11, 0x8, "c9a7d0566b81d17d92b845b1a3891de914842c4a649e28baace966469741fc75e952000d38597635a9eff646a743c3abf8a18e330b8e74b8670cf47a92981c502f831a5a83a745b91748c0d2ee2d712c36b9baeadce9732ae7fe2488d5c39a2be89762a6279f2097b363bef7ce54588a94b58e1d6855b22bea685bc7adb9cde6edf862ed6fc116886306de078813cb12608e22f5e0f0532c423cd9094023bf23058204185632be569ff492216a4946cb6b1819"}, {0x28, 0x101, 0x2, "e61a02c24241211e91537cfe45182db5ac0cc745b3"}], 0x298}}, {{&(0x7f0000001d40)=@caif=@util={0x25, "df09fc067727b066beb0a3e350e312c3"}, 0x80, &(0x7f0000001f80)=[{&(0x7f0000001dc0)="c2e8ad79972fe15c227cb5e5c683e8cc212875fcf3a0e8fb336e0714577a9694c297377ce3399e125a60f627f4a6ff8dbddb59d22ee9156e2babb6f82351f4569411f443fa8a194030170f2b457c18db817587f753007e8a92e987758934bdb8abcb2cd9facf13600f13c028157fac1d5a3ad85e694b34909ae8f7bded0af35547ebee6e88c01abc607a7f79d713f2a1ecc550d0d3f3c5c8d10d1dc58936b1ba5f016772afba20c5aa80", 0xaa}, {&(0x7f0000003500)="9eb4bc5c8bd71d7f338eacd4390f968001c5ed7aa3173dd3b75307f7b5b8d1dc58285362e9929387faf0ebec049d67c328c3c37ef284ee9bc986fdd59eafe4950af375a1cb11c86aec9a8113e4c6f8c7f909d814f6192ccb38b26e53567bb6a9889d0517a8e265c591c1a413b29e8b5704626aef4fb04fb60d21ed300c0f8ede7e411988f37fd6ab", 0x88}, {&(0x7f0000001f40)="442ab2485e497f3602e01432e121bc6d9afe1840133c3e74d72f5358f404cf7f712ce297840ae6", 0x27}], 0x3, &(0x7f0000001fc0)}}, {{&(0x7f0000002000)=@nfc_llcp={0x27, 0x0, 0x2, 0x1, 0x8, 0x70, "4a47d15e03854befcb313eee7bc11990f1096976c07e57b54ce466df04de8239813819123f1bcfcd0a8f8482cd3361667ec1c8299a76cc25e9924491085c1d", 0x2f}, 0x80, &(0x7f0000003180)=[{&(0x7f0000002080)="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", 0x1000}, {&(0x7f0000003080)="24b9294bbd97e03f7f6f21265c634319d20ee2c4ab7e9619489974f57dd85576d298b349bf2fae68e09418e530b95c25414017a60e669b1433e6fd38b886b9740ee9", 0x42}, {&(0x7f0000003100)="383e81b93f9f3610e6b43764a306467ef0cb78350c980f1e3c570fa888ddf48c22cda9f9f429b82fac2f6371abdffd08fecb13190b52f39ae166cfdb6317b8accb2b03d40356edd87c72b3802ab1f54d65b663", 0x53}], 0x3, &(0x7f00000031c0)=[{0x40, 0x36, 0xfffffc01, "90769e2aa9d3ed0eb6bced1f8e82fa48f9559f420e0a496094d0920145a320468724af3c25a60165ab6cd20f08df3ef9"}, {0x78, 0x10a, 0xf3, "d3cd10d31ca2f6c57b81854d5120e9b95075e6830de0b6f38a7a09285e4fe38f6cb816716e0ae9060829ff4ae37818474953a58e4e2ec0343accee2c1f47fe0b9c82453952e05c14187a104cc5afc7f2b04a9f763ed3b6b9326ea20fe62993b9a6047d011a87e85f"}, {0x78, 0x107, 0x6a2, "4d7701a9810fd8135f9443e82dfd2899626ea2f8f7faa3e3d5c5209cb43bf33280cb02f65a3ad66bd5ad873dc279e8f9d72fb7ba66e2961c1128c0c1ab383e9c1173e140ae03159790a3e0ca7ffc92dbaeed7006746345f57e2f9ade78b35f8843985f43"}], 0x130}}], 0x4, 0x44000) [ 673.463049][T19355] xt_TPROXY: Can be used only with -p tcp or -p udp [ 673.614581][T19325] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 674.029548][ T21] tipc: Subscription rejected, illegal request 09:14:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x1000000, 0x0) 09:14:18 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback={0x0, 0xff00}, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x400000000000000}, 0x0) 09:14:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:18 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x404000, 0x0) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000200)=0xff, &(0x7f0000000240)=0x1) r4 = dup3(r2, r1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r5, 0x600004) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r4, 0x8818564c, &(0x7f00000003c0)) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20802, 0x0) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="0700000000000000ea0b0000000000000008000000000000002000000000000000730000400000000001040000000000009509000000000000ffff0000000000005fd847258f8f4fda4100000000000000df09000000000000080000000000000000"]) sendfile(r1, r5, 0x0, 0x80001d00c0d0) 09:14:18 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:14:18 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback={0x0, 0x7ffffff2}, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 676.268341][T19382] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 676.288835][T19386] xt_TPROXY: Can be used only with -p tcp or -p udp [ 676.297063][ T279] tipc: TX() has been purged, node left! 09:14:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0xa00000000000000}, 0x0) 09:14:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0xe00000000000000}, 0x0) 09:14:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0xf00000000000000}, 0x0) [ 676.433042][T19397] xt_TPROXY: Can be used only with -p tcp or -p udp [ 676.467371][T19400] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:18 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback={0x0, 0x7ffffff8}, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x3f00000000000000}, 0x0) [ 676.661142][T19413] xt_TPROXY: Can be used only with -p tcp or -p udp [ 676.689080][T19413] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xe000000, 0x0) 09:14:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:21 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x404000, 0x0) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000200)=0xff, &(0x7f0000000240)=0x1) r4 = dup3(r2, r1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r5, 0x600004) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r4, 0x8818564c, &(0x7f00000003c0)) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20802, 0x0) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="0700000000000000ea0b0000000000000008000000000000002000000000000000730000400000000001040000000000009509000000000000ffff0000000000005fd847258f8f4fda4100000000000000df09000000000000080000000000000000"]) sendfile(r1, r5, 0x0, 0x80001d00c0d0) 09:14:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x6000000000000000}, 0x0) 09:14:21 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback={0x0, 0x7ffffff9}, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:21 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:14:21 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback={0x0, 0x7ffffffe}, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 679.316111][T19432] xt_TPROXY: Can be used only with -p tcp or -p udp [ 679.341196][T19431] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x9effffff00000000}, 0x0) 09:14:21 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback={0x0, 0xffffff1f}, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 679.484962][T19449] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, 0xffffffffffffffff, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0xb201000000000000}, 0x0) 09:14:21 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x0}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 679.589801][T19456] xt_TPROXY: Can be used only with -p tcp or -p udp [ 679.683812][T19466] xt_TPROXY: Can be used only with -p tcp or -p udp [ 679.831194][T19435] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:14:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x7e000000, 0x0) 09:14:24 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = socket$inet6_sctp(0xa, 0x801, 0x84) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) mount(0x0, 0x0, &(0x7f00000001c0)='sysfs\x00', 0x0, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000cf6fe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ocfs2_control\x00', 0x404000, 0x0) getsockopt$bt_BT_POWER(r3, 0x112, 0x9, &(0x7f0000000200)=0xff, &(0x7f0000000240)=0x1) r4 = dup3(r2, r1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) r5 = open(&(0x7f0000000040)='./bus\x00', 0x141042, 0x0) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) ftruncate(r5, 0x600004) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) ioctl$VIDIOC_G_ENC_INDEX(r4, 0x8818564c, &(0x7f00000003c0)) r6 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x20802, 0x0) ioctl$KVM_SET_MSRS(r6, 0x4008ae89, &(0x7f0000000140)=ANY=[@ANYBLOB="0700000000000000ea0b0000000000000008000000000000002000000000000000730000400000000001040000000000009509000000000000ffff0000000000005fd847258f8f4fda4100000000000000df09000000000000080000000000000000"]) sendfile(r1, r5, 0x0, 0x80001d00c0d0) 09:14:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0xc00e000000000000}, 0x0) 09:14:24 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x2}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:24 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, 0x0, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:14:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) [ 682.488302][T19499] tproxy_tg6_check: 1 callbacks suppressed [ 682.488309][T19499] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:24 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x3}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0xffffff7f00000000}, 0x0) [ 682.580415][T19493] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:24 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x5}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 682.689054][T19507] xt_TPROXY: Can be used only with -p tcp or -p udp [ 682.696584][T19488] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:14:24 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xd3c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x3}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESOCT, @ANYRES32], 0x1a0) write$FUSE_OPEN(r2, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xb}}, 0x20) fallocate(r0, 0x100000003, 0x0, 0x80019c) lsetxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)=@known='com.apple.FinderInfo\x00', 0x0, 0x0, 0xd6f4ca7f12032f72) socket$inet_dccp(0x2, 0x6, 0x0) open(&(0x7f0000000180)='./bus\x00', 0xe8403, 0x1ee) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x815, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000500)={0x0, {}, 0x0, {}, 0x0, 0x3, 0x18, 0x8, "800f9ab6fb4c32a26face484bbbecb0a3d3f07f85d335003dc0469ff4d96b987fb8022387c1e5a48ba9b34c8725a16a123ef2628c0cef91d6c13fa8ab2e0c9dd", "cf2c62c3de4a2869cd65b1348ddfbc676348997d632029d1670bdbbd66bcb1e0", [0x10000, 0x6a7]}) sendmsg$NFT_MSG_GETCHAIN(r2, 0x0, 0x80) [ 682.771216][T19518] xt_TPROXY: Can be used only with -p tcp or -p udp [ 682.819769][T19520] xt_TPROXY: Can be used only with -p tcp or -p udp [ 682.849214][ T26] audit: type=1804 audit(1589879664.813:38): pid=19523 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/newroot/566/file0/bus" dev="sda1" ino=15778 res=1 [ 683.042273][ T26] audit: type=1804 audit(1589879665.013:39): pid=19527 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/newroot/566/file0/file0/bus" dev="sda1" ino=15780 res=1 09:14:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x100000000000000, 0x0) 09:14:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0xffffffff00000000}, 0x0) 09:14:27 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x6}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:27 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xd3c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x3}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESOCT, @ANYRES32], 0x1a0) write$FUSE_OPEN(r2, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xb}}, 0x20) fallocate(r0, 0x100000003, 0x0, 0x80019c) lsetxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)=@known='com.apple.FinderInfo\x00', 0x0, 0x0, 0xd6f4ca7f12032f72) socket$inet_dccp(0x2, 0x6, 0x0) open(&(0x7f0000000180)='./bus\x00', 0xe8403, 0x1ee) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="ebfce6991412307850b5e25177068455b010e00dd04a77a893128e34ac8c360172b22baeb36a0511f5887dc6e1161f0560866918c3956476e602d90a7d7e50d8c1830dc86f3553d3b89f93eddc84475fdcb92306f91fc4e3efea2c138cf5dd7adde16d211de84a32e1f82b104862fb478a790d511f2376940f570df9d1906c7557e9bbbf6c74c2f2e2f699e30d074efe7ae096cf3316666896cc3c28653a57eb956384cb872cd6662c9919a9534cc494d6afc3570dc6c9dcb620cd9169d3294052d48c67d5c16621b3b1275a37cb0907cb4b9bfbe569a98987724b8f8e45ccb77c9477c10f7977000f0835da782605ced0358686406ba1092ab4da800101000000000000b08782a5e909718a2bce2721f4b395516c761cb0265ae7537e447843454a2876ef332ff69f99f831ecba9c16840c6588827e313b039b0e002e57c0014d000000000000000000000000000000007be976ec2410165c46b49978ba14ef655cf3d0f82ef52d997874e198ef320a89f6d29dbba4d8eac8b711401d14cc69270e3df5dca7b857bb9245e2a0ac4fbbdd43247cb88082163728109a6fa9ae5298a47db7b2734b2496a27581d3da980225f83f3cc8fcf1f9701b9e254705660cfe8676a42b2515bd66fd"], 0x815, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000500)={0x0, {}, 0x0, {}, 0x0, 0x3, 0x18, 0x8, "800f9ab6fb4c32a26face484bbbecb0a3d3f07f85d335003dc0469ff4d96b987fb8022387c1e5a48ba9b34c8725a16a123ef2628c0cef91d6c13fa8ab2e0c9dd", "cf2c62c3de4a2869cd65b1348ddfbc676348997d632029d1670bdbbd66bcb1e0", [0x10000, 0x6a7]}) sendmsg$NFT_MSG_GETCHAIN(r2, 0x0, 0x80) 09:14:27 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, 0x0, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:14:27 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x25}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 685.462037][T19541] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0xfffffffffffff000}, 0x0) [ 685.566259][T19557] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:27 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x49}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 685.600234][ T26] audit: type=1804 audit(1589879667.563:40): pid=19559 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/newroot/567/file0/bus" dev="sda1" ino=15778 res=1 [ 685.615441][T19562] xt_TPROXY: Can be used only with -p tcp or -p udp [ 685.632950][T19544] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:14:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) 09:14:27 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 685.723941][T19568] xt_TPROXY: Can be used only with -p tcp or -p udp [ 685.821253][T19578] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xe00000000000000, 0x0) 09:14:30 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0xfa04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xd3c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x3}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x9, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000080), 0xc) r0 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r1 = creat(&(0x7f0000000240)='./bus\x00', 0x0) r2 = openat$dlm_plock(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0x0) lseek(r1, 0x7ffffc, 0x0) write$binfmt_elf64(r1, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESOCT, @ANYRES32], 0x1a0) write$FUSE_OPEN(r2, &(0x7f0000000040)={0x20, 0x0, 0x3, {0x0, 0xb}}, 0x20) fallocate(r0, 0x100000003, 0x0, 0x80019c) lsetxattr(&(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)=@known='com.apple.FinderInfo\x00', 0x0, 0x0, 0xd6f4ca7f12032f72) socket$inet_dccp(0x2, 0x6, 0x0) open(&(0x7f0000000180)='./bus\x00', 0xe8403, 0x1ee) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x815, 0x0) ioctl$LOOP_SET_STATUS(0xffffffffffffffff, 0x4c02, &(0x7f0000000500)={0x0, {}, 0x0, {}, 0x0, 0x3, 0x18, 0x8, "800f9ab6fb4c32a26face484bbbecb0a3d3f07f85d335003dc0469ff4d96b987fb8022387c1e5a48ba9b34c8725a16a123ef2628c0cef91d6c13fa8ab2e0c9dd", "cf2c62c3de4a2869cd65b1348ddfbc676348997d632029d1670bdbbd66bcb1e0", [0x10000, 0x6a7]}) sendmsg$NFT_MSG_GETCHAIN(r2, 0x0, 0x80) 09:14:30 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x2]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x2}, 0x0) 09:14:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:30 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, 0x0, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) [ 688.561423][T19601] tproxy_tg6_check: 1 callbacks suppressed [ 688.561429][T19601] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:30 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x3]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x3}, 0x0) [ 688.610485][ T26] audit: type=1804 audit(1589879670.574:41): pid=19598 uid=0 auid=0 ses=4 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/newroot/568/file0/bus" dev="sda1" ino=15778 res=1 [ 688.692111][T19617] xt_TPROXY: Can be used only with -p tcp or -p udp [ 688.724492][T19620] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x4}, 0x0) 09:14:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(0xffffffffffffffff, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:30 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 688.768548][T19599] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:14:30 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x5]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 688.897914][T19631] xt_TPROXY: Can be used only with -p tcp or -p udp [ 689.013306][T19638] xt_TPROXY: Can be used only with -p tcp or -p udp [ 689.060354][T19640] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x7e00000000000000, 0x0) 09:14:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xa}, 0x0) 09:14:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r1, 0xc0a85320, &(0x7f0000000080)={{0x80}, 'port0\x00', 0x23, 0x11c07}) openat$sequencer(0xffffffffffffff9c, &(0x7f0000001340)='/dev/sequencer\x00', 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) dup2(r0, r2) 09:14:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:33 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x6]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:33 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:14:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xe}, 0x0) 09:14:33 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x7]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 691.626274][T19659] xt_TPROXY: Can be used only with -p tcp or -p udp [ 691.647121][T19668] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:33 executing program 3: socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x2, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x2, 0xffffffffffffffff, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) listen(r0, 0x6b7b) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0xd6000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000040)={'vcan0\x00'}) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) fcntl$setstatus(r5, 0x4, 0x2000) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r5, r6, 0x0, 0x10000000000443) sendmsg$xdp(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000ff0700000000000000fddbdf2002000001"], 0x14}}, 0x0) 09:14:33 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0xa]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 691.751172][T19676] xt_TPROXY: Can be used only with -p tcp or -p udp [ 691.774152][T19679] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xf}, 0x0) [ 691.863920][T19658] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:14:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x8000000000000000, 0x0) 09:14:36 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) socket$inet(0x2, 0x0, 0x1000) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000002c0)={r2}, 0x8) write$sndseq(0xffffffffffffffff, &(0x7f0000000200), 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 09:14:36 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x11]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x60}, 0x0) 09:14:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:36 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:14:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xf0}, 0x0) 09:14:36 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x48]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 694.676523][T19710] tproxy_tg6_check: 2 callbacks suppressed [ 694.676529][T19710] xt_TPROXY: Can be used only with -p tcp or -p udp [ 694.699962][ T26] audit: type=1800 audit(1589879676.664:42): pid=19714 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15778 res=0 [ 694.798147][T19726] xt_TPROXY: Can be used only with -p tcp or -p udp [ 694.808818][T19728] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:36 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x4c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 694.911632][T19704] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:14:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x1b2}, 0x0) 09:14:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x0, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:37 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x300}, 0x0) [ 695.042264][T19737] xt_TPROXY: Can be used only with -p tcp or -p udp [ 695.504470][ T26] audit: type=1800 audit(1589879677.474:43): pid=19750 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15780 res=0 09:14:39 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0xffffffff00000000, 0x0) 09:14:39 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x56]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xa00}, 0x0) 09:14:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x0, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:39 executing program 3: mkdirat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000240)='./file0\x00') r0 = socket$inet6(0xa, 0x2, 0x0) close(r0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x164142, 0x0) socket$inet(0x2, 0x0, 0x1000) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, 0x0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000002c0)={r2}, 0x8) write$sndseq(0xffffffffffffffff, &(0x7f0000000200), 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41be, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r1, 0x0, 0x80001d00c0d0) 09:14:39 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) [ 697.738975][ T26] audit: type=1800 audit(1589879679.704:44): pid=19761 uid=0 auid=0 ses=4 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.3" name="bus" dev="sda1" ino=15778 res=0 [ 697.791476][T19767] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xe00}, 0x0) [ 697.833394][T19775] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xec0}, 0x0) [ 697.969851][T19765] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:14:40 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x60]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x0, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xf00}, 0x0) 09:14:40 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x68]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 698.093213][T19786] xt_TPROXY: Can be used only with -p tcp or -p udp [ 698.121217][T19786] xt_TPROXY: Can be used only with -p tcp or -p udp [ 698.270009][T19799] xt_TPROXY: Can be used only with -p tcp or -p udp [ 698.321216][T19799] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:42 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xe) 09:14:42 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x0, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:42 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x6c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x3f00}, 0x0) 09:14:42 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) r2 = dup2(r1, r0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$VIDIOC_QBUF(0xffffffffffffffff, 0xc058560f, &(0x7f0000000080)={0x2, 0xce4e9bfb9ff70cfb, 0x4, 0x2000, 0x3, {}, {0x3, 0x0, 0x40, 0x3, 0x0, 0xa0, "5ca0bf47"}, 0x1ff, 0x1, @offset=0x2, 0x7, 0x0, 0xffffffffffffffff}) ioctl$KVM_GET_XSAVE(r4, 0x9000aea4, &(0x7f0000000580)) r5 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$alg(0x26, 0x5, 0x0) bind$alg(r6, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r7 = accept4(r6, 0x0, 0x0, 0x0) fcntl$setstatus(r7, 0x4, 0x2000) r8 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r7, r8, 0x0, 0x10000000000443) bind$inet6(r8, &(0x7f0000000100)={0xa, 0x4e20, 0x100, @private0, 0x2}, 0x1c) openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20001, 0x0) ioctl$BINDER_WRITE_READ(r2, 0xc0306201, &(0x7f0000000540)={0x4c, 0x0, &(0x7f0000000180)=[@reply_sg={0x40086310, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 09:14:42 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:14:42 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x6000}, 0x0) 09:14:42 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x74]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 700.837376][T19822] xt_TPROXY: Can be used only with -p tcp or -p udp [ 700.920684][T19828] binder: 19815:19828 unknown command 0 [ 700.942217][T19828] binder: 19815:19828 ioctl c0306201 20000540 returned -22 09:14:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x0, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) [ 701.002093][T19821] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 701.020122][T19836] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:43 executing program 3: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x8000, 0x0) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={r3, @in6={{0xa, 0x4e21, 0x5a, @remote, 0x800}}}, 0x9c) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000040)={r3}, 0x8) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x4000000000000, 0x40, &(0x7f0000000500)=@raw={'raw\x00', 0x2, 0x3, 0x338, 0xb8, 0xb8, 0x0, 0x0, 0xb8, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x2a0, 0x3, 0x0, {[{{@uncond=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x96], 0x0, 0x70, 0xb8, 0x0, {0x6020000}}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x2}}}, {{@ip={@local, @multicast1, 0x0, 0x0, '\x00', 'nr0\x00'}, 0x0, 0x1c0, 0x1e8, 0x0, {}, [@common=@inet=@hashlimit2={{0x150, 'hashlimit\x00'}}]}, @common=@unspec=@NFQUEUE3={0x28, 'NFQUEUE\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x398) 09:14:43 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x7a]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xb201}, 0x0) [ 701.067892][T19832] xt_TPROXY: Can be used only with -p tcp or -p udp [ 701.177442][T19849] xt_TPROXY: Can be used only with -p tcp or -p udp [ 701.216397][T19851] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:45 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x7e) 09:14:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/253, 0xfd}, {&(0x7f0000000180)=""/32, 0x20}, {&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f0000000280)=""/7, 0x7}], 0x4) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) 09:14:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xc00e}, 0x0) 09:14:45 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x0, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:45 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0xc4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:45 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:14:45 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xf000}, 0x0) 09:14:45 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 703.867209][T19871] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000a93000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='numa_maps\x00') openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) readv(r0, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/253, 0xfd}, {&(0x7f0000000180)=""/32, 0x20}, {&(0x7f00000001c0)=""/177, 0xb1}, {&(0x7f0000000280)=""/7, 0x7}], 0x4) ioctl$UI_SET_LEDBIT(0xffffffffffffffff, 0x40045569, 0x0) [ 703.999004][T19888] xt_TPROXY: Can be used only with -p tcp or -p udp [ 704.035103][T19892] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:46 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x2]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 704.042959][T19869] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:14:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x34000}, 0x0) 09:14:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x0, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) [ 704.167628][T19898] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:48 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xe00) 09:14:48 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x3]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:48 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000000)) r3 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r3, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) r4 = gettid() tkill(r4, 0x40) 09:14:48 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x400300}, 0x0) 09:14:48 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x0, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:48 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) [ 706.935379][T19920] usb usb6: usbfs: process 19920 (syz-executor.3) did not claim interface 0 before use [ 706.940763][T19923] xt_TPROXY: Can be used only with -p tcp or -p udp [ 706.966478][T19928] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:48 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:49 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000000)) r3 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r3, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) r4 = gettid() tkill(r4, 0x40) 09:14:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) [ 707.072889][T19935] usb usb6: usbfs: process 19935 (syz-executor.3) did not claim interface 0 before use [ 707.097063][T19939] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:49 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x5]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x0, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:49 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000000)) r3 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r3, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) r4 = gettid() tkill(r4, 0x40) [ 707.122362][T19938] xt_TPROXY: Can be used only with -p tcp or -p udp [ 707.175221][T19921] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 707.231337][T19948] xt_TPROXY: Can be used only with -p tcp or -p udp [ 707.264448][T19949] usb usb6: usbfs: process 19949 (syz-executor.3) did not claim interface 0 before use 09:14:51 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x7e00) 09:14:51 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x1000000}, 0x0) 09:14:51 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x6]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:51 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000000)) r3 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r3, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) r4 = gettid() tkill(r4, 0x40) 09:14:51 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x0, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:51 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:14:52 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x7]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 709.996845][T19969] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) [ 710.046922][T19974] usb usb6: usbfs: process 19974 (syz-executor.3) did not claim interface 0 before use 09:14:52 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000000)) r3 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r3, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) gettid() [ 710.134194][T19986] xt_TPROXY: Can be used only with -p tcp or -p udp [ 710.167022][T19990] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:52 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0xa]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 710.189175][T19973] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:14:52 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x0, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:52 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x3000000}, 0x0) [ 710.263529][T19997] xt_TPROXY: Can be used only with -p tcp or -p udp [ 710.315796][T19996] usb usb6: usbfs: process 19996 (syz-executor.3) did not claim interface 0 before use 09:14:55 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x1000000) 09:14:55 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x11]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:55 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000000)) r3 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r3, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:14:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x4000000}, 0x0) 09:14:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x0, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:55 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:14:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xa000000}, 0x0) [ 713.110372][T20020] usb usb6: usbfs: process 20020 (syz-executor.3) did not claim interface 0 before use [ 713.131017][T20027] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:55 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000000)) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 713.175266][T20032] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:55 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x48]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:55 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000000)) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:14:55 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x0, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:55 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xe000000}, 0x0) [ 713.329803][T20023] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 713.378107][T20044] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:58 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xe000000) 09:14:58 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x4c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:14:58 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xf000000}, 0x0) 09:14:58 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$BLKGETSIZE(r2, 0x1260, &(0x7f0000000000)) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:14:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x0, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:58 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:14:58 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) r3 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r3, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 716.206497][T20073] xt_TPROXY: Can be used only with -p tcp or -p udp [ 716.232080][T20078] xt_TPROXY: Can be used only with -p tcp or -p udp 09:14:58 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x56]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 716.265491][T20081] usb usb6: usbfs: process 20081 (syz-executor.3) did not claim interface 0 before use 09:14:58 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x0, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:14:58 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x3f000000}, 0x0) 09:14:58 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r2 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r2, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:14:58 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x60]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 716.366146][T20070] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 716.401110][T20087] xt_TPROXY: Can be used only with -p tcp or -p udp [ 716.498815][T20097] usb usb6: usbfs: process 20097 (syz-executor.3) did not claim interface 0 before use [ 716.541890][T20100] xt_TPROXY: Can be used only with -p tcp or -p udp [ 716.577980][T20102] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x7e000000) 09:15:01 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x60000000}, 0x0) 09:15:01 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r2, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:01 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x68]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:01 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:01 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0x9effffff}, 0x0) 09:15:01 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x6c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 719.274064][T20122] xt_TPROXY: Can be used only with -p tcp or -p udp [ 719.280352][T20123] usb usb6: usbfs: process 20123 (syz-executor.3) did not claim interface 0 before use 09:15:01 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r0, 0x0, 0x0, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:01 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x100000000000000) [ 719.402077][T20135] xt_TPROXY: Can be used only with -p tcp or -p udp [ 719.429781][T20125] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 719.431706][T20138] usb usb6: usbfs: process 20138 (syz-executor.3) did not claim interface 0 before use 09:15:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:01 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xb2010000}, 0x0) [ 719.453891][T20141] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:01 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x74]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:01 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r1, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 719.620847][T20155] xt_TPROXY: Can be used only with -p tcp or -p udp [ 719.648566][T20157] usb usb6: usbfs: process 20157 (syz-executor.3) did not claim interface 0 before use 09:15:01 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x7a]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 719.668592][T20159] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:01 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xc00e0000}, 0x0) 09:15:01 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socket$alg(0x26, 0x5, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 719.813205][T20165] xt_TPROXY: Can be used only with -p tcp or -p udp [ 719.840789][T20168] usb usb6: usbfs: process 20168 (syz-executor.3) did not claim interface 0 before use 09:15:01 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:01 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0xc4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:01 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) [ 720.054560][T20179] xt_TPROXY: Can be used only with -p tcp or -p udp [ 720.072779][T20183] xt_TPROXY: Can be used only with -p tcp or -p udp [ 720.200613][T20184] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:04 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xe00000000000000) 09:15:04 executing program 3: clone(0x20a11a00, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:04 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xfffff000}, 0x0) 09:15:04 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:04 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={0x0}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:04 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x2]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xffffff7f}, 0x0) [ 722.498715][T20202] usb usb6: usbfs: process 20202 (syz-executor.3) did not claim interface 0 before use [ 722.509194][T20203] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:04 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:04 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 722.621980][T20216] usb usb6: usbfs: process 20216 (syz-executor.3) did not claim interface 0 before use [ 722.653708][T20220] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:04 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x3]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 722.688546][T20201] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:04 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xffffff9e}, 0x0) 09:15:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x7e00000000000000) 09:15:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:07 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:07 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xfffffff0}, 0x0) 09:15:07 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x0, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:07 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x5]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 725.544887][T20249] tproxy_tg6_check: 3 callbacks suppressed [ 725.544894][T20249] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:07 executing program 3: r0 = syz_open_dev$usbfs(0x0, 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) 09:15:07 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x8000000000000000) 09:15:07 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 725.671382][T20264] xt_TPROXY: Can be used only with -p tcp or -p udp [ 725.705956][T20269] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:07 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x6]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x2) 09:15:07 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:07 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:07 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x7]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 725.784072][T20257] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 725.818308][T20282] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x3) [ 725.943098][T20294] xt_TPROXY: Can be used only with -p tcp or -p udp [ 725.981858][T20297] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:08 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x0, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:08 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x0, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:08 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0xa]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:08 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x4) [ 726.582181][T20316] xt_TPROXY: Can be used only with -p tcp or -p udp [ 726.729275][T20318] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0xffffffff00000000) 09:15:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:10 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0x0) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:10 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x11]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xa) 09:15:10 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x0, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:10 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x48]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 728.772448][T20340] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:10 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0x0) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xe) [ 728.878260][T20353] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) [ 728.922431][T20351] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:10 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x4c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:10 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0x0) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 729.026538][T20339] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:13 executing program 3: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xf) 09:15:13 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x56]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:13 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x0, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:13 executing program 1: lseek(0xffffffffffffffff, 0x9, 0x0) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00') sendmsg$NL80211_CMD_SET_MPATH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000019480)=ANY=[@ANYBLOB="00001000", @ANYRES16=r0, @ANYBLOB="000329bd7000fbdbdf25160000000c00990001000100040000000c009900010000000100000008000100020000000a000600bbbbbbbbbbbb000008000300", @ANYRES32=0x0, @ANYBLOB="0a000600162d2185860600000a001a00aaaaaaaaaabb0000"], 0x60}, 0x1, 0x0, 0x0, 0x20004000}, 0x50) r1 = socket$inet6(0xa, 0x3, 0x5) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000000)={@mcast2, r3}, 0x14) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f00000193c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000200)={&(0x7f0000019500)=ANY=[@ANYBLOB="58806907000000000000002c9c7e9aa9d542733a57a4e5595e0eed03", @ANYRES16=r0, @ANYBLOB="08002cbd7000fcdbdf25120000000800a400010000000600ed00ad020000050029000c000000060010007c04000006001a010400000006001201070000000c004300080000000800000006001000bd020000"], 0x58}, 0x1, 0x0, 0x0, 0x8810}, 0x24000040) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f00000195c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x8002060}, 0xc, &(0x7f0000019580)={&(0x7f0000019440)={0x34, 0x0, 0x8, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x7fe0}, @BATADV_ATTR_HARD_IFINDEX={0x8}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x804}, 0x20048000) tkill(r4, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) 09:15:13 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x60]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 731.835141][T20388] tproxy_tg6_check: 2 callbacks suppressed [ 731.835147][T20388] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:13 executing program 3: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x60) 09:15:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = getpid() wait4(r1, 0x0, 0x80000000, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 731.939373][T20399] ptrace attach of "/root/syz-executor.1"[20397] was attempted by "/root/syz-executor.1"[20399] [ 731.956198][T20400] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80008500, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 732.006068][T20404] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xf0) 09:15:14 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x68]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x0, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200), 0xc) sendfile(r2, r3, 0x0, 0x10000000000443) r4 = dup2(0xffffffffffffffff, r3) ioctl$KVM_GET_IRQCHIP(r4, 0xc208ae62, &(0x7f00000193c0)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:14 executing program 3: syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(0xffffffffffffffff, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 732.163557][T20419] xt_TPROXY: Can be used only with -p tcp or -p udp [ 732.178371][T20392] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:14 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x0, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:14 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x6c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x1b2) 09:15:14 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, 0x0) 09:15:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x0, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x300) 09:15:14 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x74]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 732.695510][T20447] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:14 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, 0x0) [ 732.793054][T20458] xt_TPROXY: Can be used only with -p tcp or -p udp [ 732.831813][T20463] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:14 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x7a]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:14 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, 0x0) [ 732.963175][T20467] xt_TPROXY: Can be used only with -p tcp or -p udp [ 733.102666][T20455] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:17 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) ioctl$KVM_SET_NESTED_STATE(r3, 0x4080aebf, &(0x7f00000193c0)={{0x2, 0x0, 0x80, {0x4, 0x3000, 0x1}}, "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", "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"}) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x0, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xa00) 09:15:17 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0xc4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:17 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x0, 0x1}}, 0x0, 0x0, 0x0}) 09:15:17 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x0, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xe00) 09:15:17 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 735.223299][T20488] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:17 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x0, 0x1}}, 0x0, 0x0, 0x0}) [ 735.319755][T20503] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:17 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x0, 0x1}}, 0x0, 0x0, 0x0}) 09:15:17 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x2]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:17 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0x0, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) [ 735.378244][T20487] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:20 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) sendmsg$xdp(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'geneve1\x00', 0x0}) sendmsg$can_raw(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x1d, r4}, 0x10, &(0x7f00000001c0)={&(0x7f0000000180)=@can={{0x4, 0x0, 0x1, 0x1}, 0x8, 0x2, 0x0, 0x0, "0971ff98a8952b40"}, 0x10}, 0x1, 0x0, 0x0, 0x20000410}, 0x20000080) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xec0) 09:15:20 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x3]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:20 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1}}, 0x0, 0x0, 0x0}) 09:15:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0x0, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:20 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x0, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xf00) 09:15:20 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1}}, 0x0, 0x0, 0x0}) [ 738.304711][T20541] tproxy_tg6_check: 3 callbacks suppressed [ 738.304717][T20541] xt_TPROXY: Can be used only with -p tcp or -p udp [ 738.324930][T20546] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:20 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:20 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1}}, 0x0, 0x0, 0x0}) 09:15:20 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x5]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 738.448423][T20556] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:20 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0x0, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) [ 738.573254][T20566] xt_TPROXY: Can be used only with -p tcp or -p udp [ 738.727640][T20540] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:23 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x88104100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x0, 0x40}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) sendmsg$xdp(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000000)={'team0\x00'}) ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:23 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x0, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x3f00) 09:15:23 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x6]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x0, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:23 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x0, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x6000) 09:15:23 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x7]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 741.364727][T20590] xt_TPROXY: Can be used only with -p tcp or -p udp [ 741.433621][T20602] xt_TPROXY: Can be used only with -p tcp or -p udp [ 741.452771][T20605] xt_TPROXY: Can be used only with -p tcp or -p udp [ 741.537281][T20586] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:23 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x0, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) [ 741.628924][T20588] team0: Device ipvlan1 failed to register rx_handler 09:15:25 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xa]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xb201) 09:15:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xc00e) [ 743.098458][T20625] xt_TPROXY: Can be used only with -p tcp or -p udp [ 743.155230][T20629] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x7) mq_getsetattr(r3, &(0x7f0000000000)={0x2, 0xe802, 0x5, 0x3}, &(0x7f0000000140)) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x1, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000180)="553d9171397de6364422253e5055f02645795e2506fe903ce79aaa18665ae7734cfe34e8ca96a4eebf80638bc084dfd1af4798b79746cde380f05a80283f402e6e13aaea8090f077ad10a20b47864037662bbb098eb92672a7863a656c1171faec725e6fca966c6d3a6ebd3052335a391684595b04ac3361655eabd38d77d4") ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x0, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:26 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x11]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xf000) 09:15:26 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x0, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:26 executing program 3: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x34000) 09:15:26 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x0, &(0x7f0000000040)=0x7f) ptrace$setregs(0xf, r1, 0x7f, &(0x7f0000000000)="642f4cbb45fc7e9f6f644b65c797b18d4e4f864f68013b7bbe933241da47a46f8db0b180118e") ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 744.500774][T20653] xt_TPROXY: Can be used only with -p tcp or -p udp [ 744.540650][T20659] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:26 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x48]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x400300) [ 744.668069][T20651] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:26 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:26 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x4c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 744.726052][T20650] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 744.753771][T20670] xt_TPROXY: Can be used only with -p tcp or -p udp [ 744.840889][T20680] xt_TPROXY: Can be used only with -p tcp or -p udp [ 744.876136][T20687] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:26 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x56]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xf0ffff) 09:15:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x1000000) [ 745.066722][T20695] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:27 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:27 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x60]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) [ 745.843502][T20714] xt_TPROXY: Can be used only with -p tcp or -p udp [ 746.017041][T20718] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:29 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) sendmsg$xdp(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280), 0x0, 0x0, 0x0, 0x8c0c6}, 0x0) vmsplice(r1, &(0x7f0000000100)=[{&(0x7f0000000000)="8e8e9cd2b42389aca1d1be2ad1e27839d4cb355c9093f00870297bb3a4491e3a4fad68c7a14e82e1e8d9b9f6149b25a62f29168aa1133d8769eda3203a5b7b4e3f62f1151129f9caf8eb78488d760adda6451b14b483f2", 0x57}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:29 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x2000000) 09:15:29 executing program 3 (fault-call:1 fault-nth:0): r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:29 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x68]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:29 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) [ 747.643334][T20734] FAULT_INJECTION: forcing a failure. [ 747.643334][T20734] name failslab, interval 1, probability 0, space 0, times 0 09:15:29 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x6c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 747.687158][T20734] CPU: 1 PID: 20734 Comm: syz-executor.3 Not tainted 5.7.0-rc6-syzkaller #0 [ 747.695864][T20734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 747.705919][T20734] Call Trace: [ 747.709234][T20734] dump_stack+0x188/0x20d [ 747.713587][T20734] should_fail.cold+0x5/0xa [ 747.718108][T20734] ? fault_create_debugfs_attr+0x140/0x140 [ 747.723933][T20734] should_failslab+0x5/0xf [ 747.728353][T20734] __kmalloc+0x2d9/0x7a0 [ 747.732607][T20734] ? rcu_read_lock_any_held.part.0+0x50/0x50 [ 747.738664][T20734] ? tomoyo_realpath_from_path+0xc2/0x620 [ 747.744404][T20734] ? lock_release+0x800/0x800 [ 747.749083][T20734] ? __lock_acquire+0xcbb/0x4c50 [ 747.754031][T20734] tomoyo_realpath_from_path+0xc2/0x620 [ 747.759578][T20734] ? tomoyo_profile+0x42/0x50 [ 747.764268][T20734] tomoyo_path_number_perm+0x1c2/0x4d0 [ 747.769725][T20734] ? tomoyo_path_number_perm+0x17a/0x4d0 [ 747.775360][T20734] ? tomoyo_execute_permission+0x470/0x470 [ 747.779677][T20746] xt_TPROXY: Can be used only with -p tcp or -p udp [ 747.781201][T20734] ? __fget_files+0x30d/0x500 [ 747.781249][T20734] ? __fget_files+0x32f/0x500 [ 747.797143][T20734] ? ksys_dup3+0x3c0/0x3c0 [ 747.801560][T20734] ? __sb_end_write+0x101/0x1d0 [ 747.806418][T20734] ? vfs_write+0x161/0x5d0 [ 747.810935][T20734] security_file_ioctl+0x6c/0xb0 [ 747.815879][T20734] ksys_ioctl+0x50/0x180 [ 747.820132][T20734] __x64_sys_ioctl+0x6f/0xb0 [ 747.824722][T20734] ? lockdep_hardirqs_on+0x463/0x620 [ 747.828956][T20749] xt_TPROXY: Can be used only with -p tcp or -p udp [ 747.830038][T20734] do_syscall_64+0xf6/0x7d0 [ 747.830080][T20734] entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 747.830092][T20734] RIP: 0033:0x45ca29 [ 747.830111][T20734] Code: 0d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 db b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 747.870501][T20734] RSP: 002b:00007f890e945c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 747.878914][T20734] RAX: ffffffffffffffda RBX: 00000000004f0380 RCX: 000000000045ca29 09:15:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x3000000) [ 747.886890][T20734] RDX: 0000000020000180 RSI: 00000000c0185502 RDI: 0000000000000003 [ 747.894862][T20734] RBP: 000000000078bf00 R08: 0000000000000000 R09: 0000000000000000 [ 747.902835][T20734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 747.910808][T20734] R13: 00000000000005d5 R14: 00000000004c89ac R15: 00007f890e9466d4 09:15:30 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x74]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x4000000) 09:15:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) [ 748.083414][T20733] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:30 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x7a]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 748.181743][T20761] xt_TPROXY: Can be used only with -p tcp or -p udp [ 748.590787][T20734] ERROR: Out of memory at tomoyo_realpath_from_path. [ 748.604663][T20734] usb usb6: usbfs: process 20734 (syz-executor.3) did not claim interface 0 before use 09:15:32 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0xc4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xa000000) 09:15:32 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x0, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:32 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:32 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:32 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) r1 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0x0, 0x420000) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0}, &(0x7f0000000200)=0x30) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0x9, &(0x7f00000000c0)={r3, @in={{0x2, 0x0, @empty}}}, 0x9c) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000140)=@assoc_value={r3, 0x7}, 0x8) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x2, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 750.693019][T20787] tproxy_tg6_check: 2 callbacks suppressed [ 750.693026][T20787] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:32 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xe000000) [ 750.743947][T20796] xt_TPROXY: Can be used only with -p tcp or -p udp [ 750.761958][T20794] usb usb6: usbfs: process 20794 (syz-executor.3) did not claim interface 0 before use 09:15:32 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x2, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 750.860525][T20810] xt_TPROXY: Can be used only with -p tcp or -p udp [ 750.913387][T20814] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:32 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x10, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:32 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x2]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 750.966888][T20798] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xf000000) 09:15:33 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x3]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 751.089602][T20824] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x3f000000) 09:15:33 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x4c01, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 751.220981][T20838] xt_TPROXY: Can be used only with -p tcp or -p udp [ 751.280948][T20841] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:33 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) [ 751.900392][T20852] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:35 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x0, &(0x7f0000000040)=0x7f) setpriority(0x1, r1, 0x7fffffff) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) fanotify_init(0x1, 0x2) ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x541b, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:35 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x60000000) 09:15:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:35 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x5421, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 753.813408][T20869] xt_TPROXY: Can be used only with -p tcp or -p udp [ 753.866221][T20873] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:35 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x5]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:35 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x5435, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 753.947554][T20863] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:35 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x9effffff) [ 754.044740][T20885] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:36 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x5450, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:38 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x6]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xb2010000) 09:15:38 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:38 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x5451, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:38 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:38 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x0, &(0x7f0000000040)=0x8) wait4(r1, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) getpgrp(0x0) accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f00000193c0)=ANY=[@ANYBLOB="140007123200000425bd7000ffdbdf0e17000000"], 0x14}, 0x1, 0x0, 0x0, 0x4048811}, 0x14) 09:15:38 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xc00e0000) 09:15:38 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x7]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:38 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x5452, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 756.915527][T20916] tproxy_tg6_check: 1 callbacks suppressed [ 756.915535][T20916] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xf0ffffff) [ 757.033370][T20929] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:39 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x5460, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:39 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xa]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 757.078147][T20933] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:39 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:39 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xfffff000) 09:15:39 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x11]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 757.175703][T20915] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 757.194113][T20939] xt_TPROXY: Can be used only with -p tcp or -p udp [ 757.214427][T20945] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:39 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x54e3, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 757.317881][T20952] xt_TPROXY: Can be used only with -p tcp or -p udp [ 757.344231][T20957] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:40 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xffffff7f) 09:15:40 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x550b, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:40 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x48]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:40 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:40 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x4c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:40 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0x1, 0x0, 0x0, @time={0x20, 0x8}, {}, {}, @connect={{0x40, 0x5}, {0x7, 0x3}}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) geteuid() sendmsg$xdp(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r2, 0x29, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="6e617400000000000000000000000000180035ce8a1e002300000000010000006c9900009a2d7d79c9"], &(0x7f0000000140)=0x29) ptrace$cont(0x7, r0, 0x0, 0x0) [ 758.071174][T20973] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xffffff9e) 09:15:40 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x5514, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:40 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xfffffff0) 09:15:40 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x551f, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 758.264032][T20999] xt_TPROXY: Can be used only with -p tcp or -p udp [ 758.333658][T20994] xt_TPROXY: Can be used only with -p tcp or -p udp [ 758.356987][T20985] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:41 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:41 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x40030000000000) 09:15:41 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x56]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:41 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x5521, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:41 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xf0ffffffffffff) 09:15:41 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x5522, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 759.391744][T21033] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:43 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000000000443) perf_event_open(&(0x7f0000000180)={0x4, 0x70, 0x80, 0x4, 0xa4, 0xfa, 0x0, 0x9, 0x200, 0x6, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2c39c08c, 0x1, @perf_bp={&(0x7f0000000140), 0xa}, 0x42400, 0x6, 0x1, 0x7, 0x80, 0x7}, r0, 0x3, 0xffffffffffffffff, 0x8) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) ioctl$SG_NEXT_CMD_LEN(r3, 0x2283, &(0x7f0000000000)=0xde) 09:15:43 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x60]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:43 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x5523, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x100000000000000) 09:15:43 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:43 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x6364, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:43 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x200000000000000) 09:15:43 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x68]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:43 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x6c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:43 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x8912, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:43 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) [ 761.726074][T21058] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace$setopts(0x4200, r1, 0x0, 0x100012) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000140)) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) sched_setscheduler(r2, 0x0, &(0x7f0000000040)=0x7f) r3 = getpid() sched_setscheduler(r3, 0x5, &(0x7f0000000380)) remap_file_pages(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x9, 0x1, 0x8000) sched_setscheduler(r3, 0x0, &(0x7f0000000040)=0x7f) process_vm_writev(r3, &(0x7f0000000080)=[{0x0, 0x22}, {0x0}, {&(0x7f00000003c0)=""/102398, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x4, 0x3) 09:15:46 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x8933, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x300000000000000) 09:15:46 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x74]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:46 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x400000000000000) [ 764.292611][T21105] tproxy_tg6_check: 8 callbacks suppressed [ 764.292618][T21105] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:46 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xae01, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:46 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x7a]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:46 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xae41, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 764.444861][T21124] xt_TPROXY: Can be used only with -p tcp or -p udp [ 764.477194][T21127] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:46 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0xc4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:46 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0xda19c4cd9235f81}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_GET_LINKS(r3, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r4, 0x300, 0x70bd2c, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x9}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x88}, 0xc000) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xa00000000000000) 09:15:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) [ 764.570491][T21108] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:46 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xae80, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xe00000000000000) 09:15:46 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x400448c9, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 764.659139][T21138] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:46 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:46 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:46 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x400454ca, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:46 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xf00000000000000) 09:15:46 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:47 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x4004550c, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 764.980384][T21167] xt_TPROXY: Can be used only with -p tcp or -p udp [ 765.014464][T21170] xt_TPROXY: Can be used only with -p tcp or -p udp [ 765.174369][T21168] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x3f00000000000000) 09:15:49 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:49 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:49 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x4004550d, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) tkill(r0, 0x6) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) sendmsg$xdp(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140)='nl80211\x00') r2 = socket$inet6(0xa, 0x3, 0x5) r3 = socket(0x11, 0x800000003, 0x0) bind(r3, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r3, &(0x7f00000003c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000000)=0x14) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x32, &(0x7f0000000000)={@mcast2, r4}, 0x14) sendmsg$NL80211_CMD_DEL_INTERFACE(0xffffffffffffffff, &(0x7f00000193c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000200)={&(0x7f0000019400)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000326bd7000ffdbdf25080000000c0099000600000003000000140004006272696467655f736c6176655f3100000800050009000000080005000400000008000300", @ANYRES32=r4, @ANYBLOB="b4058224f239ff4ce6"], 0x4c}, 0x1, 0x0, 0x0, 0x20048812}, 0x8000) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xf, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:49 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x0, &(0x7f0000000040)=0x7f) ptrace$setregs(0xd, r1, 0x3ff, &(0x7f0000000000)="45ce87e3434372f450f5512e5b63bd7c1d") vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {0x0, 0x40}, @ext={0x1ce, &(0x7f00000193c0)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000140)="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") ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x6000000000000000) [ 767.677115][T21195] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:49 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x4004551e, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:49 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 767.764917][T21195] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:49 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:49 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x40049409, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:49 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x9effffff00000000) 09:15:49 executing program 1: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r4, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_HMAC_IDENT(0xffffffffffffffff, 0x84, 0x16, &(0x7f0000000000)=ANY=[], &(0x7f0000000140)=0xa) ptrace$setregs(0xffffffffffffffff, r0, 0x0, &(0x7f0000000000)="7e3aca115fb1861bbd05a0b5bc05c3cd6e56d6eaf031ad") ptrace$cont(0x7, r0, 0x0, 0x0) [ 767.942011][T21215] xt_TPROXY: Can be used only with -p tcp or -p udp [ 767.980987][T21215] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:50 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 768.153293][T21194] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:50 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:50 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_genetlink_get_family_id$batadv(&(0x7f000001ac40)='batadv\x00') sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f000001ad40)={&(0x7f000001ac00)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f000001ad00)={&(0x7f00000000c0)=ANY=[@ANYRESDEC=r1, @ANYRES16], 0xff2b}, 0x1, 0x0, 0x0, 0x20000004}, 0x4040040) wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f000001abc0)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}, {&(0x7f000001aac0)=""/206, 0xce}], 0x4, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f0000000080)=[{0x5, 0x56, 0x7, 0x0, @tick=0x3b36, {0xfd, 0x40}, {0x0, 0x1}, @time=@tick=0x80000000}], 0x1c) r2 = add_key(&(0x7f0000000280)='ceph\x00', 0x0, 0x0, 0x0, 0x0) keyctl$invalidate(0x15, r2) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000140)={'syz', 0x3}, 0x0, 0x0, r2) r4 = add_key(&(0x7f0000000280)='ceph\x00', 0x0, 0x0, 0x0, 0x0) keyctl$invalidate(0x15, r4) r5 = request_key(&(0x7f000001aa00)='rxrpc\x00', &(0x7f000001aa40)={'syz', 0x0}, &(0x7f000001aa80)='md5sumppp0\x00', r4) keyctl$instantiate_iov(0x14, r3, &(0x7f000001a940)=[{&(0x7f0000000180)="911517f7a51ea821f75e78a378ab913ab8de2308113bef7c13b63ee90e296d4256ede0b4e856a64a2bda639a35bc2a34e28894a313de29da1988875c4533eed067ad4963bbde49082a17c99dba9d537b3bb955f2826c5be3c425f29af86c836faad188c4206f99ccb4b86d40bae43ec4c5ef8d7097c9441f3b0cd1702b3c8ffb47d499c2c61923c665077dc8a6628148951e966aea3da1214c", 0x99}, {&(0x7f00000193c0)="ea1f6b97d778bc6ec062f9a9f296dbdca7baa3b2367d17b33b023efd9b5b5af8e255c125a5204f57e1425735de585db74c1f658b069a105de1cb2b07c0a7008e83e7a7e0c790594c845d4802c31b024d6352ac8dbae78656c222a8d12e3b58a869ae74c25b5a7151db7c967c3a2ec9cfd24ba532415f1248d780e44e42a6106e156ef177392fd0eec90c83dd1f43f4d985c8776e617879bf89c397543eea9bccc14c5d0a5e9584f0861d8cccbf81706449b6cf2f1ffd15c1f5ac04cf9cf1f2ae4b00a46b80cef34dcaee75ba3e4afcd7ca78a4846b5522d47125d79665f6a113fadb57", 0xe3}, {&(0x7f00000194c0)="d57249b71676927a79e8ba2c6f8afdc7b1b978301374370da5252089c2242f0a5f1a93c8984935af85375505020101a94802ac8ad31fda10177e669a87c45d0e893f1bcccc13d6ba71f05e964a312a15115b4e2dff8b6556ba46a0c0c2d9836e33cb4edca3b0607baf219fa2a4c6872237db965968db8b975e63e09683ff157dae2d0e5a4b54f9401285b98bdade56eac4f0eea5501ab863ece20db8da288434a07ac1018c3058a30d82a4ef25faaf7ca99d89219a1cfc5351348ef21012fd33319619eda84320d42aa8", 0xca}, {&(0x7f00000195c0)="f58de6fd9a7442a5871fc7deb614d84f604536f5bae09dcefc2d15956a59dd3b5c49a4d60588ba6a88707c340a0138bbfa724b090a2b17700370c991d6cf240f3944ea6de950729230ff1ad7bf1ba9fdd737462b6c97c1393e8b01ab5fc37404fedd84fde286eeab5c6e284a7da4d975add3896e6972465687d74750d162a45f4cb4ea7f21095fec0720a72b9d2dee919205c3d8d77571", 0x97}, {&(0x7f0000019680)="e21f61a9220958f819d91d09effdef20875e99400a397c3f4390f83e8f025a726774051e8449b97c2c30ea2f4c58e6b05339f5db7ab080ffa542a63345da2f72161a38017343e1c395928145ec094cd8583290694bcfec8b09c82efad2235d37fea0b5863b7fcbf9838af3b8c2bed67e797d94568d5af24ffe38d8170abee0b6e897b102b90a91bf577ecd3ac5ec10a23e84", 0x92}, {&(0x7f0000019740)="55758b1a929f120c9889cc6556bad278a61c73ec0b93cec36caeed0c9552222c2f6ecfc9dbf407dd3f51b2707e2075ead91cd44c0820199c90d6307eaff76067df85ccd0d2c7d0fba9ea", 0x4a}, {&(0x7f00000197c0)="14f6485de002f55edf8e49dcbc7d795a4bacb960b5178a5dc8d920d67f829a90e6ca9c788f5ab67c500888e52c71370840eb6c46386357346de6a239339ea6beb49e430c3b2587463d8311afdd6a89e5db9fa548a6c8066c4bb6fc602ea12244978b26abdb95100090d432d040852d5dbbf9c44cc750f660e05ee99d6ac7877ad2320e12570fc3e45f8863adaff59662814c0a3a9548a8b0994e0416b81791fe3620316cb0dc14ef267e67247743a2cba569dde28fc65fd240cec7f544b3b0c0289afd4504f135b71cc1ac2894dc1e99e5ace38aa350a582248077068d8318b4aeeaba22bc54cc634f36ad655e18902692f9c54a1e53ca07e8bde799bdebc6e808d49bc32829a3d55a823a831a67dc75004cb143d02b0cff89f6ff4d4d860f4f296fbbf3a49f8473ae3a6b50d5995959ab8fc774b0d68523141141c7712d1d97cbb4ef6a24bd603aba5b91ffa85be823638d14f1dfc494f0b884d9998724bb5b487ffef2fd91472775aaa30380d6cdbf71851cb8b19e6ee87501c8976222a48f06dd021c45e029146ad05bd8bdf12521badc6c8a519aa0bc23ee8bbd20166a9b800595c4b7c17892e0e6a6eac70c5086dab1d1b16c551eba236c5997978d5ddbcc18adbea52458e1182cd813ce9de640297469ead10dba64b2eee40a60937dd320202caf8427db993be63f4d840600ac0b3c44ac71bb8da57a5af48d1b47b041284c04560a75d19742ada9f73cfb7070c15329104f42bc43e7661ac4507fbd974878f2ceb6bc369fcd4c63ad3a591b6172569f2ac26e7a787a8c7abc0245177acf9668e348fddea53db1a218f7efdc14f732937437f58f280ab5057ca7135afd1aabebf4f4d423737f02609617007f060802e0b40987ee0f00958023861b66b3890dfdac12681bbef0fee7f4099a2ae47a72243b7f9c1596fa0d098f7764b0dac0fee9a7b0d9e0dd3f359e6828aafc453b264e3b8cbd2ec449dd46d58bea50e711005dac477c56ae8f553c991cc5eb19d49165740f9c85394001c942da5517b8733886c1f994f219ed159c9400f6f5fe1f2b5bc1f72cd874e73ffdf865150537cd3da8f48885abb423e27f6cd0be1355ab062e931c6a48116609a3eeabecbc980bbf992d0285fad904948fafa16e18a2432c03961f5c3f5b204452f031530eca4c2c785b7e8fd1caae27f1d9d5926caa7394e187371304c763244b6003bed8e5e993f6bb9edbcbeaaa45391fe483885b49cceebc2000d4ad6a7e4fae1c2650a876c4f585538efa9c4a6ce656bcdf7412435182ae82988c30d032c658222631f69869dd48f8e0d7cff28c0cb1eb60871367d4efc86c44ca996219ce258de40644c53a184bccd4e5a46fece1c7ab59a9c16d2eb80e4bb665ccb057ed9fbcc154f1f6d7adaa5538b0f0099bd987340076d195dfc2d85b9a51150778d3bdaa6a927603b4ef128370beb95a8d29c404b59bdfe99eef144aa740ce207d7917fa2e99df6e58c5d3b7754c603e3e1c718b912ce60d75a96a3bbceaacc7e89eef421e4139c370db87befaf57a415f92d7f732001a0690d8ea170c344c25a3b50d2086d495f677ebecfd09aa46740d1c875c742f993812a446fe5b1eb250c40a899ea11ad0d33c9aa57857a0a2f9ce2c89073888c3ff15eeb8f3ce067528c429e89cd45944a8ac35caab603ec9e1734abe48fe3a28292bde153d8708e185f809b3c4455da2bf53c9e39d8fb84a9bc3afe6260cea0e46a6ee21d2bae4e63af01067e2110c33cf6bdacb76667555cb974cf639e6a5cf641a132d476acfabfd132b50ebe4db37d07e8672b23c78904aa6e1fc67a7b0ce9c52f07ccfb1340796a163b5af559daddf464b3791a155cf245d1696dce5476e70d3ccd46f3cae8c610881f7c7a24aa01e9336a3ff2dd5d7c2647c9fe5381d61641e31d2b3976fdcba3e57f8edfd69cd57af856170c3c0582fa41085cb33db7f9b240b0757451b105018fbc873180c3a58d240a6cbf9342247e073acf8b7445efcd6d2b902b8b2c0e64cbe5ddd1502d4ef78716d47c599b59d1a9dfe7b097fcdd88a336cddb027a1ed2cd34e7c20e424bc1fe77df00872b227bf17ed374da0a76eae0fe9e4713c22c8ea71cb0c76b561d33c2b42afcd572f522047cc475723508551195c640397458891ef6e1d6bdd3e3942630b0d1e39c2380ac416b073f8420bbf46f2b77cd5daa919cb6ee06deb7508b49dbc51b455a4f478680e0f59170bdb985496edf66d052711fcd25731d73d461e7d210d202cb7283b8fb5f83e74df7fe06c913d5042dd509521270978af21165430b4437250c96ae4035cad89dc536c47c4cf08b091e0d5a8bb0ab3641349d760f8c37da3a5594f6d89865aa0fe19af023c7b62b5a6fc0ae6cfb6ca39f008ced85d91b4f733f3207924b68fdd2f0964c86288797b11be585227be85509e7645c377307588f79cae0ab42fc2abb91c376065e6d80fbbc3773149b58f521d74e309538840851336f1f57478039539b476c1f41e11b6427ff47b08e3a1a09bccfcba1cc5bca2cc79b8d34f386d5894066a1858a0931500beba41be895c0e15b796d4a3e3826fc6719d59fff17acb7c321bf7d66f77359a8f9404df4a1f1b8de676b564cbfd624c399d740836b9fc003c58594cc48bdccb2aca538b7b9ad375445d06531eceb5e08d83319289ceb9464b7306d00066777ae76bcd9ab2b24b36bc99b77e56705e80b53deb3e97f0fad3841da33468ff2b300662d1645028a4401cade5a53ba9388c68608785b5efe89b552600aa112823d4ed32787112b3f9aa87b9ea2ad24b3ad3406268d8f3f261cf3a9b50cbce75909947b4a9d22747cfe512ee770631df0c3103a3ebdd416cd3b01a4ab6c25540f246fa83af53518e0669292de72f3ce3ab6be09a927a84ec216e74572f26fa75e443baa58c21cb58517c5026519548a905c8277ed22ef5d6fdb58365a5bd8754bf928f5b0e250c682f2c4f6f473a863ccf65edafdbd126a2426b12389011c8cf94a8d5ca8ce225a1963a397ebb6459e2c59f04348f6a3cee92168004a4f90a9aa4908aa74fa072f6ba2f4f0011c321b5bc1c6e5fd3dca90bc9561155ee4d6c4dde64a8c73abe95c9c73819a39ac541892ce35841f1865d8f9d83c0fd1977e38ceb15ddfe82af8e2d9e0ab1aa57b5ed8479ed3fd136d51f9b904c16ce7eb93383dd1aa8e91e738b5806aaa79a931348711beae8b43d302cc745e994142bf369e685083ce972a1a87b5ddc7ff2a847774d73e66673a866e22ebe0fcef29070a8b7f569c432c150ffd48b97b338ce609b826c80f2c45abbe477126eb3b08c376e5865c83f59c787bd47f471988cb92dfe0d68f68384cf8729a2a1e4a31063654c3d7f4f5968b8bf73c73d0f68cc5455ce6a9b0d61a81ac44f7d369da452d65cf86fe3845a45f219c64b044aac54a7877c7a61152de4a7411b3e72ed4b46d7813b57504cb0733f1efbc498afcdc7b9ba4bce9a17011cd0707892c9039172ef5f501e5557adaccd6d213004e1e1c6503746996d79990f900b7d4874ea7eb87a581b65fe60580d6be8876bd24ce6ce4cd52a910493589427b663862b8bc84bcffc1374a2214cb9198e59d00862977aba679da173ee69c36e28919116b302809dba6f9a226018dfe5ba19dcd945c9b81d63bce28b35cc2d0ab44360a3c53204039cd52b1bb3359b978103b35d245d2bb7bd177a89686b2a3708f491f80fbc4e4f0f6df153627933d721152f0ccb128b40a049f7a85fe9ebe33cac9435b26697f24fcab3ae55b3edc9e61da1fa86c3f6e71f05fe380a022c73e8efc30088b051122fdc3b0cf0713c09b3a94b6ac25c92815dbd0abc3dfc8c4465c03e30abe85ed98289df776fe28efef5120ecd03824dd7494215be598c3d160a5cb44684e685c05bd2ea2af820e8af03013878c3ea8f7c9c0dd8816dc02ce914f450c2e4a2d41bb82209f5ac5b9252bd7f2bbf442e631011854057fa633d40761df654c85fb0f19ef389b650edeb73fd56309bc85d5a358b3fe88861324eb40556aa29ef13477250e69afd331eeaa0960c4a0b4b60c6174c0ef015046873ccc449489cf238881f20a49d83c551decce083526d78016596c75de1d7b9d62299ba4fd33fdabda2fbe8573e616d92ab3ce210372ce9ea34f78dd13733a01a0da9ad5d2f0fad364f2e55776bc67764c9b43130e43599156a7e113c4431907541c332554a300ed3c0f8cd9b3d5915a6b44cb82dfe4d98773db3a7ec24edd918fd524e7348ac725658a9cfb92599199e7f56dd5560fef3d98e0c3cd6340057dcc729cb427425c409c210b8f45e2432e0ff4ae5d98d008fab5b8f6787bd21f7c92b03ca50492f51b61ec26130db9704a631ab62a721d8358fb0e8373760024f5f7ef6f146ca1b1980d8b351f03d49e06e9d373c7028f610bd601c9ce1eb2d56c846a1041d38d5d39630c22bc0b01261be8101259452aa336cf2efbcc1178bec89c0075e72990570f89e2005627f42f099bbdcb39728190893da05b8cbe2742d9a9d5f8043b4fd5fedeed1cdb9edea693cb28fac61bb536cd9ed0c46d001d332a19bd1a9c229f3f1e76579ec028fa7abc34c62d86161164299136041c4449d430189f1f84d62b1b330698c7e5a9b7aa1c7e1e470ef6dcf6f693d78afcdf1309b46126746a055e9af44ecbde977e3247294e57bd216ac3682568a1fcec2b09b20bf25650b230a38e9ed84dd1846ff2c0385c82116d91d4db19e8d670577ef342442bd3b0716eea6beba4f0bbb22615823370f81f829bf8d06a9fd75c02972ab0a0c58b22c8d320c99e4d9193fa5d79889e81b042030dd7c0336a742486c17ab769ffef81f1be91a0ae45e90e245776878d8fcbe5d8e0d6263cb2e295feeeae0743f4ec1325dc1182d50062bec53c91693183b346cca4e005d25053bdfbecff253dc0876d8f5fead8cf4f80eb0e354c625116e7c54fb30a2f5577d2cd6ceda497dcd5d07b2aca13cd3e495fcb87f25b12fee3d6c0230794c9be728f75eb58e3c95ae708f429ffe1b06bf9793f01a94689465fb43982ad6eefe19c3fefa2ea9739ab35717d11d47bb09424f57bb0b1cc642d50bde920a70a2af26a12cca3d34d84401d816945f8590a30a485d212b1008d3a3999a906815e1804cc78ce1ef23b934eb61dbc36d4f8397c8b9b5691f4ea58c0a573d8bba8ec1b8f47440a1fcc6ce61b4ece654695f2e3221f9097223041c52a74a609f41f31faabacd96c84348c7c8f6cfed0527a927e33b7e7f1a9d38cb4f12778a315b54d1d68d6da30cd7811fdfd9b94051a59f22978de830fc90d131b0d4de2d0b2aa032197ee4b5cfc86f4050e518cceeee01a09b9377838e5510cbe339aa119edbc5aad0aee94ec89bf4534ccc4ebdafb72dd8398ab8f6b14ca0f778473d1df1fdf36bf4f4cbdd64f1eec70a3036a406c11ec8d66392b0008ad55437e7163079333389541ca3901cffa85fc7cbc7042bf5bb24d319b2208666b8d59f26e54806022ef5f9e182f72a125bac4fe50bdf3be651c4256d0ab104c414964d1a6633f270a3d1da21e887781abb6e64b26f636095f277af3cd28c87a029ca5429d503c072b710ccc089ff806258285f0fe252778de8b1dafac589b92a9b6bffd878c717c4b5afd0e0b03fa98d4842d7a7c4a3186367edb6afa7ad49e4700a08fadeda702f21a3593ecf319c133b47d1aecdfd49f445aa17770fc6fa4631e7184da4765bfc51656bc9bdd6727836850b31fadc6e5ff3f3fad7d9d6a191b1876c8800bb87fdb78bfe3e", 0x1000}, {&(0x7f000001a7c0)="803ef3d481bd1612efaa7f5fec027cc1b8b713d879ad8ba03663131f548f697edbd4522295eec8dd1b70076de9195b1041b0d84e0537c934a541570cfb1111d515a24d840fb627e7051d35b491747212bf7bf0114a29a30a11d54fdee96b05dfad38ae4aa5323851392cad142979a39394e1fd447090016dd138a29d51699dc9bc786ecc2c406a6346035a1a141dab2a916b2bcbf8aa73ba8c6f69fea186a778dce4d05660b33c3567484c788a961a5ef733d44c", 0xb4}, {&(0x7f000001a880)="5da62520e22af048aa10b3d1bef5e03344cf5d54c452484255a0308def1c0f6d3e3c13f064e40ed80a420ef9dee83baa9e052334a1ea49d874aa43859782bc2b37c331ca81687ae6ae22b1916126c852", 0x50}, {&(0x7f000001a900)="4e19e66fc12886b2eec8b2afc841b221c3fe43a2d14530f908f8f1459b7aa2d7", 0x20}], 0xa, r5) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) 09:15:50 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x4008550c, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:50 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xb201000000000000) 09:15:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x0) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xc00e000000000000) 09:15:50 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:50 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 768.515658][T21258] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:50 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:50 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xf0ffffff00000000) 09:15:50 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:51 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) [ 769.253887][T21293] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) tkill(r1, 0x28) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) fsync(r3) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000000)=r1) sendmsg$NLBL_MGMT_C_ADDDEF(r3, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="000296576f22fddbdf250400000008000200070000001400e9aeff010000000000000000000058000001"], 0x30}, 0x1, 0x0, 0x0, 0x80000}, 0x8044) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:53 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xffffff7f00000000) 09:15:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:15:53 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:53 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x4008550d, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:53 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) [ 771.417997][T21308] tproxy_tg6_check: 10 callbacks suppressed [ 771.418004][T21308] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:53 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x40085511, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:53 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xffffffff00000000) 09:15:53 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:53 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendmsg$L2TP_CMD_TUNNEL_MODIFY(0xffffffffffffffff, &(0x7f00000193c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x2c, 0x0, 0x100, 0x70bd26, 0x25dfdbfc, {}, [@L2TP_ATTR_UDP_CSUM={0x5, 0xd, 0x1}, @L2TP_ATTR_PROTO_VERSION={0x5, 0x7, 0x2}, @L2TP_ATTR_RECV_SEQ={0x5, 0x12, 0x1f}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8080}, 0x0) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) r1 = openat$binder_debug(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/debug/binder/transaction_log\x00', 0x0, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:53 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 771.573516][T21325] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:53 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x40186366, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 771.616973][T21304] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 771.699766][T21339] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:54 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, 0x0, 0x0) 09:15:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0xfffffffffffff000) 09:15:54 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x56]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:54 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000193c0)={0x0}, &(0x7f0000019400)=0xc) clone3(&(0x7f0000019480)={0x90206c9dbf6e6c86, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0x2a}, &(0x7f00000001c0)=""/48, 0x30, &(0x7f0000000200)=""/33, &(0x7f0000019440)=[r3], 0x1}, 0x50) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:54 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x4020940d, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:54 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 772.144288][T21360] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, 0x0, 0x0) 09:15:54 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x4020ae46, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:54 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 772.265759][T21375] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, 0x0, 0x0) 09:15:54 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 772.366474][T21382] xt_TPROXY: Can be used only with -p tcp or -p udp [ 772.449554][T21367] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 772.502884][T21391] xt_TPROXY: Can be used only with -p tcp or -p udp [ 772.542468][T21394] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:54 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:54 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) r1 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000002680)='/dev/nvme-fabrics\x00', 0x60000, 0x0) socket(0x10, 0x803, 0x0) r2 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000240)='NLBL_UNLBL\x00') sendmsg$NLBL_UNLABEL_C_LIST(r1, &(0x7f0000002800)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000002840)={&(0x7f0000002880)={0x44, r2, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'syz_tun\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @loopback}, @NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0}]}, 0x44}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r1, &(0x7f00000027c0)={&(0x7f00000026c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000002780)={&(0x7f0000002700)={0x5c, r2, 0x400, 0x70bd2d, 0x25dfdbfd, {}, [@NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'bond0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x1f, 0x7, 'system_u:object_r:usr_t:s0\x00'}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @empty}]}, 0x5c}, 0x1, 0x0, 0x0, 0xc000}, 0x400c008) r3 = socket$alg(0x26, 0x5, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000003b40)={&(0x7f0000002900)="224a6b8836f310bb083162099a6cb5626c559dc9d40945eed4cc28102434ffca30b1a759a5774f242c17489ce7da06925333a6ab689548efff0f6f825a044514f903f200c112fa0efa0479d0118fe002046b4d653b0e79bc56baa7843eae5712f5248a1b6c6fc42fe0165d2b75d7be2c6bd804420b5cc2196b76b5fe7d558f59cffb93cb6be2814a4581b87fa3f900371c6b7c2dbe346c4a993303ce64f57bcc64a49ca948e054482540a5bf3515f8977c0af008560117090c832726eeb6b2692857f70a57a93a033c1be8d704b0b06d260600", &(0x7f0000002a00)=""/177, &(0x7f0000002ac0)="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", &(0x7f0000003ac0)="22a0387c369c171f0cabbdf232f2b36a47e930951b4153939aa6048e91d94cb20c602532f6cc82339e6bdb5c2971e65a168f99887820f9c56281d229a66114b38b6301ef25a554c5f5817562f5d08e353c222c4a128716c800b53d4161cd210d97ea72cfec1669d28f5801f430e3d2f329e0d3bdb1c48616", 0x9, r1, 0x4}, 0x38) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x10000000000443) write$P9_RLERRORu(r4, &(0x7f0000003b80)=ANY=[@ANYBLOB="190000000702009fb12f6465762fff6164696f230040000000"], 0x19) r5 = accept4(r3, 0x0, 0x0, 0x0) fcntl$setstatus(r5, 0x4, 0x2000) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r5, r6, 0x0, 0x10000000000443) recvmsg$kcm(r6, &(0x7f00000003c0)={&(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000002540)=[{&(0x7f0000000440)=""/4096, 0x1000}, {&(0x7f0000000180)=""/22, 0x16}, {&(0x7f00000001c0)=""/213, 0xd5}, {&(0x7f00000002c0)=""/71, 0x47}, {&(0x7f0000000340)=""/68, 0x44}, {&(0x7f0000001440)=""/88, 0x58}, {&(0x7f00000014c0)=""/4096, 0x1000}, {&(0x7f00000024c0)=""/84, 0x54}], 0x8, &(0x7f00000025c0)=""/133, 0x85}, 0x40000042) r7 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) ioctl$VIDIOC_G_SELECTION(r7, 0xc040565e, &(0x7f00000000c0)={0xb, 0x1, 0x2, {0x4, 0x400, 0x7, 0x20}}) 09:15:54 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x4090ae82, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:54 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 772.763822][T21405] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4200, r0, 0xffff, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:15:57 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:57 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x41045508, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 09:15:57 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={0x0}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) fcntl$setstatus(r5, 0x4, 0x2000) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r5, r6, 0x0, 0x10000000000443) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000140)={0x0, 0xffff7fff}, &(0x7f0000000180)=0x6c) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r6, 0x84, 0x10, &(0x7f00000001c0)=@assoc_value={r7, 0x9}, &(0x7f0000000200)=0x8) sendmsg$xdp(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r8 = accept4$phonet_pipe(r2, 0x0, &(0x7f0000000240), 0x5fe9643288cff7b4) sendmsg$BATADV_CMD_GET_GATEWAYS(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYRES64=r8, @ANYRESDEC, @ANYBLOB="000127bd7000fbdbdf250a00000008003900ff0f000008002c0003000000050035000500000008000300", @ANYRESDEC, @ANYBLOB="08000b0004000000080032008ae00000"], 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x4000000) accept4$phonet_pipe(r8, &(0x7f00000000c0), &(0x7f0000000100)=0x10, 0x80000) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) 09:15:57 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000000)=@usbdevfs_disconnect={0x8}) tkill(r0, 0x21) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 775.197432][T21420] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:57 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x80045503, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000700)={0x60, 0x21, 0x6, 0x9, 0x19, "7fc60f683291b350"}) recvmsg$kcm(r0, &(0x7f00000006c0)={&(0x7f00000000c0)=@nl, 0x80, &(0x7f0000000580)=[{&(0x7f0000000140)=""/190, 0xbe}, {&(0x7f0000000200)=""/151, 0x97}, {&(0x7f00000002c0)=""/145, 0x91}, {&(0x7f0000000380)=""/214, 0xd6}, {&(0x7f0000000480)=""/196, 0xc4}], 0x5, &(0x7f0000000600)=""/134, 0x86}, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) 09:15:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) [ 775.253325][T21430] xt_TPROXY: Can be used only with -p tcp or -p udp 09:15:57 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 775.365235][T21443] usb usb6: usbfs: process 21443 (syz-executor.3) did not claim interface 0 before use 09:15:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 09:15:57 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x80045505, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:15:57 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000080), 0x23}, 0x20008080) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000040)='veth1_macvtap\x00') 09:15:57 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0xc4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:15:57 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 775.584094][T21424] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:15:58 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x0, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:15:58 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x8004550f, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 776.262435][T21478] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:00 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:00 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) 09:16:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) 09:16:00 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x80045510, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(0xffffffffffffffff, r0, 0x0, 0x10000000000443) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000000)=[@text64={0x40, &(0x7f0000000140)="26460f01580366b84d008ec03e0f72f4fd66470f1ac8440f232f44dcfb0f20c035010000000f22c0c7442400f6000000c7442402a3000000ff2c24f20f5ac666baf80cb8106b5687ef66bafc0cb86b000000ef", 0x53}], 0x1, 0x49, &(0x7f00000001c0)=[@cr4={0x1, 0x82}], 0x1) r4 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r4, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102390, 0x18ff6}], 0x3, 0x0, 0x0, 0x0) tkill(r4, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r4, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r4, 0x0, 0x0) 09:16:00 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x0, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:00 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x80045515, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 778.364381][T21491] tproxy_tg6_check: 4 callbacks suppressed [ 778.364386][T21491] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:16:00 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:00 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(0xffffffffffffffff, r4, 0x0, 0x10000000000443) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) fcntl$setstatus(r6, 0x4, 0x2000) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r6, r7, 0x0, 0x10000000000443) sendmsg$xdp(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r4, 0xc0205648, &(0x7f00000003c0)={0x990000, 0x69, 0x3, r6, 0x0, &(0x7f0000000380)={0xa30901, 0xbae, [], @value64=0x7}}) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r8, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)={0x2c, 0x0, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [@L2TP_ATTR_DEBUG={0x8, 0x11, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_TX={0x5, 0x21, 0x1}, @L2TP_ATTR_UDP_ZERO_CSUM6_RX={0x5, 0x22, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0xc0}, 0x40000) sendfile(r2, r3, 0x0, 0x10000000000443) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000040)=0xffffffff) 09:16:00 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000000000443) ioctl$DRM_IOCTL_MODE_RMFB(0xffffffffffffffff, 0xc00464af, &(0x7f0000000000)=0x8) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) ioctl$SNDRV_PCM_IOCTL_START(r3, 0x4142, 0x0) ptrace$cont(0x7, r0, 0x0, 0x0) [ 778.433621][T21499] xt_TPROXY: Can be used only with -p tcp or -p udp [ 778.468385][T21503] usb usb6: usbfs: process 21503 (syz-executor.3) did not claim interface 0 before use 09:16:00 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x80045518, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:00 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) [ 778.556511][T21508] xt_TPROXY: Can be used only with -p tcp or -p udp [ 778.595823][T21514] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:00 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ubi_ctrl\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x800, 0x0) getsockopt$EBT_SO_GET_INIT_INFO(r5, 0x0, 0x82, &(0x7f00000001c0)={'broute\x00'}, &(0x7f0000000240)=0x78) accept4(r4, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r4, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) ioctl$sock_inet_SIOCSIFNETMASK(r4, 0x891c, &(0x7f0000000140)={'veth1_virt_wifi\x00', {0x2, 0x4e22, @remote}}) sendfile(r2, r3, 0x0, 0x10000000000443) r6 = openat$cgroup_ro(r3, &(0x7f0000000040)='cpuacct.usage_sys\x00', 0x0, 0x0) write$UHID_DESTROY(r6, &(0x7f00000000c0), 0x4) 09:16:00 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x80045519, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 778.707846][T21528] xt_TPROXY: Can be used only with -p tcp or -p udp [ 778.737707][T21497] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 778.738679][T21531] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:00 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:16:01 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x0, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:01 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:01 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x8004551a, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:01 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:16:01 executing program 2: socket$kcm(0x10, 0x2, 0x10) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1, 0x0, 0xe}, 0x0) [ 779.463923][T21558] xt_TPROXY: Can be used only with -p tcp or -p udp [ 779.500789][T21562] xt_TPROXY: Can be used only with -p tcp or -p udp [ 779.622778][T21560] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:03 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @time={0xfffffffd, 0x9}, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:16:03 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x80085504, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:03 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)}, 0x4004000) 09:16:03 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:16:03 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:03 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x0, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:03 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:03 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="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", 0x24f}], 0x1}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) setsockopt$inet6_tcp_TLS_TX(r3, 0x6, 0x1, &(0x7f0000000040)=@gcm_128={{0x303}, "5e02056f8ffa071c", "3ba33f780a4b48d0701f7132fb3124ac", "ec792c41", "d750a8402bf0e53b"}, 0x28) [ 781.618384][T21582] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:03 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x8008550e, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:03 executing program 2: socket$kcm(0x10, 0x5, 0x10) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x1c5003, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000080)}, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000000c0)=""/34) ptrace$getenv(0x4201, r1, 0x5, &(0x7f0000000000)) 09:16:03 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x8008551c, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 781.777440][T21605] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:03 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 781.949146][T21583] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:06 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) sendmsg$xdp(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r2, 0x29, 0x1, &(0x7f0000000300), 0x4) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) rt_sigaction(0x25, &(0x7f00000001c0)={&(0x7f0000000140)="c4e1bd71e301f33645238c8a213cddbfc4e2f9179c7300800000c483ed7d980e0000000d6441d80d00000000f2420f58290a1e8fa9609924772647f7570d2ef30fa6c0", 0x4, &(0x7f0000000000)="f33ef0450fbaad345800000e423c00c4e1c9127200f26e8f694097970008000040efda3236dbea8fa978e1d5c46262f789c1a6fc0c", {[0xfff]}}, &(0x7f0000000280)={&(0x7f0000000200)="c4229d8c7f82c4225900234c0f7e2ac4434d6c2e00400fdac50f8a0f800000c4427d2318400f69eac421a054146666450f619b00000020", 0x0, &(0x7f0000000240)="440f0fcb1c40d3bf000000000f9a36c4017d280fc44101d2e3c461a45838458352085f2e660ffb030fd9ed9c"}, 0x8, &(0x7f00000002c0)) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x40, 0x0, @tick, {}, {}, @time=@tick=0xfffffe01}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) 09:16:06 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:16:06 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x8008551d, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:06 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) ioctl$TIOCL_GETSHIFTSTATE(r4, 0x541c, &(0x7f0000000040)={0x6, 0x40}) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r5 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r5, 0x4, 0x2000) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r5, r6, 0x0, 0x10000000000443) ioctl$VFIO_SET_IOMMU(r6, 0x3b66, 0x2) 09:16:06 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x0, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) [ 784.702468][T21634] tproxy_tg6_check: 1 callbacks suppressed [ 784.702475][T21634] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:06 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x80086301, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:06 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:06 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) ioctl$sock_inet_SIOCDELRT(r3, 0x890c, &(0x7f0000000100)={0x0, {0x2, 0x4e20, @loopback}, {0x2, 0x2, @dev={0xac, 0x14, 0x14, 0x41}}, {0x2, 0x4e20, @multicast1}, 0x188, 0x0, 0x0, 0x0, 0x625, &(0x7f00000000c0)='wg2\x00', 0x5, 0x2, 0x4}) 09:16:06 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x8010550e, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:06 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:06 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}]}, 0xd0}}, 0x0) [ 784.849386][T21648] xt_TPROXY: Can be used only with -p tcp or -p udp [ 784.876381][T21647] xt_TPROXY: Can be used only with -p tcp or -p udp [ 785.000290][T21663] xt_TPROXY: Can be used only with -p tcp or -p udp [ 785.023310][T21665] xt_TPROXY: Can be used only with -p tcp or -p udp [ 785.195256][T21632] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:09 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x802c550a, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) sendmsg$xdp(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = socket$inet6_sctp(0xa, 0x1, 0x84) r5 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={r6, @in6={{0xa, 0x4e21, 0x5a, @remote, 0x800}}}, 0x9c) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f00000000c0)={r6, @in6={{0xa, 0x4e24, 0x7fffffff, @private2={0xfc, 0x2, [], 0x1}, 0x7}}, [0x5, 0x1, 0x7, 0xffffffff, 0xf8, 0x4, 0x3ff, 0x80, 0x0, 0x200, 0x100000001, 0x5, 0x7e6, 0x8000, 0x101]}, &(0x7f0000000040)=0x100) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000001c0)={r7, @in={{0x2, 0x4e23, @remote}}, [0x5, 0x6, 0x7d, 0xfffffffffffffffc, 0x8, 0x7, 0x9, 0xffffffffffffffc1, 0x8, 0x8a2b, 0x0, 0x2, 0x5, 0x100, 0x39]}, &(0x7f0000000340)=0x100) 09:16:09 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:09 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}]}, 0xd0}}, 0x0) 09:16:09 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000000)={0x7fff, 0x0, 0x6, 0x200, 0x9, "fa5e1bafdb1b91d7"}) r3 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) 09:16:09 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x0, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:09 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x8038550a, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 787.788794][T21687] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 787.790242][T21686] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:09 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = syz_open_dev$vcsu(&(0x7f00000000c0)='/dev/vcsu#\x00', 0x8, 0xa01) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000280)='/dev/full\x00', 0x240000, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$NBD_SET_BLKSIZE(r2, 0xab01, 0xfffffffffffff9fd) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0}, &(0x7f0000000200)=0x30) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0x9, &(0x7f00000000c0)={r4, @in={{0x2, 0x0, @empty}}}, 0x9c) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000002c0)={r4, 0x9}, &(0x7f0000000300)=0x8) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ocfs2_control\x00', 0x430046, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r1, 0x8108551b, &(0x7f0000000100)={0x7fff, 0x2, "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"}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) 09:16:09 executing program 1: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sched_setscheduler(r0, 0x0, &(0x7f0000000040)=0x7f) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000380)) sched_setscheduler(r1, 0x0, &(0x7f0000000040)=0x7f) prctl$PR_SET_PTRACER(0x59616d61, r1) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10000000000443) ioctl$VIDIOC_G_EXT_CTRLS(0xffffffffffffffff, 0xc0205647, &(0x7f0000000180)={0xf9e0000, 0x4, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000140)={0xa20001, 0x9, [], @p_u32=&(0x7f0000000000)=0x1}}) ioctl$SG_GET_TIMEOUT(r2, 0x2202, 0x0) r3 = gettid() wait4(0x0, 0x0, 0x1, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r3, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r3, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) 09:16:09 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:09 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0x8108551b, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 787.945060][T21700] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}]}, 0xd0}}, 0x0) 09:16:10 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0045878, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:10 executing program 2: socket$kcm(0x10, 0x2, 0x10) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) fcntl$setstatus(r5, 0x4, 0x2000) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r5, r6, 0x0, 0x10000000000443) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r6) fcntl$setstatus(r1, 0x4, 0x2000) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r7, 0x0, 0x10000000000443) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)}, 0x20000801) 09:16:10 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 788.073398][T21710] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:10 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0045878, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 788.158981][T21721] xt_TPROXY: Can be used only with -p tcp or -p udp [ 788.191153][T21724] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:10 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x20, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}}, 0x20}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:10 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:10 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) 09:16:10 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc00c5512, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:10 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="14000000000000", 0x14}], 0x1, 0x0, 0xff8f}, 0x44800) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'hash\x00', 0x0, 0x0, 'cbcmac-aes-neon\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_RTHDR(r4, 0x29, 0x39, &(0x7f00000000c0)=ANY=[@ANYBLOB="2f0600e100000000fc000000000000000000000000000000fe880000d7dd0bcdc89f659727ab2b0001fc0100"/56], 0x38) setsockopt$ALG_SET_KEY(r3, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) fcntl$setstatus(r6, 0x4, 0x2000) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r6, r7, 0x0, 0x10000000000443) ioctl$USBDEVFS_DISCONNECT_CLAIM(r7, 0x8108551b, &(0x7f0000000140)={0x7ff, 0x1, "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"}) fcntl$dupfd(r3, 0x0, r2) 09:16:10 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0), 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:16:10 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:10 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0105500, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:11 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:11 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0105502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 789.034513][T21753] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:11 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) 09:16:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) sendmsg$xdp(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(r5, r4, 0x0, 0x100000001) r6 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_STATUS(r4, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000480)=ANY=[@ANYBLOB="465575ee9554bc8041a49d", @ANYRES16=r6, @ANYBLOB="00012cbd7000fcdbdf250500000008000100000000000c0004000163ffffffffffff"], 0x28}, 0x1, 0x0, 0x0, 0x24000000}, 0x16) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x14}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x34, r6, 0x8, 0x70bd29, 0x25dfdbfe, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x6}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040000}, 0x4008840) 09:16:11 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x20, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}}, 0x20}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:11 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0105512, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:11 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:11 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) 09:16:11 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyS3\x00', 0x100802, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/4096}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) sendmsg$key(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x2, 0x17, 0x3f, 0x5, 0x1e, 0x0, 0x70bd27, 0x25dfdbfb, [@sadb_sa={0x2, 0x1, 0x4d3, 0x0, 0x3, 0xce, 0x1, 0x60000000}, @sadb_x_sec_ctx={0x1a, 0x18, 0x20, 0x3f, 0xc4, "2e847b3d0966185b54e43d2a55e28e2931f907a3c8cdbc569f46ac6df7c224f40e7ca13e9d57664039d4e23e2c91ef1ff675add4ffd472efae80962353ae1635a207ffa825c1a4f7a96dfb6dc98b3ab0220bd807dab12983397a6b8d99247dd8d4f555cd8988382acc39f9c10431b8ee618bbb78f40a40ef707dcaebbb377360da46b2b875373ebe0cedc42fe7a77e4552004cd1d9ede7738c5adc66c3ecc617ceaf943e39dbab0e7521bffaa663ccecbab35d0314437819408b017c712eec5128a7c224"}]}, 0xf0}}, 0x40400d0) set_thread_area(&(0x7f00000000c0)={0x4, 0x20000000, 0x1000, 0x0, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1}) r4 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) [ 789.716127][T21803] tproxy_tg6_check: 6 callbacks suppressed [ 789.716133][T21803] xt_TPROXY: Can be used only with -p tcp or -p udp [ 789.946847][T21808] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x30}}, 0x0) 09:16:13 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185500, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:13 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) sendmsg$xdp(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000040)=0x2, 0x4) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) 09:16:13 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) bind$alg(0xffffffffffffffff, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(0xffffffffffffffff, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000000)) r1 = getpid() sched_setscheduler(r1, 0x5, 0x0) r2 = getpid() sched_setscheduler(r2, 0x5, &(0x7f0000000380)) sched_setscheduler(r2, 0x0, &(0x7f0000000040)=0x7f) tkill(r2, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:16:13 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x20, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}}, 0x20}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) [ 791.902950][T21822] usb usb6: usbfs: process 21822 (syz-executor.3) did not claim interface 0 before use 09:16:13 executing program 2: r0 = socket$kcm(0x10, 0x3, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) ioctl$BLKALIGNOFF(r5, 0x127a, &(0x7f0000000040)) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) bind$alg(r2, &(0x7f00000004c0)={0x26, 'aead\x00', 0x0, 0x0, 'authenc(md5-generic,ecb-aes-ce)\x00'}, 0x58) r6 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r6, 0x4, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r6, r7, 0x0, 0x10000000000443) setsockopt$TIPC_MCAST_BROADCAST(r7, 0x10f, 0x85) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) 09:16:13 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x30}}, 0x0) 09:16:14 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185503, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:14 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 792.085066][T21823] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up [ 792.110366][T21825] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:14 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185504, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0x30, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0x30}}, 0x0) 09:16:14 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 792.229171][T21845] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:14 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) sendmsg$xdp(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) ioctl$sock_inet_SIOCSARP(r2, 0x8955, &(0x7f0000000140)={{0x2, 0x4e22, @rand_addr=0x64010102}, {0x306, @dev={[], 0x21}}, 0x0, {0x2, 0x4e24, @broadcast}, 'virt_wifi0\x00'}) ptrace$setopts(0x2103, r0, 0x8, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:16:14 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:14 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185505, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 792.344203][T21858] xt_TPROXY: Can be used only with -p tcp or -p udp [ 792.368619][T21862] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:14 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa0, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x94, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) [ 792.539954][T21883] xt_TPROXY: Can be used only with -p tcp or -p udp [ 792.578601][T21882] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:15 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:15 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000019480)={'filter\x00', 0x0, 0x4, 0x9c, [], 0xa, &(0x7f0000000140)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f00000193c0)=""/156}, &(0x7f0000000200)=0x78) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) ioctl$USBDEVFS_DISCARDURB(r3, 0x550b, &(0x7f0000000000)) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:16:15 executing program 2: sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) 09:16:15 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185506, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:15 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa0, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x94, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) [ 793.159071][T21906] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:15 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185508, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 793.220043][T21913] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:15 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:15 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa0, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x94, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) 09:16:15 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185509, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:15 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 793.387586][T21921] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:15 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185510, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 793.624603][T21911] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:15 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) [ 793.969195][T21945] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:18 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {0x0, 0x10}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) 09:16:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = syz_genetlink_get_family_id$netlbl_calipso(0x0) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r1, 0x1, 0x0, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x40) sendmsg$NLBL_CALIPSO_C_LISTALL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="24f7cb59113372f8ec44c111d7d52aa814bf3400", @ANYRES16=r1, @ANYBLOB="000827bd7000fddbdf250400000008000100020000000800010001000000"], 0x24}, 0x1, 0x0, 0x0, 0x48080}, 0x40040) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) 09:16:18 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:18 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc018551c, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa0, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x94, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) 09:16:18 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, 0x0) ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) [ 796.177972][T21954] tproxy_tg6_check: 2 callbacks suppressed [ 796.177978][T21954] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:18 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:18 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185563, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:18 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa0, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x94, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) 09:16:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="0d0400001f0005b7d25a809856a1357cb7859d00", 0x14}], 0x1}, 0x0) socket$kcm(0x29, 0x0, 0x0) 09:16:18 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 796.322487][T21975] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:18 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc018556c, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) [ 796.449313][T21990] xt_TPROXY: Can be used only with -p tcp or -p udp [ 796.494208][T21994] xt_TPROXY: Can be used only with -p tcp or -p udp [ 796.525661][T21959] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:21 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x11) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:16:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000040)) 09:16:21 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:21 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0189436, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa0, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x94, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) 09:16:21 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:21 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x56]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 799.286552][T22012] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:21 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc020660b, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) sendmsg$xdp(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) r4 = socket$alg(0x26, 0x5, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(0xffffffffffffffff, r5, 0x0, 0x10000000000443) shutdown(r5, 0x1) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r6 = accept4(r4, 0x0, 0x0, 0x0) fcntl$setstatus(r6, 0x4, 0x2000) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r6, r7, 0x0, 0x10000000000443) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r2, 0x84, 0x1c, &(0x7f0000000040), &(0x7f00000000c0)=0x4) [ 799.406045][T22028] xt_TPROXY: Can be used only with -p tcp or -p udp [ 799.444605][T22033] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:21 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x0, 0x1}}, 0x0, 0x0, 0x0}) 09:16:21 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xc0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x90, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x84, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xc0}}, 0x0) [ 799.464290][T22011] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:21 executing program 2: r0 = add_key$user(&(0x7f00000000c0)='user\x00', &(0x7f0000000000)={'syz'}, &(0x7f0000000380)="585ccbe4ed83b836c1a6474914dc55e72206297b6895b66147b3c7218a9169a85ea0bdc9e1587a050000000000000042e33089754c8107c3cd3923dd4a71c2ff06007b6b4816122d2550829eaa9435c99926022b8753a188748c569f435fb3bae96efb74b50ec93c152f5e8e198a29e5c0d0c60000ce0637ce0000b4ec24c53d3d661ff5ff70e48884ca000018cea71fcfacf40d32e4b58a8d2725561f6110fd7b06f90b5274cc5c1e298a16324fe2c5e16d87cebd96a909d308bd73f4772539", 0xc0, 0xfffffffffffffffe) r1 = add_key$user(&(0x7f0000000540)='user\x00', &(0x7f0000000340)={'syz', 0x0}, &(0x7f0000000100), 0x26, 0xfffffffffffffffe) keyctl$dh_compute(0x17, &(0x7f0000000140)={r1, r0, r1}, &(0x7f0000000440)=""/243, 0x3a9, &(0x7f0000000240)={&(0x7f0000000040)={'streebog256\x00\x00\x00\x00\x00\x03\x00'}}) r2 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, 0xffffffffffffffff, 0x0, 0xf2) ioctl$SCSI_IOCTL_SYNC(r3, 0x4) r4 = add_key(&(0x7f0000000100)='blacklist\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180), 0x0, 0xfffffffffffffffd) r5 = socket$alg(0x26, 0x5, 0x0) bind$alg(r5, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r6 = accept4(r5, 0x0, 0x0, 0x0) fcntl$setstatus(r6, 0x4, 0x2000) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r6, r7, 0x0, 0x10000000000443) listen(r7, 0x4) keyctl$search(0xa, r1, &(0x7f0000000040)='syzkaller\x00', &(0x7f00000000c0)={'syz', 0x3}, r4) r8 = socket$kcm(0x10, 0x2, 0x10) lsetxattr$trusted_overlay_origin(&(0x7f0000000180)='.\x00', &(0x7f00000001c0)='trusted.overlay.origin\x00', &(0x7f0000000200)='y\x00', 0x2, 0x3) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) 09:16:24 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f0000000140)={0xfd, ""/253}) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) r4 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ubi_ctrl\x00', 0x2200, 0x0) write$sndseq(r4, &(0x7f00000000c0), 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:16:24 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x2, 0x1}}, 0x0, 0x0, 0x0}) 09:16:24 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xc0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x90, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x84, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xc0}}, 0x0) 09:16:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f00000000c0)=""/181, &(0x7f0000000040)=0xb5) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) sendmsg$xdp(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x14000000) r5 = accept4$inet6(r4, 0x0, &(0x7f00000001c0), 0x0) r6 = accept4(r5, 0x0, 0x0, 0x80000) fcntl$setstatus(r6, 0x4, 0x4400) r7 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r6, r7, 0x0, 0x10000000000443) ioctl$TCSETAF(r7, 0x5408, &(0x7f0000000180)={0x2, 0xc4d, 0x9, 0x73, 0x7, "70059f33b8d289b2"}) 09:16:24 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:24 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x68]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 802.366356][T22063] xt_TPROXY: Can be used only with -p tcp or -p udp [ 802.384308][T22068] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:24 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$VIDIOC_STREAMON(r0, 0x40045612, &(0x7f00000002c0)=0x9) socket$kcm(0x10, 0x2, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r2, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) fchdir(r2) bind$alg(r1, &(0x7f0000000340)={0x26, 'aead\x00', 0x0, 0x0, 'gcm-aes-ce\x00'}, 0x58) r3 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) r4 = getpid() sched_setscheduler(r4, 0x5, &(0x7f0000000380)) sched_setscheduler(r4, 0x0, &(0x7f0000000040)=0x7f) r5 = syz_open_procfs(r4, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r5, 0x0, 0x10000000000443) sendmsg$xdp(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="140000001f0005b7d25a8f02ee683ede4ac2f60285318064626394f404000000", 0x20}, {&(0x7f0000000100)="f695193d1213ce0e4599bcd6f0f68b31f29d79a6787c41be181d7583ac81c48258b815b9a21a72b6ddf5343751088404d293f13409137bd559d4131c0d84d5e1265fa5e6f83f0be6d6274bb83ff47e45d9c67b856b00e41e143d1b3f19fb1a2b52abbfe69c8efa58275e80f14df56dd9d9f40780fa114021e16edf03b77664e8e3e7de1dacb8adff4bd828fb921a51edf89d78d8f533c2475774b063c09f44e69ff4dccef31595bd", 0xa8}, {&(0x7f00000001c0)="824e19c4e480f13e34aca30429d154d5fad0b267949f14e6c82b09a44107cc4d0edf5c750172b8647fd9c13ac150fc03509741cf21ac51eb7f10c72c3700be887be3fdac7d9a4168b94ca12077ed76fe9af7060eac14669e2ff29fbb26f0174f9da53ae5c4a8086bb0a2e10f23ae0d25dab7c2cdb5a56a020032f5e7059a8d29fb67a1a551e66512c63b4e83afacb1744414a92a540aa41d7ad0a4c463ff5dcb74cf2812f88789e8fe01ea7aa454cc8a7d274444391cf6a2690a7e", 0xbb}], 0x3}, 0x4000001) 09:16:24 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x3, 0x1}}, 0x0, 0x0, 0x0}) [ 802.488095][T22079] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:24 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x5, 0x1}}, 0x0, 0x0, 0x0}) [ 802.537143][T22086] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:24 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xc0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0x90, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x84, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xc0}}, 0x0) [ 802.580403][T22060] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:24 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 802.712162][T22097] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:27 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x74]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:27 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f000001a5c0)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0x19000}, {&(0x7f0000000140)=""/197, 0xc5}, {&(0x7f00000193c0)=""/4096, 0x1000}, {&(0x7f000001a640)=""/178, 0xb2}, {&(0x7f000001a480)=""/116, 0x74}, {&(0x7f000001a500)=""/188, 0xbc}], 0x8, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:16:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa0, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x94, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) 09:16:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x6, 0x1}}, 0x0, 0x0, 0x0}) 09:16:27 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x20000, 0x0) write$P9_RRENAME(r0, &(0x7f00000000c0)={0x7, 0x15, 0x1}, 0x7) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) 09:16:27 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(0xffffffffffffffff, 0x8188aea6, &(0x7f00000000c0)={0x6, 0xff, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x8, 0x1}}, 0x0, 0x0, 0x0}) 09:16:27 executing program 2: socket$kcm(0x10, 0x2, 0x10) [ 805.492726][T22126] xt_TPROXY: Can be used only with -p tcp or -p udp [ 805.532365][T22130] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:27 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:27 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa0, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x94, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) 09:16:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) ioctl$sock_inet_sctp_SIOCINQ(r3, 0x541b, &(0x7f0000000040)) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x20000041) 09:16:27 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x9, 0x1}}, 0x0, 0x0, 0x0}) 09:16:27 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 805.713609][T22144] xt_TPROXY: Can be used only with -p tcp or -p udp [ 805.739432][T22144] xt_TPROXY: Can be used only with -p tcp or -p udp [ 805.811913][T22158] xt_TPROXY: Can be used only with -p tcp or -p udp [ 805.913751][T22125] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, 0x0, 0x3, 0x12) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x1000002, 0xffffffffffffffff) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) r4 = getpid() mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000004, 0x10, 0xffffffffffffffff, 0x0) sched_setscheduler(r4, 0x5, 0x0) write$cgroup_pid(r3, &(0x7f0000000000)=r4, 0x12) 09:16:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa0, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x94, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) 09:16:30 executing program 2: r0 = add_key(&(0x7f0000000280)='ceph\x00', 0x0, 0x0, 0x0, 0x0) keyctl$invalidate(0x15, r0) add_key(&(0x7f0000000300)='syzkaller\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000340)="9cb9f6420900000017a875b87b75420b3c9cfc35572086d81e41b1c65f7ecc6979f72a842f62fb7e0a1e7b9794fa37bddf12505cff4f175582da37f983815fe410bd02188d32ff41e0355127782874ef4859847d12a9a5", 0x17, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) accept4(r1, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000100)="c7da5f1a", 0x4) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f00000002c0), 0x10) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f00000000c0)="1400000017008a203a422e8d1e42a3749005b7d25a80648c6394f3c1970d050000004bdd938ee23703aa8da4c36d91d29b1809d496aa4d8a5555073a7f42b77f45af7935c9c3ee43b6b5de06f8ca86b7008f9f27c1c8dc3ee941dbd9a03c7ab35e97b3304db4dc80be9446198a592bbaeef5dcc2a4a269892337fa851210c9ca7874761a5b637bc762d78dc4339c8c4f43b256eec8e81192319d76b0040e633b3c075b7d5410bc5db58861edb3a3e05dd44b8d973b2b0318edee64d7f56354221c6f0a8ab79a38b1365e7900e848cb", 0xcf}], 0x1}, 0x0) r3 = socket$alg(0x26, 0x5, 0x0) bind$alg(r3, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r4 = accept4(r3, 0x0, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) r6 = openat$cgroup_ro(r5, &(0x7f0000000040)='cpu.stat\x00', 0x0, 0x0) ioctl$SG_GET_TIMEOUT(r6, 0x2202, 0x0) r7 = socket$rxrpc(0x21, 0x2, 0xa) ioctl$FIOCLEX(r7, 0x5451) 09:16:30 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x10, 0x1}}, 0x0, 0x0, 0x0}) 09:16:30 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, 0x0) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:30 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:30 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000140)="0f3482f8fdb7a5ea1c9c3d552ee3073e38b480fc02eb58d53c640d991b1fcf5cc773ceaf53a7d08d909f0c831134fa4524c9bddf2e2844d707b7c81c3a70c241a1d90439c08e708959a616e018195e91536aa0649be663e1e1c3e7673aa2dda10c3c6e362f199eff4093b0e20e0d81e9902cf8a87c5ade712cb5bf0744a76c278f4893ca498555379a2f3a986ebc55651116716e8b3b8ca5c66a7f492e38837efae44068a0fd8e5e17347a012bc8613fb9a5aab1cff115fcaa850f6bd96d266af6", 0xc1}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="f7f258480aa4ce20e779e77d0076cc03592a160500000032a56f7259e480249950f34c6aa1cef20d94de765aa586d65a3d7f022e4c14f1bdd705d398eef68310ec46b654cd8f9c032f1078c135f1c760ca5232f285d288f2fb01819502f5fa6fa2e990b1df395f3249121933b05884012ce6e5f8844d19a1602ce32d48041cdd4dabd5b386e3f2810a5be8d2c4cd3505cc248a2f6a4fbdbc83823fa035cdd1232d1f276e39f897faf5c1f78ed02790f26129d6582a377c1fdaaaa135a44e88f785290f970c5b5afb70a741197192c4ea43bed2b6b7515fbf7da8c162d744bcb9d2a44e570dd0ea9fae5f860d597c85f808ca0000000000000000000000000000000010551f6fd8585cf29200f352693c7054da93c82431dc249826c4198824fad79e69f012fd9d43b6ef04340d69e8123959c227c60cbf2cefc14a418add8116637948324f10ad51cb06ed40ca31cf555c808464e691cfd27521dd1ebb007f027b0465dfb1b507f16e9bc2a255727b616c6b"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000019400)={0x0, 0x40}) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) getpeername$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000193c0)=0x14) ioctl$UFFDIO_ZEROPAGE(r3, 0xc020aa04, &(0x7f0000000040)={{&(0x7f0000ffc000/0x3000)=nil, 0x3000}}) ptrace$cont(0x1f, r0, 0x400000000000000, 0x0) [ 808.609409][T22180] tproxy_tg6_check: 1 callbacks suppressed [ 808.609415][T22180] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:30 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1c, 0x1}}, 0x0, 0x0, 0x0}) 09:16:30 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) sendmsg$xdp(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000040)) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x0) [ 808.694046][T22186] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:30 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:30 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:16:30 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x63, 0x1}}, 0x0, 0x0, 0x0}) 09:16:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) r4 = socket$alg(0x26, 0x5, 0x0) bind$alg(r4, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r5 = accept4(r4, 0x0, 0x0, 0x0) fcntl$setstatus(r5, 0x4, 0x2000) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r5, r6, 0x0, 0x10000000000443) bind$l2tp(r6, &(0x7f0000000140)={0x2, 0x0, @multicast1, 0x2}, 0x10) getsockopt$netlink(r3, 0x10e, 0xa, &(0x7f00000000c0)=""/95, &(0x7f0000000040)=0x5f) [ 808.865854][T22204] xt_TPROXY: Can be used only with -p tcp or -p udp [ 809.090005][T22176] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:31 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, 0x0) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:31 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:31 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x67, 0x1}}, 0x0, 0x0, 0x0}) 09:16:31 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:16:31 executing program 2: clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) clock_nanosleep(0x2, 0x0, &(0x7f0000000180)={r0, r1+10000000}, &(0x7f00000001c0)) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) r4 = accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) fcntl$setstatus(r4, 0x4, 0x2000) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r4, r5, 0x0, 0x10000000000443) sendmsg$xdp(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) getsockname$unix(r3, &(0x7f0000000340), &(0x7f0000000280)=0x6e) r6 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r6, 0x0, 0x10000000000443) ioctl$VIDIOC_S_EXT_CTRLS(r5, 0xc0205648, &(0x7f00000000c0)={0xa30000, 0x7, 0x8000, 0xffffffffffffffff, 0x0, &(0x7f00000002c0)={0x9a0912, 0x6, [], @value64}}) setsockopt$inet6_tcp_int(r7, 0x6, 0x1, &(0x7f0000000100)=0x71, 0x4) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) r8 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000900)='/proc/capi/capi20\x00', 0x141000, 0x0) ioctl$sock_inet_SIOCDARP(r8, 0x8953, &(0x7f0000000940)={{0x2, 0x4e21, @loopback}, {0x1, @remote}, 0xa8, {0x2, 0x4e23, @local}, 'wg2\x00'}) [ 809.348360][T22226] xt_TPROXY: Can be used only with -p tcp or -p udp [ 809.403604][T22235] xt_TPROXY: Can be used only with -p tcp or -p udp [ 809.627080][T22231] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:33 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000140)) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) syz_genetlink_get_family_id$gtp(&(0x7f0000000000)='gtp\x00') ptrace$cont(0x7, r0, 0x0, 0x0) 09:16:33 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x6c, 0x1}}, 0x0, 0x0, 0x0}) 09:16:33 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd8, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa8, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x9c, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x24000}, @IFLA_VTI_FWMARK={0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd8}}, 0x0) 09:16:33 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, 0x0) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') sendmsg$TIPC_CMD_GET_REMOTE_MNG(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r4, 0xda19c4cd9235f81}, 0x1c}}, 0x0) sendmsg$TIPC_CMD_SET_NETID(r3, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r4, 0x200, 0x70bd2b, 0x25dfdbfe, {{}, {}, {0x8, 0x2, 0x400}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24008040}, 0x20008045) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)}, 0x24004804) 09:16:33 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 811.727126][T22257] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:33 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x0, 0x0, 0x0}) 09:16:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ocfs2_control\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r3, 0x8982, &(0x7f00000000c0)={0x7, 'veth1_to_bridge\x00', {0x80000001}, 0x9}) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) [ 811.852158][T22272] usb usb6: usbfs: process 22272 (syz-executor.3) did not claim interface 0 before use [ 811.852619][T22275] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:33 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:33 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="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"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa0, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x94, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) 09:16:33 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000840)='/dev/bus/usb/00#/00#\x00', 0x90c, 0xc0642) ioctl$USBDEVFS_BULK(r0, 0xc0185502, &(0x7f0000000180)={{{0x1, 0x1}}, 0x2, 0x0, 0x0}) [ 811.914626][T22273] xt_TPROXY: Can be used only with -p tcp or -p udp [ 812.018843][T22285] xt_TPROXY: Can be used only with -p tcp or -p udp [ 812.044564][T22291] usb usb6: usbfs: process 22291 (syz-executor.3) did not claim interface 0 before use [ 812.233276][T22255] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:36 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') r4 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nvram\x00', 0x400, 0x0) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0x1) sendfile(r2, r3, 0x0, 0x10000000000443) sendmsg$xdp(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)}, 0x0) setsockopt$bt_BT_SNDMTU(r2, 0x112, 0xc, &(0x7f0000000040)=0xd4, 0x2) 09:16:36 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa0, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x94, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) 09:16:36 executing program 4: r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000080)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41bd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x10, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x3c, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_OPERSTATE={0x8, 0xa, 0x10}, @IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x3c}, 0x4c, 0x5e}, 0x0) r2 = dup(0xffffffffffffffff) setsockopt$packet_int(r2, 0x107, 0x10000000000f, &(0x7f0000006ffc)=0x400000000008, 0x50) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={@any, 0x1}) sendmsg$AUDIT_SET_FEATURE(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x20, 0x3fa, 0x104, 0x70bd29, 0x5, {}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x4000}, 0x24000811) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=@setlink={0x34, 0x13, 0x41d, 0x74, 0x0, {0x8, 0x0, 0xc002}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}]}, 0x34}, 0x1, 0x5e}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') ioctl$KVM_GET_XCRS(r3, 0x8188aea6, &(0x7f00000000c0)={0x6, 0x0, [{0x5, 0x0, 0x8000}, {0x7f, 0x0, 0x3e00000000000000}, {0xcc26, 0x0, 0xffffffff}, {0xffffff72}, {0xb5, 0x0, 0x9c1b}, {0x10001, 0x0, 0x1c9}]}) ioctl$BLKRESETZONE(r3, 0x40101283, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r1, 0x8983, &(0x7f0000000200)={0x0, 'team0\x00', {0x3}, 0xfd}) 09:16:36 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:36 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f00000001c0)) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) r1 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0xc0800) r2 = accept(0xffffffffffffffff, 0x0, 0x0) r3 = getpid() sched_setscheduler(r3, 0x5, 0x0) sched_setaffinity(r3, 0x8, &(0x7f0000000200)=0x5) r4 = syz_genetlink_get_family_id$netlbl_cipso(0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000004c0)={0x60, r4, 0x0, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x4}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x2}, @NLBL_CIPSOV4_A_MLSCATLST={0x38, 0xc, 0x0, 0x1, [{0x4}, {0x1c, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}, @NLBL_CIPSOV4_A_MLSCATLOC={0x8}]}, {0x14, 0xb, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSCATREM={0x8}, @NLBL_CIPSOV4_A_MLSCATREM={0x8, 0xa, 0x5d2d}]}]}]}, 0x60}}, 0x4004040) sendmsg$NLBL_CIPSOV4_C_LIST(r1, &(0x7f00000193c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0xf9815ddf9c1f34c7}, 0xc, &(0x7f0000000180)={&(0x7f00000194c0)={0x74, r4, 0x4, 0x70bd2a, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x24, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x6}, {0x5}, {0x5, 0x3, 0x2}, {0x5, 0x3, 0x6}]}, @NLBL_CIPSOV4_A_DOI={0x8, 0x1, 0x1}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x1}, {0x5}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x7}, {0x5}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x40840}, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) [ 814.788062][T22309] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x7, &(0x7f0000000080)=[{&(0x7f0000000400)="140000001f0005b7d25a80648c63940d05000000", 0x14}], 0x1}, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r3 = accept4(r2, 0x0, 0x0, 0x0) fcntl$setstatus(r3, 0x4, 0x2000) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r3, r4, 0x0, 0x10000000000443) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value={0x0}, &(0x7f0000000200)=0x30) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0x9, &(0x7f00000000c0)={r6, @in={{0x2, 0x0, @empty}}}, 0x9c) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000540)={r6, 0x1000, "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"}, &(0x7f00000000c0)=0x1008) setsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={r7, 0x5, 0x52f, 0x6, 0xbd, 0xffff}, 0x14) r8 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r8, 0x4, 0x2000) r9 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r8, r9, 0x0, 0x10000000000443) getdents64(r9, &(0x7f0000000040)=""/34, 0x22) [ 814.944708][T22332] xt_TPROXY: Can be used only with -p tcp or -p udp [ 814.964040][T22313] team0: Device ipvlan1 is VLAN challenged and team device has VLAN set up 09:16:37 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) 09:16:37 executing program 1: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) prctl$PR_MPX_DISABLE_MANAGEMENT(0x2c) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r2 = accept4(r1, 0x0, 0x0, 0x0) fcntl$setstatus(r2, 0x4, 0x2000) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r2, r3, 0x0, 0x10000000000443) ioctl$KVM_GET_MSRS(r3, 0xc008ae88, &(0x7f0000000000)={0x2, 0x0, [{}, {}]}) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000003c0)=""/102400, 0xffffffffffffff3a}], 0x3, 0x0, 0x0, 0x0) tkill(r0, 0x40) write$sndseq(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @ext={0x172, &(0x7f0000000240)="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"}}], 0x1c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 09:16:37 executing program 5: bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x36, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000a5000095002b000000000040437802591ce5dca5d6ce408d6e4bab6e4b99076ee873c3190b8e677abc3b3e9bafb4a34045d587d48b71b63efe8df7cf77c6584895b7cd665f186a255483201b327bf878b6ee8f5c9fd14b6969a938fdfe00599d7762acb706ba49bcbdb493789f8207c5909e4f760196390c249bddbc7ecdb1dd039683f23558decd51f929b922dc21c8c454bad1559ad0b9af531c996eccadb0973de0253e34df4fef33910bdd89a0b7f473fbd8275ecd6f35310547dd45097c80b449ed0b75e87cbbfa657e9efac279e5be2973283430b22f09d7c3ead799a7059a617d4630634a96289626622257526407326a4f79d02ec02c2e9f3b0de2ea0a5e0649a1d100e000000080000000002a2affdb84e4cc86627edda52c7d244e00f7dd78906e3c2b5ef17c4b2b923f8b3204c59a5fd21b553ed8ba1b8f12bdbbe3b5c8792b1bb58e769dfea88b388e7dc17e039a67a7135e072a6ee545f5e312ca9462c92f1098a5a3f236df9cc47c7709000000bdbd33468c340f0b0850400000000000d033fb9a84c8a4c1f3c009bf15ba3c6f7901b91a4c957a00272fb78fdeb29cd78ffb4eb7d9dcce55a70b9d2dcb9bc502cbcc2420ff9aa4ccee4fe6ec64b61dfed36074abaf2fed048ba135b8e6b8fa794f7f9f71284acac3c1c5a49d6d6df86f2db26892796a22f78e188b60d21c32c77f58b9c64f872407289d4c740a7ae9f00d551f978aa2de7d2dc21a38b8f6ea2974d9f978f75b0d338d5bddeadec4e4a443981bef7a07543b8544ab400ed4b7f84c716b49aff781b618469ec6fda7e3f556b9c578be33119f2de675"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000004c0)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x2000) r2 = syz_open_procfs(0x0, &(0x7f0000000080)='pagemap\x00') sendfile(r1, r2, 0x0, 0x10000000000443) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @local, 0x4e22, 0x3, 'fo\x00', 0x18, 0x8001, 0x6e}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e20, 0x2000, 0xffffff81, 0x6, 0x2}}, 0x44) r3 = socket$nl_route(0x10, 0x3, 0x0) socket(0x1, 0x803, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=@newlink={0xd0, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0xebb}, [@IFLA_LINKINFO={0xa0, 0x12, 0x0, 0x1, @vti={{0x8, 0x1, 'vti\x00'}, {0x94, 0x2, 0x0, 0x1, [@IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010102}, @vti_common_policy=[@IFLA_VTI_LINK={0x8}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x8}], @IFLA_VTI_REMOTE={0x8, 0x5, @rand_addr=0x64010100}, @IFLA_VTI_LOCAL={0x8, 0x4, @rand_addr=0x64010101}, @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0xc000000}, @IFLA_VTI_LINK={0x8}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_IKEY={0x8, 0x2, 0x6}, @IFLA_VTI_OKEY={0x8, 0x3, 0xfaf}, @IFLA_VTI_OKEY={0x8, 0x3, 0x10000}, @IFLA_VTI_FWMARK={0x8, 0x6, 0x303}, @IFLA_VTI_OKEY={0x8, 0x3, 0x401}, @IFLA_VTI_LINK={0x8}], @vti_common_policy=[@IFLA_VTI_OKEY={0x8, 0x3, 0x4}, @IFLA_VTI_FWMARK={0x8, 0x6, 0xc5c}], @IFLA_VTI_REMOTE={0x8, 0x5, @broadcast}, @IFLA_VTI_LOCAL={0x8, 0x4, @local}]}}}, @IFLA_LINK={0x8}, @IFLA_MASTER={0x8}]}, 0xd0}}, 0x0) [ 814.995410][T22320] xt_TPROXY: Can be used only with -p tcp or -p udp 09:16:37 executing program 0: clone(0x80000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000a00)=@mangle={'mangle\x00', 0x64, 0x6, 0x5c0, 0x332, 0x300, 0x230, 0x3d0, 0x300, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x4f0, 0x6, 0x0, {[{{@ipv6={@loopback, @mcast1={0xff, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x48]}, [], [], 'syzkaller1\x00', 'veth0_to_bridge\x00'}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@ipv6={@dev, @local, [], [], 'veth1\x00', 'ip6tnl0\x00'}, 0x0, 0xf8, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @common=@ipv6header={{0x28, 'ipv6header\x00'}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@local}}}, {{@ipv6={@initdev={0xfe, 0x88, [], 0x0, 0x0}, @dev, [], [], 'gretap0\x00', 'veth0\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@ipv6={@loopback, @local, [], [], 'ip6_vti0\x00', 'veth0_to_hsr\x00'}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}, {{@uncond, 0x0, 0xf8, 0x120, 0x0, {}, [@inet=@rpfilter={{0x28, 'rpfilter\x00'}}, @inet=@rpfilter={{0x28, 'rpfilter\x00'}}]}, @unspec=@CHECKSUM={0x28, 'CHECKSUM\x00'}}], {{[], 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x620) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) openat$proc_capi20(0xffffffffffffff9c, 0x0, 0x400, 0x0) ioctl$PPPIOCSMRU1(0xffffffffffffffff, 0x40047452, 0x0) [ 815.098094][T22337] xt_TPROXY: Can be used only with -p tcp or -p udp [ 815.116858][T22343] xt_TPROXY: Can be used only with -p tcp or -p udp [ 815.235086][T22355] xt_TPROXY: Can be used only with -p tcp or -p udp [ 815.280078][T22348] xt_TPROXY: Can be used only with -p tcp or -p udp [ 964.405191][ T1142] INFO: task syz-executor.3:22291 blocked for more than 143 seconds. [ 964.418021][ T1142] Not tainted 5.7.0-rc6-syzkaller #0 [ 964.427421][ T1142] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 964.440854][ T1142] syz-executor.3 D28392 22291 7333 0x00004004 [ 964.450951][ T1142] Call Trace: [ 964.454558][ T1142] ? __schedule+0x937/0x1ff0 [ 964.463127][ T1142] ? __sched_text_start+0x8/0x8 [ 964.472206][ T1142] ? mark_held_locks+0xe0/0xe0 [ 964.480771][ T1142] ? lock_downgrade+0x840/0x840 [ 964.490538][ T1142] ? schedule+0xd0/0x2a0 [ 964.499825][ T1142] ? schedule_timeout+0x55b/0x850 [ 964.508670][ T1142] ? find_held_lock+0x2d/0x110 [ 964.513729][ T1142] ? usleep_range+0x160/0x160 [ 964.518979][ T1142] ? wait_for_completion_timeout+0x15a/0x280 [ 964.525477][ T1142] ? do_syscall_64+0xf6/0x7d0 [ 964.530472][ T1142] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 964.537159][ T1142] ? lock_downgrade+0x840/0x840 [ 964.542365][ T1142] ? do_raw_spin_lock+0x129/0x2e0 [ 964.547852][ T1142] ? rwlock_bug.part.0+0x90/0x90 [ 964.553081][ T1142] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 964.560028][ T1142] ? _raw_spin_unlock_irq+0x1f/0x80 [ 964.565908][ T1142] ? wait_for_completion_timeout+0x162/0x280 [ 964.572232][ T1142] ? wait_for_completion_io_timeout+0x280/0x280 [ 964.579411][ T1142] ? usb_submit_urb+0x6ed/0x13b0 [ 964.584974][ T1142] ? lockdep_init_map_waits+0x1d3/0x890 [ 964.590829][ T1142] ? usb_start_wait_urb+0x144/0x2b0 [ 964.598327][ T1142] ? sg_clean+0x230/0x230 [ 964.602911][ T1142] ? memset+0x20/0x40 [ 964.607542][ T1142] ? usb_bulk_msg+0x228/0x550 [ 964.612556][ T1142] ? proc_bulk+0x41a/0x780 [ 964.617644][ T1142] ? processcompl_compat+0x670/0x670 [ 964.623223][ T1142] ? kfree+0x1eb/0x2b0 [ 964.629135][ T1142] ? tomoyo_path_number_perm+0x411/0x4d0 [ 964.635693][ T1142] ? lockdep_hardirqs_on+0x463/0x620 [ 964.641218][ T1142] ? tomoyo_path_number_perm+0x238/0x4d0 [ 964.647714][ T1142] ? usbdev_ioctl+0x543/0x31e0 [ 964.652724][ T1142] ? proc_do_submiturb+0x3530/0x3530 [ 964.658607][ T1142] ? __fget_files+0x30d/0x500 [ 964.663651][ T1142] ? __sanitizer_cov_trace_switch+0x45/0x70 [ 964.670221][ T1142] ? do_vfs_ioctl+0x50c/0x1360 [ 964.675602][ T1142] ? ioctl_file_clone+0x180/0x180 [ 964.680961][ T1142] ? __fget_files+0x32f/0x500 [ 964.686271][ T1142] ? ksys_dup3+0x3c0/0x3c0 [ 964.691043][ T1142] ? __x64_sys_futex+0x380/0x4f0 [ 964.696627][ T1142] ? proc_do_submiturb+0x3530/0x3530 [ 964.702205][ T1142] ? ksys_ioctl+0x11a/0x180 [ 964.708702][ T1142] ? __x64_sys_ioctl+0x6f/0xb0 [ 964.713768][ T1142] ? lockdep_hardirqs_on+0x463/0x620 [ 964.720412][ T1142] ? do_syscall_64+0xf6/0x7d0 [ 964.725793][ T1142] ? entry_SYSCALL_64_after_hwframe+0x49/0xb3 [ 964.732186][ T1142] [ 964.732186][ T1142] Showing all locks held in the system: [ 964.740567][ T1142] 5 locks held by kworker/u4:6/364: [ 964.746238][ T1142] 1 lock held by khungtaskd/1142: [ 964.751530][ T1142] #0: ffffffff899bea80 (rcu_read_lock){....}-{1:2}, at: debug_show_all_locks+0x53/0x260 [ 964.763046][ T1142] 1 lock held by in:imklog/6669: [ 964.768575][ T1142] #0: ffff888094b56df0 (&f->f_pos_lock){+.+.}-{3:3}, at: __fdget_pos+0xe9/0x100 [ 964.778423][ T1142] 4 locks held by kworker/0:5/10219: [ 964.783772][ T1142] #0: ffff8880ae637998 (&rq->lock){-.-.}-{2:2}, at: __schedule+0x233/0x1ff0 [ 964.804691][ T1142] #1: ffff8880ae622ec8 (&per_cpu_ptr(group->pcpu, cpu)->seq){-.-.}-{0:0}, at: psi_task_switch+0x304/0x410 [ 964.817847][ T1142] #2: ffffffff899b37f8 (logbuf_lock){-.-.}-{2:2}, at: console_unlock+0x691/0xf00 [ 964.827972][ T1142] #3: ffffffff899b37f8 (logbuf_lock){-.-.}-{2:2}, at: console_unlock+0x1c2/0xf00 [ 964.838355][ T1142] [ 964.840987][ T1142] ============================================= [ 964.840987][ T1142] [ 964.850848][ T1142] NMI backtrace for cpu 0 [ 964.855262][ T1142] CPU: 0 PID: 1142 Comm: khungtaskd Not tainted 5.7.0-rc6-syzkaller #0 [ 964.863480][ T1142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.873518][ T1142] Call Trace: [ 964.876796][ T1142] dump_stack+0x188/0x20d [ 964.881120][ T1142] nmi_cpu_backtrace.cold+0x70/0xb1 [ 964.886378][ T1142] ? lapic_can_unplug_cpu.cold+0x3b/0x3b [ 964.892018][ T1142] nmi_trigger_cpumask_backtrace+0x231/0x27e [ 964.897995][ T1142] watchdog+0xa8c/0x1010 [ 964.902235][ T1142] ? reset_hung_task_detector+0x30/0x30 [ 964.907833][ T1142] kthread+0x388/0x470 [ 964.911910][ T1142] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 964.917626][ T1142] ret_from_fork+0x24/0x30 [ 964.922245][ T1142] Sending NMI from CPU 0 to CPUs 1: [ 964.927874][ C1] NMI backtrace for cpu 1 [ 964.927879][ C1] CPU: 1 PID: 364 Comm: kworker/u4:6 Not tainted 5.7.0-rc6-syzkaller #0 [ 964.927884][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 964.927887][ C1] Workqueue: krdsd rds_connect_worker [ 964.927893][ C1] RIP: 0010:__local_bh_enable_ip+0x130/0x270 [ 964.927902][ C1] Code: 00 0f 84 cb 00 00 00 fa 66 0f 1f 44 00 00 e8 37 a9 32 00 65 8b 05 b8 14 bc 7e 25 00 ff 00 00 3d 00 02 00 00 0f 84 94 00 00 00 <8d> 7b ff e8 58 00 09 00 65 8b 05 99 14 bc 7e a9 00 ff 1f 00 0f 84 [ 964.927905][ C1] RSP: 0018:ffffc90001c379d8 EFLAGS: 00000046 [ 964.927911][ C1] RAX: 0000000000000007 RBX: 0000000000000201 RCX: 1ffffffff18ccc1c [ 964.927915][ C1] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8880a8742d84 [ 964.927919][ C1] RBP: ffffffff86965491 R08: 0000000000000001 R09: fffff52000b641da [ 964.927923][ C1] R10: ffffc90005b20ecb R11: fffff52000b641d9 R12: ffff8880a87424c0 [ 964.927927][ C1] R13: ffff888022a80580 R14: dffffc0000000000 R15: 0000000000000000 [ 964.927932][ C1] FS: 0000000000000000(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 964.927935][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 964.927940][ C1] CR2: 00007f3ca0e51ab4 CR3: 00000000a8fa3000 CR4: 00000000001406e0 [ 964.927944][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 964.927948][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 964.927950][ C1] Call Trace: [ 964.927953][ C1] inet_csk_get_port+0xdb1/0x2590 [ 964.927956][ C1] ? inet_csk_listen_stop+0xb20/0xb20 [ 964.927959][ C1] ? mark_held_locks+0x9f/0xe0 [ 964.927962][ C1] ? __local_bh_enable_ip+0x159/0x270 [ 964.927964][ C1] __inet_bind+0x5b2/0xbd0 [ 964.927967][ C1] inet_bind+0xf3/0x160 [ 964.927970][ C1] rds_tcp_conn_path_connect+0x536/0x880 [ 964.927973][ C1] ? rds_tcp_state_change+0x270/0x270 [ 964.927976][ C1] ? rcu_read_lock_sched_held+0x9c/0xd0 [ 964.927979][ C1] rds_connect_worker+0x1a5/0x2c0 [ 964.927982][ C1] process_one_work+0x965/0x16a0 [ 964.927984][ C1] ? lock_release+0x800/0x800 [ 964.927987][ C1] ? pwq_dec_nr_in_flight+0x310/0x310 [ 964.927990][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 964.927993][ C1] worker_thread+0x96/0xe20 [ 964.927996][ C1] ? process_one_work+0x16a0/0x16a0 [ 964.927998][ C1] kthread+0x388/0x470 [ 964.928002][ C1] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 964.928004][ C1] ret_from_fork+0x24/0x30 [ 964.949796][ T1142] Kernel panic - not syncing: hung_task: blocked tasks [ 965.170827][ T1142] CPU: 0 PID: 1142 Comm: khungtaskd Not tainted 5.7.0-rc6-syzkaller #0 [ 965.179051][ T1142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 965.189093][ T1142] Call Trace: [ 965.192377][ T1142] dump_stack+0x188/0x20d [ 965.196761][ T1142] panic+0x2e3/0x75c [ 965.200650][ T1142] ? add_taint.cold+0x16/0x16 [ 965.205317][ T1142] ? lapic_can_unplug_cpu.cold+0x3b/0x3b [ 965.210948][ T1142] ? preempt_schedule_thunk+0x16/0x18 [ 965.216311][ T1142] ? watchdog+0xa8c/0x1010 [ 965.220718][ T1142] ? nmi_trigger_cpumask_backtrace+0x214/0x27e [ 965.226868][ T1142] watchdog+0xa9d/0x1010 [ 965.231107][ T1142] ? reset_hung_task_detector+0x30/0x30 [ 965.236642][ T1142] kthread+0x388/0x470 [ 965.240702][ T1142] ? kthread_mod_delayed_work+0x1a0/0x1a0 [ 965.246549][ T1142] ret_from_fork+0x24/0x30 [ 965.252539][ T1142] Kernel Offset: disabled [ 965.256854][ T1142] Rebooting in 86400 seconds..