103/0x610 [ 263.562625] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.567843] RIP: 0033:0x457e39 [ 263.571034] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.590428] RSP: 002b:00007f8a0bb13c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.598150] RAX: ffffffffffffffda RBX: 00007f8a0bb13c90 RCX: 0000000000457e39 [ 263.605428] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 263.612704] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 263.620006] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a0bb146d4 [ 263.627280] R13: 00000000004c06d9 R14: 00000000004d2370 R15: 0000000000000004 [ 263.634576] CPU: 1 PID: 8998 Comm: syz-executor.0 Not tainted 5.0.0-rc6+ #69 05:14:58 executing program 0 (fault-call:2 fault-nth:1): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 263.641778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.641784] Call Trace: [ 263.641808] dump_stack+0x172/0x1f0 [ 263.641827] should_fail.cold+0xa/0x1b [ 263.641844] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 263.657422] ? mark_held_locks+0x100/0x100 [ 263.657516] should_fail_alloc_page+0x50/0x60 [ 263.657554] __alloc_pages_nodemask+0x1a1/0x710 [ 263.679937] ? __alloc_pages_slowpath+0x2900/0x2900 [ 263.684969] ? find_held_lock+0x35/0x130 05:14:58 executing program 4 (fault-call:2 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 263.689060] cache_grow_begin+0x9c/0x8c0 [ 263.693147] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 263.698775] ? check_preemption_disabled+0x48/0x290 [ 263.703809] kmem_cache_alloc+0x645/0x710 [ 263.707973] ? ksys_write+0x166/0x1f0 [ 263.712292] getname_flags+0xd6/0x5b0 [ 263.716114] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.721488] getname+0x1a/0x20 [ 263.721504] __x64_sys_execve+0x73/0xc0 [ 263.721522] do_syscall_64+0x103/0x610 [ 263.721541] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 263.721555] RIP: 0033:0x457e39 [ 263.740947] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 263.751934] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 263.759856] RSP: 002b:00007fdf87cebc78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 263.759878] RAX: ffffffffffffffda RBX: 00007fdf87cebc90 RCX: 0000000000457e39 [ 263.792674] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 263.799962] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 263.807240] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf87cec6d4 [ 263.814514] R13: 00000000004be434 R14: 00000000004cec80 R15: 0000000000000003 [ 263.840893] FAULT_INJECTION: forcing a failure. [ 263.840893] name failslab, interval 1, probability 0, space 0, times 0 [ 263.884467] CPU: 0 PID: 9007 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #69 [ 263.891699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 263.901053] Call Trace: [ 263.903671] dump_stack+0x172/0x1f0 [ 263.907322] should_fail.cold+0xa/0x1b [ 263.911235] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 263.916350] ? mark_held_locks+0xb1/0x100 [ 263.920548] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 263.925657] ? __debug_object_init+0x190/0xc30 [ 263.930256] __should_failslab+0x121/0x190 [ 263.934501] should_failslab+0x9/0x14 [ 263.938341] kmem_cache_alloc_node+0x56/0x710 [ 263.942845] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 263.947959] ? __debug_object_init+0x190/0xc30 [ 263.952627] __alloc_skb+0xd5/0x5e0 [ 263.956268] ? skb_scrub_packet+0x440/0x440 [ 263.960596] ? lockdep_init_map+0x10c/0x5b0 [ 263.964929] h5_link_control.isra.0+0x2f/0xa0 [ 263.969432] h5_open+0x438/0x5f0 [ 263.972800] ? h5_rx_crc+0x20/0x20 [ 263.976339] ? ___might_sleep+0x163/0x280 [ 263.980556] hci_uart_tty_ioctl+0x2d4/0xa70 [ 263.984887] tty_ioctl+0xac9/0x14d0 [ 263.988518] ? hci_uart_init_work+0x150/0x150 [ 263.993019] ? tty_vhangup+0x30/0x30 [ 263.996743] ? mark_held_locks+0x100/0x100 [ 264.000994] ? proc_fail_nth_write+0x9d/0x1e0 [ 264.005491] ? proc_cwd_link+0x1d0/0x1d0 [ 264.009554] ? __f_unlock_pos+0x19/0x20 [ 264.013529] ? find_held_lock+0x35/0x130 [ 264.017589] ? __fget+0x340/0x540 [ 264.021046] ? find_held_lock+0x35/0x130 [ 264.025121] ? __fget+0x340/0x540 [ 264.028583] ? tty_vhangup+0x30/0x30 [ 264.032303] do_vfs_ioctl+0xd6e/0x1390 [ 264.036202] ? ioctl_preallocate+0x210/0x210 [ 264.040612] ? __fget+0x367/0x540 [ 264.044081] ? iterate_fd+0x360/0x360 [ 264.047889] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 264.053434] ? fput+0x128/0x1a0 [ 264.056721] ? security_file_ioctl+0x93/0xc0 [ 264.061135] ksys_ioctl+0xab/0xd0 [ 264.064594] __x64_sys_ioctl+0x73/0xb0 [ 264.068488] do_syscall_64+0x103/0x610 [ 264.072378] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.077569] RIP: 0033:0x457e39 [ 264.080762] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.099671] RSP: 002b:00007f8a0bb13c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.107386] RAX: ffffffffffffffda RBX: 00007f8a0bb13c90 RCX: 0000000000457e39 [ 264.114663] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 264.121937] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 264.129208] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a0bb146d4 [ 264.136479] R13: 00000000004c06d9 R14: 00000000004d2370 R15: 0000000000000004 05:14:58 executing program 0 (fault-call:2 fault-nth:2): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) [ 264.260448] FAULT_INJECTION: forcing a failure. [ 264.260448] name failslab, interval 1, probability 0, space 0, times 0 [ 264.278789] CPU: 1 PID: 9013 Comm: syz-executor.0 Not tainted 5.0.0-rc6+ #69 [ 264.286026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.286033] Call Trace: [ 264.286061] dump_stack+0x172/0x1f0 [ 264.286094] should_fail.cold+0xa/0x1b [ 264.286113] ? fault_create_debugfs_attr+0x1e0/0x1e0 05:14:59 executing program 4 (fault-call:2 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 264.286132] ? lock_downgrade+0x810/0x810 [ 264.286152] ? ___might_sleep+0x163/0x280 [ 264.305785] __should_failslab+0x121/0x190 [ 264.305806] should_failslab+0x9/0x14 [ 264.305822] kmem_cache_alloc+0x2be/0x710 [ 264.305836] ? save_stack+0xa9/0xd0 [ 264.305851] ? save_stack+0x45/0xd0 [ 264.323456] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 264.323472] ? kasan_slab_alloc+0xf/0x20 [ 264.323490] dup_fd+0x85/0xb30 [ 264.323507] ? mark_held_locks+0x100/0x100 [ 264.331554] unshare_fd+0x160/0x1d0 [ 264.331571] ? cache_grow_end+0xa4/0x190 [ 264.363102] ? mmdrop_async_fn+0x20/0x20 [ 264.367194] ? cache_grow_end+0xa4/0x190 [ 264.371279] unshare_files+0x7f/0x1f0 [ 264.375081] FAULT_INJECTION: forcing a failure. [ 264.375081] name failslab, interval 1, probability 0, space 0, times 0 [ 264.386275] ? lock_downgrade+0x810/0x810 [ 264.390440] ? __ia32_sys_unshare+0x40/0x40 [ 264.394787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.400346] ? check_preemption_disabled+0x48/0x290 [ 264.405393] __do_execve_file.isra.0+0x27e/0x23f0 [ 264.410243] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 264.415346] ? __check_object_size+0x3d/0x42f [ 264.419856] ? copy_strings_kernel+0x110/0x110 [ 264.424443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.429983] ? getname_flags+0x277/0x5b0 [ 264.434045] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.439425] __x64_sys_execve+0x8f/0xc0 [ 264.443411] do_syscall_64+0x103/0x610 [ 264.447320] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.452509] RIP: 0033:0x457e39 [ 264.455703] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 264.474609] RSP: 002b:00007fdf87cebc78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 264.482328] RAX: ffffffffffffffda RBX: 00007fdf87cebc90 RCX: 0000000000457e39 [ 264.489604] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 264.496881] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 264.504162] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf87cec6d4 [ 264.511438] R13: 00000000004be434 R14: 00000000004cec80 R15: 0000000000000003 [ 264.521679] CPU: 1 PID: 9017 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #69 [ 264.528919] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 264.529534] 8021q: adding VLAN 0 to HW filter on device team0 [ 264.538281] Call Trace: [ 264.538308] dump_stack+0x172/0x1f0 [ 264.538327] should_fail.cold+0xa/0x1b [ 264.538342] ? h5_open+0x4e4/0x5f0 [ 264.538357] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 264.538373] ? __debug_object_init+0x190/0xc30 [ 264.538391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 264.573056] ? should_fail+0x14d/0x85c [ 264.576962] __should_failslab+0x121/0x190 [ 264.581226] should_failslab+0x9/0x14 [ 264.585032] kmem_cache_alloc_node_trace+0x5a/0x720 [ 264.590081] ? __alloc_skb+0xd5/0x5e0 [ 264.594027] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 264.599495] __kmalloc_node_track_caller+0x3d/0x70 [ 264.604451] __kmalloc_reserve.isra.0+0x40/0xf0 [ 264.609129] __alloc_skb+0x10b/0x5e0 [ 264.612846] ? skb_scrub_packet+0x440/0x440 [ 264.617173] ? lockdep_init_map+0x10c/0x5b0 [ 264.621504] h5_link_control.isra.0+0x2f/0xa0 [ 264.626003] h5_open+0x438/0x5f0 [ 264.629372] ? h5_rx_crc+0x20/0x20 [ 264.632922] ? ___might_sleep+0x163/0x280 [ 264.637123] hci_uart_tty_ioctl+0x2d4/0xa70 [ 264.641455] tty_ioctl+0xac9/0x14d0 [ 264.645097] ? hci_uart_init_work+0x150/0x150 [ 264.649598] ? tty_vhangup+0x30/0x30 [ 264.653323] ? mark_held_locks+0x100/0x100 [ 264.657563] ? proc_fail_nth_write+0x9d/0x1e0 [ 264.662064] ? proc_cwd_link+0x1d0/0x1d0 [ 264.666138] ? __f_unlock_pos+0x19/0x20 [ 264.670131] ? find_held_lock+0x35/0x130 [ 264.674208] ? __fget+0x340/0x540 [ 264.677665] ? find_held_lock+0x35/0x130 [ 264.681730] ? __fget+0x340/0x540 [ 264.685190] ? tty_vhangup+0x30/0x30 [ 264.688914] do_vfs_ioctl+0xd6e/0x1390 [ 264.692807] ? ioctl_preallocate+0x210/0x210 [ 264.697216] ? __fget+0x367/0x540 [ 264.700678] ? iterate_fd+0x360/0x360 [ 264.704489] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 264.710037] ? fput+0x128/0x1a0 [ 264.713857] ? security_file_ioctl+0x93/0xc0 [ 264.718272] ksys_ioctl+0xab/0xd0 [ 264.721733] __x64_sys_ioctl+0x73/0xb0 [ 264.725630] do_syscall_64+0x103/0x610 [ 264.729522] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 264.734712] RIP: 0033:0x457e39 [ 264.737912] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 05:14:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 264.756824] RSP: 002b:00007f8a0bb13c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 264.764545] RAX: ffffffffffffffda RBX: 00007f8a0bb13c90 RCX: 0000000000457e39 [ 264.771837] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 264.779122] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 264.786399] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a0bb146d4 [ 264.793673] R13: 00000000004c06d9 R14: 00000000004d2370 R15: 0000000000000004 05:14:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x200, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 05:14:59 executing program 5: r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000240)={'team0\x00\x00\xff\xff\xff\xc0\x00\x03\x00\x02\xff', 0x4bfd}) 05:14:59 executing program 0 (fault-call:2 fault-nth:3): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:14:59 executing program 1: sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f0000dddfc8)={0x0, 0x0, &(0x7f0000001340)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000000f060501ff0080fffdffff2e0a0000000c000140070000007defff010c000b00030022ff02f10000c02589059b9bc113b00331349e418ff6cacc084e4221d5cb04039816de9d359a9ee4a6a7609d428183c7b2f60dbfe66d966f721b78e9fcf404d3dd7c6965a6a79a1ba420b359a431abad852ad9ad72166ae8801e2e9baf974d85f679c3ddc7191c47d01ab231332979f5a210f8759a528af7474dc35d7ab4693138cbc76948f46e421c201f7757"], 0x2c}}, 0x40) 05:14:59 executing program 3: socket$nl_crypto(0x10, 0x3, 0x15) r0 = socket(0x11, 0x802, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000040)={'lapb0\x00', 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'team0\x00\x10\x00', 0xffffffffffbfdffc}) [ 264.941039] FAULT_INJECTION: forcing a failure. [ 264.941039] name failslab, interval 1, probability 0, space 0, times 0 05:14:59 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x200, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) 05:14:59 executing program 4 (fault-call:2 fault-nth:3): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 265.038143] CPU: 1 PID: 9030 Comm: syz-executor.0 Not tainted 5.0.0-rc6+ #69 [ 265.045387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.045399] Call Trace: [ 265.057372] dump_stack+0x172/0x1f0 [ 265.061014] should_fail.cold+0xa/0x1b [ 265.064932] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 265.070055] ? lock_downgrade+0x810/0x810 [ 265.074225] ? ___might_sleep+0x163/0x280 [ 265.078404] __should_failslab+0x121/0x190 [ 265.082651] should_failslab+0x9/0x14 05:14:59 executing program 1: openat$kvm(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/kvm\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x800000000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(0xffffffffffffffff, 0x400448c8, 0x0) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') mmap$perf(&(0x7f0000105000/0x4000)=nil, 0x4000, 0x1000000, 0x11, r1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) ioctl$BLKSECTGET(r1, 0x1267, &(0x7f00000000c0)) ustat(0x0, 0x0) mkdir(0x0, 0x1) clone(0x0, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) ioctl$NBD_DO_IT(r1, 0xab03) mount(0x0, 0x0, &(0x7f0000000000)='ecryptfs\x00', 0x0, &(0x7f00000001c0)='\x7f') fcntl$setsig(r0, 0xa, 0x20) mprotect(&(0x7f0000104000/0x3000)=nil, 0x3000, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f0000000200)={0x0, 0x1, 0x3, 0x5, 0x1f}, 0xc) pread64(r1, &(0x7f0000003c00)=""/4096, 0xffffff72, 0x0) getsockopt$XDP_MMAP_OFFSETS(0xffffffffffffffff, 0x11b, 0x1, &(0x7f0000000140), 0x0) write(0xffffffffffffffff, &(0x7f0000000040)="fc00000048000700ab092500090007000aab0800000000000000e29321000100ff0100000005d0000000000000039815fa2c1ec28656aaa79bb94b46fe000000bc000200ffffffff000000002fdf0d11512fd633d44000000000008934d07302ade01720d7d5bbc91a3e2e80772c05defd5a32e280fc83ab82f605f70c9ddef2fe082038f4f8b29d3ef3d92c8b170e5bba4a463ae4f5566f91cf190201ded815b2ccd243f295ed94e0ad91bd0734babc7c3f2eeb57d43dd16b17e583df150c3b880f411f46a6b567b4d5715587e658a1ad0a4f01731d05b0350b0041f0d48f6f0000080548deac270e33429fd3000175e63fb8d38a", 0xf5) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000100)={&(0x7f0000f4dff4), 0x4d9, &(0x7f0000000040)={&(0x7f0000000080)=@migrate={0x15c, 0x21, 0x1, 0x0, 0x0, {{@in6=@ipv4={[], [], @multicast1}, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffff}}, [@migrate={0x10c}]}, 0x15c}}, 0x0) [ 265.082668] kmem_cache_alloc_trace+0x2d1/0x760 [ 265.082685] ? lock_downgrade+0x810/0x810 [ 265.082698] ? __lock_is_held+0xb6/0x140 [ 265.082716] alloc_fdtable+0x86/0x290 [ 265.097169] FAULT_INJECTION: forcing a failure. [ 265.097169] name failslab, interval 1, probability 0, space 0, times 0 [ 265.099369] dup_fd+0x743/0xb30 [ 265.099413] unshare_fd+0x160/0x1d0 [ 265.099428] ? cache_grow_end+0xa4/0x190 [ 265.099448] ? mmdrop_async_fn+0x20/0x20 [ 265.114420] ? cache_grow_end+0xa4/0x190 [ 265.114445] unshare_files+0x7f/0x1f0 [ 265.114460] ? lock_downgrade+0x810/0x810 [ 265.114478] ? __ia32_sys_unshare+0x40/0x40 [ 265.121373] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.121390] ? check_preemption_disabled+0x48/0x290 [ 265.121411] __do_execve_file.isra.0+0x27e/0x23f0 [ 265.121424] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 265.121444] ? __check_object_size+0x3d/0x42f [ 265.170677] ? copy_strings_kernel+0x110/0x110 [ 265.175282] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 265.180828] ? getname_flags+0x277/0x5b0 [ 265.184897] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.190280] __x64_sys_execve+0x8f/0xc0 [ 265.194272] do_syscall_64+0x103/0x610 [ 265.198165] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.203359] RIP: 0033:0x457e39 [ 265.206557] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.225468] RSP: 002b:00007fdf87cebc78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 265.233188] RAX: ffffffffffffffda RBX: 00007fdf87cebc90 RCX: 0000000000457e39 [ 265.240469] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 265.247743] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 265.255022] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf87cec6d4 [ 265.262295] R13: 00000000004be434 R14: 00000000004cec80 R15: 0000000000000003 [ 265.269599] CPU: 0 PID: 9042 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #69 [ 265.276808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.286158] Call Trace: [ 265.288786] dump_stack+0x172/0x1f0 [ 265.292430] should_fail.cold+0xa/0x1b [ 265.296331] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 265.301452] ? lock_downgrade+0x810/0x810 [ 265.305607] ? ___might_sleep+0x163/0x280 [ 265.309764] __should_failslab+0x121/0x190 [ 265.314008] should_failslab+0x9/0x14 [ 265.317818] kmem_cache_alloc_trace+0x2d1/0x760 [ 265.322506] ? h5_open+0x472/0x5f0 [ 265.326060] ? h5_rx_crc+0x20/0x20 [ 265.329625] ? ___might_sleep+0x163/0x280 [ 265.333883] hci_alloc_dev+0x43/0x1d00 [ 265.337784] hci_uart_tty_ioctl+0x321/0xa70 [ 265.342123] tty_ioctl+0xac9/0x14d0 [ 265.345764] ? hci_uart_init_work+0x150/0x150 [ 265.350283] ? tty_vhangup+0x30/0x30 [ 265.354016] ? mark_held_locks+0x100/0x100 [ 265.358264] ? proc_fail_nth_write+0x9d/0x1e0 [ 265.362767] ? proc_cwd_link+0x1d0/0x1d0 [ 265.366836] ? __f_unlock_pos+0x19/0x20 [ 265.370816] ? find_held_lock+0x35/0x130 [ 265.374882] ? __fget+0x340/0x540 [ 265.378349] ? find_held_lock+0x35/0x130 [ 265.382424] ? __fget+0x340/0x540 [ 265.385922] ? tty_vhangup+0x30/0x30 [ 265.389645] do_vfs_ioctl+0xd6e/0x1390 [ 265.393562] ? ioctl_preallocate+0x210/0x210 [ 265.397976] ? __fget+0x367/0x540 [ 265.401442] ? iterate_fd+0x360/0x360 [ 265.405250] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 265.410787] ? fput+0x128/0x1a0 [ 265.414093] ? security_file_ioctl+0x93/0xc0 [ 265.418511] ksys_ioctl+0xab/0xd0 [ 265.421975] __x64_sys_ioctl+0x73/0xb0 [ 265.425903] do_syscall_64+0x103/0x610 [ 265.429805] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.434995] RIP: 0033:0x457e39 [ 265.438191] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.457108] RSP: 002b:00007f8a0bb13c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 265.464825] RAX: ffffffffffffffda RBX: 00007f8a0bb13c90 RCX: 0000000000457e39 [ 265.472107] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 265.479382] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 265.486663] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a0bb146d4 [ 265.493935] R13: 00000000004c06d9 R14: 00000000004d2370 R15: 0000000000000004 [ 265.504867] kasan: CONFIG_KASAN_INLINE enabled [ 265.512334] Bluetooth: Invalid header checksum [ 265.520392] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 265.541308] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 265.547592] CPU: 0 PID: 2980 Comm: kworker/0:2 Not tainted 5.0.0-rc6+ #69 [ 265.554522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.563884] Workqueue: events hci_uart_write_work [ 265.568731] RIP: 0010:hci_uart_write_work+0x1b6/0x710 [ 265.573947] Code: 0f 85 6a 04 00 00 49 8b b4 24 c8 00 00 00 4c 89 ef e8 5e 72 53 02 89 c6 48 8b 45 d0 48 8d b8 5c 10 00 00 48 89 f8 48 c1 e8 03 <0f> b6 14 18 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 1d [ 265.584741] Bluetooth: Can't allocate HCI device [ 265.593367] RSP: 0018:ffff88809eff7cb0 EFLAGS: 00010203 [ 265.593378] RAX: 000000000000020b RBX: dffffc0000000000 RCX: 0000000000000000 [ 265.593386] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000105c [ 265.593394] RBP: ffff88809eff7d30 R08: ffff88809ea765c0 R09: ffff88809ea76e88 [ 265.593409] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a9296e80 [ 265.593416] R13: ffff88805caa4200 R14: ffff8880824ae568 R15: ffff8880a9296ef0 [ 265.593426] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 265.593434] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.593442] CR2: 00007f5f1e420950 CR3: 00000000996d1000 CR4: 00000000001406f0 [ 265.593452] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 265.593458] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 265.593462] Call Trace: [ 265.593549] process_one_work+0x98e/0x1790 [ 265.593568] ? pwq_dec_nr_in_flight+0x320/0x320 [ 265.600316] kobject: 'sit0' (00000000596c1899): kobject_cleanup, parent (null) [ 265.603677] ? lock_acquire+0x16f/0x3f0 [ 265.633781] kobject: 'sit0' (00000000596c1899): auto cleanup 'remove' event [ 265.639994] worker_thread+0x98/0xe40 [ 265.640058] ? trace_hardirqs_on+0x67/0x230 [ 265.686441] FAULT_INJECTION: forcing a failure. [ 265.686441] name failslab, interval 1, probability 0, space 0, times 0 [ 265.687343] kthread+0x357/0x430 [ 265.687359] ? process_one_work+0x1790/0x1790 [ 265.687376] ? kthread_cancel_delayed_work_sync+0x20/0x20 05:15:00 executing program 0 (fault-call:2 fault-nth:4): mknod$loop(&(0x7f0000000ff8)='./file0\x00', 0x3, 0xffffffffffffffff) lsetxattr(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=@known='security.capability\x00', &(0x7f0000000340)='\x01\x00\x00\x02\x01C\x9fo&H\xba:\xe3\xc3\xdc\x00\x00\x00\x00\x00', 0x14, 0x0) execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 05:15:00 executing program 4 (fault-call:2 fault-nth:4): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) [ 265.699092] kobject: 'sit0' (00000000596c1899): kobject_uevent_env [ 265.699568] ret_from_fork+0x3a/0x50 [ 265.716637] FAULT_INJECTION: forcing a failure. [ 265.716637] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 265.726143] Modules linked in: [ 265.729509] CPU: 1 PID: 9055 Comm: syz-executor.4 Not tainted 5.0.0-rc6+ #69 [ 265.735702] 8021q: adding VLAN 0 to HW filter on device team0 [ 265.739499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 265.746582] kobject: 'loop0' (00000000f4bdf1b5): kobject_uevent_env [ 265.749502] Call Trace: [ 265.768191] kobject: 'loop0' (00000000f4bdf1b5): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 265.771655] dump_stack+0x172/0x1f0 [ 265.771671] should_fail.cold+0xa/0x1b [ 265.771688] ? trace_hardirqs_off+0x62/0x220 [ 265.780720] kobject: 'loop4' (00000000933165f8): kobject_uevent_env [ 265.786919] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 265.786939] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 265.793527] kobject: 'loop4' (00000000933165f8): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 265.795917] should_fail_alloc_page+0x50/0x60 [ 265.795935] __alloc_pages_nodemask+0x1a1/0x710 [ 265.832990] ---[ end trace daeffd3067a11b77 ]--- [ 265.833836] ? __alloc_pages_slowpath+0x2900/0x2900 [ 265.843339] RIP: 0010:hci_uart_write_work+0x1b6/0x710 [ 265.847751] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 265.847771] cache_grow_begin+0x9c/0x8c0 [ 265.852477] Code: 0f 85 6a 04 00 00 49 8b b4 24 c8 00 00 00 4c 89 ef e8 5e 72 53 02 89 c6 48 8b 45 d0 48 8d b8 5c 10 00 00 48 89 f8 48 c1 e8 03 <0f> b6 14 18 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 1d [ 265.857169] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 265.857187] ? check_preemption_disabled+0x48/0x290 [ 265.862238] RSP: 0018:ffff88809eff7cb0 EFLAGS: 00010203 [ 265.867373] kmem_cache_alloc_trace+0x67f/0x760 [ 265.867391] ? h5_open+0x472/0x5f0 [ 265.872531] RAX: 000000000000020b RBX: dffffc0000000000 RCX: 0000000000000000 [ 265.876528] hci_alloc_dev+0x43/0x1d00 [ 265.876545] hci_uart_tty_ioctl+0x321/0xa70 [ 265.895523] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000105c [ 265.900979] tty_ioctl+0xac9/0x14d0 [ 265.900995] ? hci_uart_init_work+0x150/0x150 [ 265.901026] ? tty_vhangup+0x30/0x30 [ 265.906103] RBP: ffff88809eff7d30 R08: ffff88809ea765c0 R09: ffff88809ea76e88 [ 265.911382] ? mark_held_locks+0x100/0x100 [ 265.911398] ? proc_fail_nth_write+0x9d/0x1e0 [ 265.911413] ? proc_cwd_link+0x1d0/0x1d0 [ 265.911431] ? __fdget_pos+0xee/0x110 [ 265.916123] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880a9296e80 [ 265.919620] ? proc_cwd_link+0x1d0/0x1d0 [ 265.919640] ? tty_vhangup+0x30/0x30 [ 265.926979] R13: ffff88805caa4200 R14: ffff8880824ae568 R15: ffff8880a9296ef0 [ 265.930808] do_vfs_ioctl+0xd6e/0x1390 [ 265.930825] ? ioctl_preallocate+0x210/0x210 [ 265.930839] ? __fget+0x367/0x540 [ 265.935177] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 265.942433] ? iterate_fd+0x360/0x360 [ 265.942449] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 265.942463] ? fput+0x128/0x1a0 [ 265.942482] ? security_file_ioctl+0x93/0xc0 [ 265.946142] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 265.950584] ksys_ioctl+0xab/0xd0 [ 265.950598] __x64_sys_ioctl+0x73/0xb0 [ 265.950615] do_syscall_64+0x103/0x610 [ 265.954346] CR2: 00007ff14aee8000 CR3: 000000009735e000 CR4: 00000000001406f0 [ 265.961579] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 265.961590] RIP: 0033:0x457e39 [ 265.961608] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 265.965867] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 265.970298] RSP: 002b:00007f8a0bb13c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 265.970310] RAX: ffffffffffffffda RBX: 00007f8a0bb13c90 RCX: 0000000000457e39 [ 265.970318] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 265.970340] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 265.970351] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f8a0bb146d4 [ 265.974438] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 265.978179] R13: 00000000004c06d9 R14: 00000000004d2370 R15: 0000000000000004 [ 265.992802] kasan: CONFIG_KASAN_INLINE enabled [ 265.994634] Bluetooth: Invalid header checksum [ 266.005757] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 266.009276] CPU: 0 PID: 9053 Comm: syz-executor.0 Tainted: G D 5.0.0-rc6+ #69 [ 266.017409] kobject: 'loop2' (00000000443fae52): kobject_uevent_env [ 266.020932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.020937] Call Trace: [ 266.020959] dump_stack+0x172/0x1f0 [ 266.020975] should_fail.cold+0xa/0x1b [ 266.020990] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 266.021005] ? lock_downgrade+0x810/0x810 [ 266.021021] ? set_page_refcounted+0x100/0x100 [ 266.026542] kobject: 'loop2' (00000000443fae52): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 266.030343] ? ___might_sleep+0x163/0x280 [ 266.030362] __should_failslab+0x121/0x190 [ 266.030378] should_failslab+0x9/0x14 [ 266.030393] kmem_cache_alloc_node_trace+0x270/0x720 [ 266.030417] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 266.045197] general protection fault: 0000 [#2] PREEMPT SMP KASAN [ 266.047420] __kmalloc_node+0x3d/0x70 [ 266.051292] CPU: 1 PID: 7944 Comm: kworker/1:3 Tainted: G D 5.0.0-rc6+ #69 [ 266.055167] kvmalloc_node+0x68/0x100 [ 266.062409] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 266.062427] Workqueue: events hci_uart_write_work [ 266.067604] alloc_fdtable+0xd6/0x290 [ 266.070784] RIP: 0010:hci_uart_write_work+0x1b6/0x710 [ 266.089680] dup_fd+0x743/0xb30 05:15:00 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x10000000000022, &(0x7f00000001c0)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x200, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 266.096944] Code: 0f 85 6a 04 00 00 49 8b b4 24 c8 00 00 00 4c 89 ef e8 5e 72 53 02 89 c6 48 8b 45 d0 48 8d b8 5c 10 00 00 48 89 f8 48 c1 e8 03 <0f> b6 14 18 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 1d [ 266.104747] unshare_fd+0x160/0x1d0 [ 266.111997] RSP: 0018:ffff88805c957cb0 EFLAGS: 00010203 [ 266.119266] ? mmdrop_async_fn+0x20/0x20 [ 266.126510] RAX: 000000000000020b RBX: dffffc0000000000 RCX: 0000000000000000 [ 266.133783] unshare_files+0x7f/0x1f0 [ 266.141024] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000105c [ 266.148300] ? lock_downgrade+0x810/0x810 [ 266.152857] RBP: ffff88805c957d30 R08: ffff88805c94a000 R09: ffffed10126e4a66 [ 266.157437] ? __ia32_sys_unshare+0x40/0x40 [ 266.164767] R10: ffffed10126e4a65 R11: ffff88809372532b R12: ffff888098ee0b80 [ 266.173346] __do_execve_file.isra.0+0x27e/0x23f0 [ 266.179725] R13: ffff88805c6bae80 R14: ffff8880a0b6a5e8 R15: ffff888098ee0bf0 [ 266.189091] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 266.191654] FS: 0000000000000000(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 05:15:01 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") setsockopt$inet_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0x1, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x2, &(0x7f0000000080)=0x200, 0x4) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) sendmmsg(r0, &(0x7f0000003f80)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000280)="13", 0x1}], 0x1}}], 0x1, 0x40) [ 266.195272] ? __check_object_size+0x3d/0x42f [ 266.199132] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 266.204227] ? copy_strings_kernel+0x110/0x110 [ 266.208346] CR2: 0000000000a50489 CR3: 000000008f6db000 CR4: 00000000001406e0 [ 266.212918] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 266.212936] ? getname_flags+0x277/0x5b0 [ 266.222362] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 266.226510] __x64_sys_execve+0x8f/0xc0 [ 266.230716] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 266.234509] do_syscall_64+0x103/0x610 [ 266.239582] Call Trace: [ 266.244686] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 266.250915] process_one_work+0x98e/0x1790 [ 266.254692] RIP: 0033:0x457e39 [ 266.262997] ? pwq_dec_nr_in_flight+0x320/0x320 [ 266.266773] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 266.276118] ? lock_acquire+0x16f/0x3f0 [ 266.280956] RSP: 002b:00007fdf87cebc78 EFLAGS: 00000246 ORIG_RAX: 000000000000003b [ 266.284757] worker_thread+0x98/0xe40 [ 266.289911] RAX: ffffffffffffffda RBX: 00007fdf87cebc90 RCX: 0000000000457e39 [ 266.289922] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000080 [ 266.293194] ? trace_hardirqs_on+0x67/0x230 [ 266.312088] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 266.315721] kthread+0x357/0x430 [ 266.321053] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fdf87cec6d4 [ 266.325139] ? process_one_work+0x1790/0x1790 [ 266.332391] R13: 00000000004be434 R14: 00000000004cec80 R15: 0000000000000003 [ 266.336193] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 266.345345] kobject: 'sit0' (00000000596c1899): kobject_uevent_env: uevent_suppress caused the event to drop! [ 266.347588] ret_from_fork+0x3a/0x50 [ 266.347600] Modules linked in: [ 266.355716] kobject: 'sit0' (00000000596c1899): calling ktype release [ 266.418512] kobject: 'loop2' (00000000443fae52): kobject_uevent_env [ 266.420536] Kernel panic - not syncing: Fatal exception [ 266.426376] kobject: 'loop2' (00000000443fae52): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 266.432327] Kernel Offset: disabled [ 266.603502] Rebooting in 86400 seconds..