[info] Using makefile-style concurrent boot in runlevel 2. [ 24.693513] audit: type=1800 audit(1540777666.785:21): pid=5517 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="bootlogs" dev="sda1" ino=2419 res=0 [....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.53' (ECDSA) to the list of known hosts. 2018/10/29 01:48:11 fuzzer started 2018/10/29 01:48:13 dialing manager at 10.128.0.26:41523 2018/10/29 01:48:13 syscalls: 1 2018/10/29 01:48:13 code coverage: enabled 2018/10/29 01:48:13 comparison tracing: enabled 2018/10/29 01:48:13 setuid sandbox: enabled 2018/10/29 01:48:13 namespace sandbox: enabled 2018/10/29 01:48:13 Android sandbox: /sys/fs/selinux/policy does not exist 2018/10/29 01:48:13 fault injection: enabled 2018/10/29 01:48:13 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/10/29 01:48:13 net packed injection: enabled 2018/10/29 01:48:13 net device setup: enabled 01:51:18 executing program 0: syzkaller login: [ 236.781225] IPVS: ftp: loaded support on port[0] = 21 01:51:19 executing program 1: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000140)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000280)=""/4096, 0x1000) [ 236.985644] IPVS: ftp: loaded support on port[0] = 21 01:51:19 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) r1 = syz_open_pts(r0, 0x200100) dup3(r0, r1, 0x0) [ 237.363524] IPVS: ftp: loaded support on port[0] = 21 01:51:19 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000300)={'bcsf0\x00', 0x20000405006}) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f00000000c0)) [ 237.809530] IPVS: ftp: loaded support on port[0] = 21 01:51:20 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={"766574000000000000000000bd6800", 0x43732e5398416f1a}) r2 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) geteuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000001180)={{{@in6, @in6=@dev}}, {{@in=@multicast1}, 0x0, @in6=@mcast1}}, &(0x7f0000001280)=0xe8) pread64(r1, &(0x7f0000000340)=""/39, 0x27, 0x0) sendmsg$nl_route(r2, &(0x7f0000000140)={&(0x7f00000000c0), 0xc, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0xc362e63b3f31ba5f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) dup2(r0, r1) add_key$user(&(0x7f0000000700)='user\x00', &(0x7f0000000200), &(0x7f0000000240), 0x0, 0xfffffffffffffffe) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc\x00', 0x0, 0x0) [ 238.415836] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.431691] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.439400] device bridge_slave_0 entered promiscuous mode [ 238.511189] IPVS: ftp: loaded support on port[0] = 21 [ 238.623042] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.629512] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.644900] device bridge_slave_1 entered promiscuous mode 01:51:20 executing program 5: r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f0000000000)={0x0, "6e72300000000000000000001d00", 0x4}, 0xffffffffffffff43) ioctl(r0, 0x8936, &(0x7f0000000000)) [ 238.727999] bridge0: port 1(bridge_slave_0) entered blocking state [ 238.749939] bridge0: port 1(bridge_slave_0) entered disabled state [ 238.760627] device bridge_slave_0 entered promiscuous mode [ 238.800298] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 238.900192] bridge0: port 2(bridge_slave_1) entered blocking state [ 238.915305] bridge0: port 2(bridge_slave_1) entered disabled state [ 238.939391] IPVS: ftp: loaded support on port[0] = 21 [ 238.945569] device bridge_slave_1 entered promiscuous mode [ 238.965913] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 239.079490] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 239.214197] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 239.395928] bridge0: port 1(bridge_slave_0) entered blocking state [ 239.410614] bridge0: port 1(bridge_slave_0) entered disabled state [ 239.423140] device bridge_slave_0 entered promiscuous mode [ 239.467308] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 239.498287] bridge0: port 2(bridge_slave_1) entered blocking state [ 239.511373] bridge0: port 2(bridge_slave_1) entered disabled state [ 239.519216] device bridge_slave_1 entered promiscuous mode [ 239.592947] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 239.609513] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 239.642024] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 239.725245] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 239.742145] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 240.023642] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 240.031687] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 240.155259] bridge0: port 1(bridge_slave_0) entered blocking state [ 240.169079] bridge0: port 1(bridge_slave_0) entered disabled state [ 240.177616] device bridge_slave_0 entered promiscuous mode [ 240.198529] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 240.211223] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 240.230610] team0: Port device team_slave_0 added [ 240.286596] bridge0: port 2(bridge_slave_1) entered blocking state [ 240.297404] bridge0: port 2(bridge_slave_1) entered disabled state [ 240.312872] device bridge_slave_1 entered promiscuous mode [ 240.355409] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 240.411605] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 240.420005] team0: Port device team_slave_1 added [ 240.462167] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 240.475167] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 240.502355] team0: Port device team_slave_0 added [ 240.548448] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 240.556243] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 240.587502] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 240.611078] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.630267] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 240.642320] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 240.649683] team0: Port device team_slave_1 added [ 240.662907] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 240.723719] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.763880] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 240.810189] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 240.833683] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 240.845248] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 240.928090] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 240.963837] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 240.972227] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 240.982341] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.038380] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.056732] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.064753] device bridge_slave_0 entered promiscuous mode [ 241.083670] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 241.091025] team0: Port device team_slave_0 added [ 241.100579] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 241.125274] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.172482] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.211061] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 241.229198] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 241.236779] team0: Port device team_slave_1 added [ 241.244798] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.251248] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.258805] device bridge_slave_1 entered promiscuous mode [ 241.275489] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 241.292879] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.300932] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 241.332938] bridge0: port 1(bridge_slave_0) entered blocking state [ 241.339337] bridge0: port 1(bridge_slave_0) entered disabled state [ 241.360915] device bridge_slave_0 entered promiscuous mode [ 241.372985] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 241.384033] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 241.397230] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 241.452406] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 241.460368] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 241.494438] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 241.503865] bridge0: port 2(bridge_slave_1) entered blocking state [ 241.510233] bridge0: port 2(bridge_slave_1) entered disabled state [ 241.530242] device bridge_slave_1 entered promiscuous mode [ 241.542515] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 241.558325] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 241.591888] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 241.598768] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 241.625347] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 241.659654] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 241.789915] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 241.806736] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 241.827373] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 241.851886] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 241.905612] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 241.921156] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 241.938710] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.009145] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 242.035631] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 242.054869] team0: Port device team_slave_0 added [ 242.180089] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 242.202621] team0: Port device team_slave_1 added [ 242.210508] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 242.272353] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 242.361847] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 242.368985] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 242.379218] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 242.392392] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 242.400287] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 242.426088] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 242.461212] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 242.482589] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 242.493995] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 242.521762] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 242.530833] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 242.561513] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.568076] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.575391] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.581790] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.618713] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 242.649068] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 242.666507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 242.682777] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 242.760729] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 242.798886] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 242.809273] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 242.836683] bridge0: port 2(bridge_slave_1) entered blocking state [ 242.843149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 242.849809] bridge0: port 1(bridge_slave_0) entered blocking state [ 242.856232] bridge0: port 1(bridge_slave_0) entered forwarding state [ 242.895045] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 242.937635] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 242.953000] team0: Port device team_slave_0 added [ 242.991803] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.026689] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 243.047925] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 243.057902] team0: Port device team_slave_1 added [ 243.072050] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 243.096765] team0: Port device team_slave_0 added [ 243.171943] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 243.178840] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.192353] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.233852] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 243.241277] team0: Port device team_slave_1 added [ 243.313664] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 243.322513] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.330443] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.400606] IPv6: ADDRCONF(NETDEV_UP): veth0_to_team: link is not ready [ 243.419611] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 243.440592] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 243.465155] bridge0: port 2(bridge_slave_1) entered blocking state [ 243.471605] bridge0: port 2(bridge_slave_1) entered forwarding state [ 243.478274] bridge0: port 1(bridge_slave_0) entered blocking state [ 243.484690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 243.492672] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 243.521687] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 243.544222] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.565677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.594151] IPv6: ADDRCONF(NETDEV_UP): veth1_to_team: link is not ready [ 243.602325] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 243.629418] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 243.653159] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 243.667302] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.683744] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 243.733792] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 243.740990] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 243.765228] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 243.901829] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 243.908988] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 243.933247] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 244.002158] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 244.382834] bridge0: port 2(bridge_slave_1) entered blocking state [ 244.389234] bridge0: port 2(bridge_slave_1) entered forwarding state [ 244.395961] bridge0: port 1(bridge_slave_0) entered blocking state [ 244.402382] bridge0: port 1(bridge_slave_0) entered forwarding state [ 244.427144] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 245.011676] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 245.120116] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.126551] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.133282] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.139655] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.169414] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 245.368675] bridge0: port 2(bridge_slave_1) entered blocking state [ 245.375122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 245.381834] bridge0: port 1(bridge_slave_0) entered blocking state [ 245.388201] bridge0: port 1(bridge_slave_0) entered forwarding state [ 245.417159] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 246.081604] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 246.094769] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 248.060522] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.077807] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.482820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 248.552159] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 248.589980] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 248.972719] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 249.025334] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 249.031886] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.060053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.089932] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 249.130349] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.148179] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.469252] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 249.475611] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 249.487526] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 249.508265] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.541357] 8021q: adding VLAN 0 to HW filter on device team0 [ 249.630256] 8021q: adding VLAN 0 to HW filter on device bond0 [ 249.908420] 8021q: adding VLAN 0 to HW filter on device team0 [ 250.079905] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 250.140548] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.523284] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 250.529490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 250.544980] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 250.566824] 8021q: adding VLAN 0 to HW filter on device bond0 [ 250.587191] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 250.990489] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 251.017703] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.032328] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 251.046476] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.058297] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.421577] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 251.427866] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 251.442509] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 251.575487] 8021q: adding VLAN 0 to HW filter on device team0 [ 251.951729] 8021q: adding VLAN 0 to HW filter on device team0 01:51:34 executing program 1: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) ftruncate(r2, 0x3) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000100)={0x0, r2}) 01:51:34 executing program 2: socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x2, 0x10, 0xffffffffffffffff, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000000c0)=""/49, 0x31}], 0x10000023, &(0x7f00000002c0)=""/77, 0x122}, 0x0) read(r1, &(0x7f0000000240)=""/124, 0x7c) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0x2, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0xffffff77}], 0x1, &(0x7f00000001c0)=""/17, 0xffda}, 0x0) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x8000000000000000, &(0x7f0000000100), 0x4c, &(0x7f0000000000)}, 0x0) 01:51:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x78, &(0x7f0000000000), 0x4) 01:51:34 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) socket$inet(0x2, 0xa, 0x0) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$packet(0x11, 0x2, 0x300) close(r1) 01:51:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000000400)="0a5c2d0240316285717070") pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000380)='u', 0x1) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x2a}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 252.827319] syz-executor1 uses obsolete (PF_INET,SOCK_PACKET) 01:51:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x8, 0x4, 0x6, 0x0, 0x1}, 0x2c) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', r1}, 0x10) 01:51:35 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000380)={'veth1_to_team\x00', 0x0}) bind$packet(r1, &(0x7f00000003c0)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @remote}, 0x14) 01:51:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000001c0)={0x2, 0x0, @ioapic={0x0, 0x0, 0x0, 0x7dbe, 0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1, 0x0, [], 0x1ff}]}}) [ 253.125435] L1TF CPU bug present and SMT on, data leak possible. See CVE-2018-3646 and https://www.kernel.org/doc/html/latest/admin-guide/l1tf.html for details. [ 253.192379] kvm: apic: phys broadcast and lowest prio 01:51:35 executing program 0: socket$inet6(0xa, 0x40000000003, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000840)={0x53, 0x0, 0x6, 0x7, @buffer={0x0, 0x91, &(0x7f0000000600)=""/145}, &(0x7f00000006c0)="2a390000e7b4", &(0x7f0000000740)=""/254}) 01:51:35 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCINQ(r0, 0x8907, &(0x7f0000000000)) [ 253.962826] hrtimer: interrupt took 28593 ns [ 254.024268] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 254.030890] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready [ 254.318940] IPv6: ADDRCONF(NETDEV_CHANGE): vcan0: link becomes ready 01:51:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x400000a77, 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) readv(r2, &(0x7f0000000700)=[{&(0x7f0000000140)=""/203, 0xcb}], 0x1) write$P9_RREADDIR(r3, &(0x7f0000000380)={0xb}, 0xb) syslog(0xf, 0x0, 0x0) close(r1) 01:51:36 executing program 1: r0 = socket$packet(0x11, 0x2008000000003, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) close(r0) dup2(r1, r0) 01:51:36 executing program 0: r0 = socket$packet(0x11, 0x2008000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'veth0_to_bridge\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000140)={&(0x7f0000000240)=@newneigh={0x1c, 0x1c, 0x503, 0x0, 0x0, {0x2, 0x0, 0x0, r1}}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x0) 01:51:36 executing program 2: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x8, &(0x7f0000000080)=0xfffffffffffffeb4, 0x4) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000002a40)=@hci, 0x6a, &(0x7f0000000180), 0x0, &(0x7f0000000600)=""/219, 0xdb}, 0x0) bind$inet6(r0, &(0x7f00000002c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f0000000000)=0x9, 0x4) sendto$inet6(r0, &(0x7f0000000300), 0x0, 0x0, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) 01:51:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x3, 0x7) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000180)={'gre0\x00', {0x2, 0x4e21, @remote}}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'team_slave_0\x00'}) connect$inet6(r0, &(0x7f0000000140)={0xa, 0x0, 0x0, @loopback}, 0x1c) write$P9_RLOCK(0xffffffffffffffff, &(0x7f00000001c0)={0x8, 0x35, 0x2}, 0x8) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f0000000080)={'lo\x00', {0x2, 0x4e24, @multicast2}}) sendmmsg(r0, &(0x7f0000000480), 0x2e9, 0xffd8) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x8000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PAUSE(0xffffffffffffffff, 0x54a3) dup2(0xffffffffffffffff, r1) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000200)={'nr0\x00', @broadcast}) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rtc0\x00', 0x0, 0x0) ioctl$sock_SIOCGSKNS(r1, 0x894c, &(0x7f0000000100)=0x4) ioctl$RTC_SET_TIME(r2, 0x4024700a, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x16, 0x0, 0x1eb}) 01:51:36 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) clone(0x0, &(0x7f0000fbf000), &(0x7f0000000000), &(0x7f0000000100), &(0x7f00000000c0)) [ 254.502267] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:51:36 executing program 1: r0 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000080)='/dev/uinput\x00', 0x20801, 0x0) write$uinput_user_dev(r0, &(0x7f0000000400)={'syz1\x00', {}, 0xffffffffffffffff}, 0x45c) ioctl$UI_DEV_SETUP(r0, 0x5501, &(0x7f00000001c0)={{}, 'syz*\x00'}) 01:51:36 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) setsockopt(r0, 0x8000000000000001, 0x10000000000009, &(0x7f0000003f00)="890528e4", 0x4) 01:51:36 executing program 0: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000000)=0x2, 0x4) [ 254.613294] input input5: cannot allocate more than FF_MAX_EFFECTS effects 01:51:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="5300000007020046006c6f2d73656c662627946d6e65740773656c696e757873656e667b776c616e315b6b657972696e67706f7369785f61636c5f61636365737373656c662470707031216574683001000100044809c80bd07aabf5ec6e982fbc"], 0x61) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, &(0x7f0000000180)=0x6, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$LOOP_SET_FD(r3, 0x4c00, 0xffffffffffffffff) getcwd(&(0x7f0000000480)=""/230, 0xe6) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x8) write$P9_RRENAME(r1, &(0x7f00000000c0)={0x7, 0x15, 0x5}, 0x7) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000005c0)="ea1b5ccd21943faa13d00db00e4ddb1fb25e743b9a8fa2318e9038ba5826fb56bf8249ed6a3075eb27a58578022f6195daeb0b3f56ba41a23e3450cfa03ba80c935f093fadaf568b6fb4defd1041b3d8dce95ab5dde8caca83d72d8853169100a677829affc7b520c598edb01960698720a146454fea1c8660b47d3a2890cf96a4f0e474330f25e7d65d60a25e1073f4ff6b1d62671653d3482180d7696315b437801c0492874ea1b508b4a089a274d7a28175a18e686dd01329706c2890d4656eb3d7e002a0b58982f71eda5b740e9f83b9a7c1f99ee215a2cbf137902abc9504cc6a73b60869543d593238429e9bd6c844318e3dc8c22545dd1a4023cf23fc") lseek(r2, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000300)={'broute\x00', 0x0, 0x3, 0x5a, [], 0x9, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000280)=""/90}, &(0x7f00000000c0)=0x78) [ 254.658100] input input6: cannot allocate more than FF_MAX_EFFECTS effects 01:51:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) io_setup(0x8c7, &(0x7f0000000340)) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(r0, r1, &(0x7f00000000c0), 0x1) lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000280)) 01:51:36 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x80, 0x0) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000080)={0x1}) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000880)) clone(0x802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) io_setup(0x8c7, &(0x7f0000000340)) open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000200)=""/89) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') exit(0x0) sendfile(0xffffffffffffffff, r2, &(0x7f00000000c0), 0x1) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000540)=ANY=[], 0x0) socketpair$inet6_udplite(0xa, 0x2, 0x88, &(0x7f0000000380)) [ 254.894454] print_req_error: I/O error, dev loop0, sector 120 01:51:37 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001680)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r2, 0x0, r0, 0x0, 0x400000a77, 0x0) write$binfmt_elf64(r3, &(0x7f00000000c0)=ANY=[@ANYRESHEX=0x0], 0xe681f134) readv(r2, &(0x7f0000000700)=[{&(0x7f0000000140)=""/203, 0xcb}], 0x1) write$P9_RREADDIR(r3, &(0x7f0000000380)={0xb}, 0xb) syslog(0xf, 0x0, 0x0) close(r1) 01:51:37 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x0, 0x0) ioctl(r1, 0x800000000000937e, &(0x7f0000000140)="1fdf1875000000007f") 01:51:37 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xc) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000080)="2dd82a36279c1bc0259b672f16c1f98e9ba64ae900cc6e7cf8ecf1ad76def4011ad6191b9bd464cd0fab2d37b4478c5623500731adaf97d0381b15f7e4f305733d3d898c57e32d64573a6f581dcbc9eff4038ed25bfd815c596d1021e7b47ab75d8bfe130db64ee5a4394e5602b42ec25073c37673c9a627cf8703866939c488a56b9ada1cd2459a7289a0715ab96e7bdf1c07509cfa8c") ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x3fe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000000000045, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$TIOCCONS(r1, 0x541d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x102, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1ffffffffffffe, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000640)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000006c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x10000, @empty, 0x7}, r3}}, 0x30) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5}, 0xc) 01:51:37 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000140)='/dev/full\x00', 0x0, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x82) r4 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) write$P9_RLERRORu(0xffffffffffffffff, &(0x7f00000007c0)=ANY=[@ANYBLOB="5300000007020046006c6f2d73656c662627946d6e65740773656c696e757873656e667b776c616e315b6b657972696e67706f7369785f61636c5f61636365737373656c662470707031216574683001000100044809c80bd07aabf5ec6e982fbc"], 0x61) pwritev(r4, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r3, 0x4c00, r4) sendfile(r3, r4, &(0x7f0000000180)=0x6, 0x2000005) ioctl$LOOP_CLR_FD(r3, 0x4c01) ioctl$LOOP_SET_FD(r3, 0x4c00, 0xffffffffffffffff) getcwd(&(0x7f0000000480)=""/230, 0xe6) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x8) write$P9_RRENAME(r1, &(0x7f00000000c0)={0x7, 0x15, 0x5}, 0x7) ioctl$FS_IOC_SETFSLABEL(r3, 0x41009432, &(0x7f00000005c0)="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") lseek(r2, 0x0, 0x0) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000300)={'broute\x00', 0x0, 0x3, 0x5a, [], 0x9, &(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], &(0x7f0000000280)=""/90}, &(0x7f00000000c0)=0x78) [ 255.381046] autofs4:pid:7360:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1964564255.0), cmd(0x0000937e) [ 255.402275] autofs4:pid:7360:validate_dev_ioctl: invalid device control module version supplied for cmd(0x0000937e) 01:51:37 executing program 1: perf_event_open(&(0x7f0000c86f88)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() sched_setaffinity(0x0, 0xfffffffffffffddf, &(0x7f0000000200)=0x8000000000005) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000080), 0xffffffffffffffff) memfd_create(&(0x7f0000000e40)="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", 0x0) execveat(r0, &(0x7f0000000000)='\x00', &(0x7f0000000900)=[&(0x7f0000000240)='self-\x00', &(0x7f0000000940)="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", &(0x7f0000000480)="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", &(0x7f0000000680)="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", &(0x7f0000000880)='\x00', &(0x7f00000008c0)='selinuxposix_acl_accessbdev,*'], &(0x7f0000000180), 0x1000) r1 = getpgid(0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000001c0)="e9b58a049b973f07f63aa8d0484b510b6b6febdf2355", 0x16, 0x20000000, 0x0, 0x0) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r1, 0x0, 0xffffffffffffffff, 0x1) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000b40)=0x5) 01:51:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000080)="2dd82a36279c1bc0259b672f16c1f98e9ba64ae900cc6e7cf8ecf1ad76def4011ad6191b9bd464cd0fab2d37b4478c5623500731adaf97d0381b15f7e4f305733d3d898c57e32d64573a6f581dcbc9eff4038ed25bfd815c596d1021e7b47ab75d8bfe130db64ee5a4394e5602b42ec25073c37673c9a627cf8703866939c488a56b9ada1cd2459a7289a0715ab96e7bdf1c07509cfa8c") ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x3fe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000000000045, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$TIOCCONS(r1, 0x541d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x102, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1ffffffffffffe, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000640)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000006c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x10000, @empty, 0x7}, r3}}, 0x30) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5}, 0xc) [ 255.556193] print_req_error: I/O error, dev loop0, sector 248 01:51:37 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='pagemap\x00') close(r0) ioctl$KDGKBMODE(0xffffffffffffffff, 0x4b44, &(0x7f0000000040)) 01:51:37 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:37 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f000012bff2)='net/mcfilter6\x00') pread64(r0, &(0x7f00000003c0)=""/172, 0xac, 0x0) 01:51:37 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000080)="2dd82a36279c1bc0259b672f16c1f98e9ba64ae900cc6e7cf8ecf1ad76def4011ad6191b9bd464cd0fab2d37b4478c5623500731adaf97d0381b15f7e4f305733d3d898c57e32d64573a6f581dcbc9eff4038ed25bfd815c596d1021e7b47ab75d8bfe130db64ee5a4394e5602b42ec25073c37673c9a627cf8703866939c488a56b9ada1cd2459a7289a0715ab96e7bdf1c07509cfa8c") ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x3fe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000000000045, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$TIOCCONS(r1, 0x541d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x102, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1ffffffffffffe, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000640)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000006c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x10000, @empty, 0x7}, r3}}, 0x30) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5}, 0xc) 01:51:38 executing program 4: 01:51:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:38 executing program 1: r0 = socket(0x2, 0x1, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x6400000000000000, 0x80, &(0x7f0000000040)=@broute={"62726f7574653500000600", 0x20, 0x1, 0x3b0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200000c0], 0x0, &(0x7f0000000000), &(0x7f00000000c0)=[{0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x3, 0x0, 0x0, 'ip6gre0\x00', 'syzkaller1\x00', 'ip6tnl0\x00', "01616d61000000004ab2cec800", @remote, [], @remote, [], 0x2a8, 0x2a8, 0x320, [@bpf0={'bpf\x00', 0x210, {{0x3}}}]}}, @common=@nflog={'nflog\x00', 0x50, {{0x0, 0x0, 0x0, 0x0, 0x0, "339ebc4bb0c0fba43162d5c302d891b307544d821a0dcb492ba4aa23baaca6e53f392b79c58e0581db804208237c3df1c60b6b34da2747cd3200fbb384511226"}}}}]}, {0x0, '\x00', 0x1, 0xffffffffffffffff}, {0x0, '\x00', 0x1, 0xffffffdffffffffc}]}, 0x428) 01:51:38 executing program 2: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40087602, &(0x7f00000007c0)) 01:51:38 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}) ioctl$PIO_FONT(r0, 0x4b61, &(0x7f0000000080)="2dd82a36279c1bc0259b672f16c1f98e9ba64ae900cc6e7cf8ecf1ad76def4011ad6191b9bd464cd0fab2d37b4478c5623500731adaf97d0381b15f7e4f305733d3d898c57e32d64573a6f581dcbc9eff4038ed25bfd815c596d1021e7b47ab75d8bfe130db64ee5a4394e5602b42ec25073c37673c9a627cf8703866939c488a56b9ada1cd2459a7289a0715ab96e7bdf1c07509cfa8c") ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x3fe) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000000000045, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000140)="2f65786500000000000409004bddd9de91be10eebf000ee9a90f79805854fa07424adee901d2da75af1f0200f5ab26d7a071fb35331ce39c5a") ioctl$TIOCCONS(r1, 0x541d) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x102, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000000, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1ffffffffffffe, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgid(0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffd000/0x3000)=nil, 0x3000}, &(0x7f00000000c0)=0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000680)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000640)={0xffffffffffffffff}, 0x111, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f00000006c0)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x10000, @empty, 0x7}, r3}}, 0x30) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0xca, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x5}, 0xc) 01:51:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xc) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:38 executing program 0: 01:51:38 executing program 4: [ 256.262772] xt_bpf: check failed: parse error 01:51:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:38 executing program 2: 01:51:38 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000180)="0501000a0200000066000000c9030000ec06000b8300004df700002100000000002000000043000000010000000000006e5fbe5a0000ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000040)={[{@user_xattr='user_xattr'}, {@dioread_lock='dioread_lock'}, {@stripe={'stripe'}}]}) 01:51:38 executing program 4: r0 = open(&(0x7f000000fffa)='./bus\x00', 0x141042, 0x0) ioctl$EXT4_IOC_RESIZE_FS(r0, 0x40086607, &(0x7f00000007c0)) 01:51:38 executing program 2: 01:51:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) [ 256.441152] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (553648375 log_block_size) 01:51:38 executing program 0: 01:51:38 executing program 4: 01:51:38 executing program 2: [ 256.607181] EXT4-fs (loop1): Unsupported filesystem blocksize 0 (553648375 log_block_size) 01:51:38 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xc) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 01:51:38 executing program 0: 01:51:38 executing program 1: 01:51:38 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "b891695275ea3bee16e0da11d2abd79b0589de92312499a594f9045fe1c20ed3"}) 01:51:38 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:39 executing program 1: 01:51:39 executing program 0: 01:51:39 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 01:51:39 executing program 0: 01:51:39 executing program 1: 01:51:39 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xc) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:39 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "b891695275ea3bee16e0da11d2abd79b0589de92312499a594f9045fe1c20ed3"}) 01:51:39 executing program 0: 01:51:39 executing program 1: 01:51:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, 0x0, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:39 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:39 executing program 0: 01:51:39 executing program 1: 01:51:39 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, 0x0, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:39 executing program 1: 01:51:39 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:39 executing program 0: 01:51:40 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xc) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) 01:51:40 executing program 2: 01:51:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, 0x0, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:40 executing program 1: 01:51:40 executing program 0: 01:51:40 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:40 executing program 0: 01:51:40 executing program 2: 01:51:40 executing program 1: 01:51:40 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r1, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:40 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:40 executing program 1: perf_event_open(&(0x7f0000aaa000)={0x2, 0x245, 0x85a, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="5500000018007f5300fe01b2a4a280930a60000000a84302910000003900090035000c00020000000d000500000000000000c78b800823090000009d566885b167320b00dc1338d54400009b84136ef75afb83de44", 0x55}], 0x1, &(0x7f0000000080)}, 0x0) [ 258.343124] IPv6: NLM_F_REPLACE set, but no existing node found! [ 258.370934] IPv6: NLM_F_REPLACE set, but no existing node found! 01:51:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xc) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) 01:51:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f00000002c0)='net/fib_triestat\x00') socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/181, 0xb5}], 0x1) 01:51:41 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) writev(r0, &(0x7f000051c000)=[{&(0x7f0000000040)="480000001400190d09004beafd0d8c560a843a0080ffe00600000000000000a2bc5603ca00000f7f89000000200012000101ff0000fa0209ff5bffff8ff600c7e5ed5e0000000009", 0x48}], 0x1) 01:51:41 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r1, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:41 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:41 executing program 1: r0 = socket(0x80000000000000a, 0x10000000002, 0x0) r1 = socket$inet6(0xa, 0x803, 0x4) ioctl(r1, 0x1000008912, &(0x7f0000000140)="f5acf06bbb13855b718070") connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={[0xfeffffff], [], @loopback}}, 0x1c) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@loopback, @in6=@remote}}, {{@in6=@local}, 0x0, @in=@loopback}}, 0xe8) 01:51:41 executing program 0: 01:51:41 executing program 1: 01:51:41 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r1, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:41 executing program 2: 01:51:41 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:41 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x7, 0x3, 0x1000002}, 0x2c) 01:51:41 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xc) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) 01:51:41 executing program 1: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) open(&(0x7f0000000000)='./file0\x00', 0x40041, 0x0) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/ip6_tables_names\x00') sendfile(r0, r1, &(0x7f0000000100), 0x82) 01:51:41 executing program 0: r0 = socket$inet6(0xa, 0x40000000003, 0x4000200000087) recvmmsg(r0, &(0x7f0000000900)=[{{&(0x7f00000005c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000840), 0x0, &(0x7f00000008c0)=""/24, 0x18, 0x300000}}], 0x1, 0x10000, &(0x7f0000000980)={0x77359400}) sendto(r0, &(0x7f00000001c0)="f996947927cf", 0x6, 0x0, &(0x7f0000000140)=@nl=@unspec, 0x80) 01:51:41 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r1, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:41 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_targets\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='comm\x00') sendfile(r1, r0, &(0x7f0000000240), 0x239fffffffffffb) readv(r1, &(0x7f0000000440)=[{&(0x7f0000000080)=""/226, 0xe2}], 0x1) 01:51:41 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:42 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x20, 0x10, 0x601}, 0x20}}, 0x0) 01:51:42 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r1, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:42 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000008000)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x30, &(0x7f0000678f70)={0x1, {{0x2, 0x0, @multicast2}}}, 0x90) 01:51:42 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:42 executing program 2: clone(0x2102001ffb, 0x0, 0xfffffffffffffffe, &(0x7f0000000140), 0xffffffffffffffff) r0 = socket$inet6(0xa, 0x80001, 0x0) getsockopt$bt_hci(r0, 0x0, 0x60, &(0x7f00001e3000)=""/30, &(0x7f0000d23000)=0x44) 01:51:42 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r1, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:42 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xc) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:42 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r1, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:42 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000100)={0x0, 0x0, 0x0, {}, {}, @period}) 01:51:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$clear(0x7, r1) 01:51:42 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:42 executing program 0: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000003c0)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) creat(&(0x7f0000000040)='./bus\x00', 0x0) 01:51:42 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r1, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:43 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r1, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:43 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000001440)={&(0x7f0000000000), 0xc, &(0x7f0000001400)={&(0x7f0000001300)=@newpolicy={0xb8, 0x13, 0x20d, 0x0, 0x0, {{@in6=@remote, @in6=@ipv4={[], [], @remote}}}}, 0xb8}}, 0x0) 01:51:43 executing program 1: r0 = socket$inet6(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000000)=@nl, 0x80, &(0x7f00000000c0)=[{&(0x7f00000001c0)="5500000018007f5300fe01b2a4a280930a60000000a84302910000003900090035000c00020000000d000500000000000000c78b800823090000009d566885b167320b00dc1338d54400009b84136ef75afb83de44", 0x55}], 0x1, &(0x7f0000000240)=[{0x18, 0x11d, 0x101, 'V'}], 0x18}, 0x0) 01:51:43 executing program 2: [ 261.052918] IPv6: NLM_F_REPLACE set, but no existing node found! 01:51:43 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xc) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:43 executing program 1: 01:51:43 executing program 2: 01:51:43 executing program 0: 01:51:43 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r1, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:43 executing program 0: 01:51:43 executing program 1: 01:51:43 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r1, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:43 executing program 2: 01:51:43 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:43 executing program 0: 01:51:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0xc) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:44 executing program 2: 01:51:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:44 executing program 0: 01:51:44 executing program 1: 01:51:44 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:44 executing program 1: 01:51:44 executing program 2: 01:51:44 executing program 0: 01:51:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:44 executing program 2: 01:51:44 executing program 1: 01:51:44 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:44 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:44 executing program 0: 01:51:44 executing program 2: 01:51:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:44 executing program 1: 01:51:44 executing program 2: 01:51:44 executing program 0: 01:51:44 executing program 1: 01:51:44 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:44 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:44 executing program 0: 01:51:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:45 executing program 2: 01:51:45 executing program 1: 01:51:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:45 executing program 0: 01:51:45 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:45 executing program 1: 01:51:45 executing program 0: 01:51:45 executing program 2: 01:51:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:45 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:45 executing program 0: 01:51:45 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:45 executing program 1: 01:51:45 executing program 2: 01:51:45 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d024031") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:45 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:45 executing program 0: 01:51:45 executing program 0: 01:51:45 executing program 2: 01:51:45 executing program 1: r0 = socket$inet(0x2, 0xa, 0x0) getsockname(r0, &(0x7f0000000080)=@can, &(0x7f0000000100)=0x80) 01:51:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d024031") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:46 executing program 0: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000000)) 01:51:46 executing program 2: 01:51:46 executing program 1: 01:51:46 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d024031") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:46 executing program 2: 01:51:46 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200), &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:46 executing program 0: 01:51:46 executing program 1: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) accept4$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @local}, &(0x7f0000000440)=0x1c, 0x0) r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000240)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 01:51:46 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGKEYCODE_V2(r0, 0x80284504, &(0x7f0000000140)=""/181) 01:51:46 executing program 0: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"766574000000000000000000bd6800", 0x43732e5398417f1a}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000100)) 01:51:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d024031628571") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:46 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:46 executing program 0: pipe(&(0x7f00003fe000)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) tee(r0, r2, 0x80007385, 0x0) r3 = dup2(r1, r2) ioctl$int_in(r3, 0x5452, &(0x7f0000e35ff8)=0x45) r4 = getpgrp(0x0) fcntl$setown(r1, 0x8, r4) fcntl$setsig(r2, 0xa, 0x12) r5 = gettid() tkill(r5, 0x100000000000016) 01:51:46 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d024031628571") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:46 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x8) 01:51:46 executing program 4: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:46 executing program 2: r0 = socket(0x10, 0x4000000000002, 0x0) ioctl$sock_ifreq(r0, 0x89f7, &(0x7f0000000140)={"736974300027850000f300e000000e02", @ifru_ivalue}) 01:51:47 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:47 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000440)='./file0\x00', 0x0) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0xfffffcfb) ioctl$sock_netdev_private(0xffffffffffffffff, 0x0, &(0x7f0000001700)) mount(&(0x7f0000000040), &(0x7f0000000240)='./file0\x00', &(0x7f0000000180)='jffs2\x00', 0x201000, &(0x7f00000002c0)) pivot_root(&(0x7f0000001380)='./file0\x00', &(0x7f00000016c0)='./file0\x00') 01:51:47 executing program 1: memfd_create(&(0x7f0000000200)="907070703076626f786e6574305d47504c6e6f6465762a707070317d70726f63656d30656d3000", 0x0) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) add_key(&(0x7f0000000880)="6b657972696e670036f9126c12054f5c0e18c6522573dd79f1a0a3a60957d6c729ad856cd8f0df9c04d18e57904b1c05209dee12f5ccc12d98a70037673436610faac88bcf9681918789c2ad473665984b17868d9c5e90813e9ec1f73fdebf5638f9c01f8821f1f78ebac984e3852ee10000000000000000000000", &(0x7f0000000840)={'syz'}, &(0x7f00000002c0), 0x1d3, 0xfffffffffffffffd) request_key(&(0x7f00000003c0)='user\x00', &(0x7f0000000080)={'syz'}, &(0x7f0000000380)="d13ff3d776", 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)={@multicast2, @local}, 0x8) 01:51:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d024031628571") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:47 executing program 4: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:47 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x257, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x24}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x25) socketpair(0x0, 0x5, 0x0, &(0x7f0000000740)) 01:51:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240), 0x4) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) ioctl$EVIOCSABS3F(0xffffffffffffffff, 0x401845ff, &(0x7f0000000000)) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x102012, r0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000300)) 01:51:47 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d02403162857170") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:47 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000480)='net/igmp\x00') preadv(r0, &(0x7f0000001200)=[{&(0x7f0000000040)=""/33, 0x21}, {&(0x7f0000000100)=""/104, 0x68}], 0x2, 0x0) 01:51:47 executing program 4: syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) ioctl$EVIOCGPHYS(0xffffffffffffffff, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:47 executing program 2: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) 01:51:47 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r1, &(0x7f0000f6fff0)={0x2, 0x4e23, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x100000000009) accept(r1, &(0x7f0000001240)=ANY=[], &(0x7f0000123000)) 01:51:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d02403162857170") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r1, &(0x7f0000f6fff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) listen(r1, 0x100000000009) accept(r1, &(0x7f0000001240)=ANY=[], &(0x7f0000123000)) 01:51:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d02403162857170") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="02030609100000000000004c9e0000000200aa0802000000000000000000000105000600200000000a00000000000000000500e50000070000001f000000000000250000000000000200010000000000000000020000627c05000500000000000a00000000000000ff1700000000000000000000000001170000000000000000"], 0x80}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x2, 0xa, 0x0, 0x0, 0x2}, 0x10}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x400000000000117, 0x0) 01:51:48 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89b0, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000080)=ANY=[]}) [ 266.220095] IPVS: ftp: loaded support on port[0] = 21 01:51:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d02403162857170") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:48 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000240)={0x7, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) 01:51:48 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000280)={@in={{0x2, 0x0, @local}}, 0x0, 0x1, 0x0, "d36aff30180e339f394d92fe09b72f46a103b0bfbbf03bd112551cef5389f8cea8bcad9523f5d3353e2c4e0d64ab44bb7098e31a5b63ee7eddb869e2f9bb096d1a0c0a00e5503266e68d4bb49052186b"}, 0xd8) 01:51:48 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:48 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4000000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPROP(r0, 0x80404509, &(0x7f0000000200)=""/223) 01:51:48 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:49 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000180)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f00000002c0)) 01:51:49 executing program 4: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="00000004ac1414bb0100000003000000ac1414bb73000001ac1414bb"], 0x1) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) 01:51:49 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) io_setup(0xa3c, &(0x7f0000409000)=0x0) read$eventfd(r1, &(0x7f0000000140), 0x8) io_submit(r2, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000042000), 0x0, 0x0, 0x0, 0x1, r1}]) 01:51:49 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, "b891695275ea3bee16e0da11d2abd79b0589de92312499a594f9045fe1c20ed3"}) 01:51:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000080)={0x6, 0x4, 0x20000000007ffd, 0x7d, 0x0, 0xffffffffffffffff, 0x0, [0x0, 0x0, 0x0, 0x400100]}, 0x2c) [ 268.422593] device bridge_slave_1 left promiscuous mode [ 268.428789] bridge0: port 2(bridge_slave_1) entered disabled state [ 268.475362] device bridge_slave_0 left promiscuous mode [ 268.480822] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.493007] team0 (unregistering): Port device team_slave_1 removed [ 270.503718] team0 (unregistering): Port device team_slave_0 removed [ 270.515411] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 270.556071] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 270.618206] bond0 (unregistering): Released all slaves [ 270.714782] bridge0: port 1(bridge_slave_0) entered blocking state [ 270.721228] bridge0: port 1(bridge_slave_0) entered disabled state [ 270.728298] device bridge_slave_0 entered promiscuous mode [ 270.757391] bridge0: port 2(bridge_slave_1) entered blocking state [ 270.763918] bridge0: port 2(bridge_slave_1) entered disabled state [ 270.770851] device bridge_slave_1 entered promiscuous mode [ 270.816042] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 270.860301] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 270.993940] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 271.042186] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 271.282902] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 271.290358] team0: Port device team_slave_0 added [ 271.333715] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 271.341142] team0: Port device team_slave_1 added [ 271.386740] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 271.435424] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 271.483529] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 271.490679] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 271.507741] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 271.547350] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 271.964843] bridge0: port 2(bridge_slave_1) entered blocking state [ 271.971242] bridge0: port 2(bridge_slave_1) entered forwarding state [ 271.977965] bridge0: port 1(bridge_slave_0) entered blocking state [ 271.984387] bridge0: port 1(bridge_slave_0) entered forwarding state [ 271.992358] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 272.721999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 272.993313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 273.085594] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 273.176036] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 273.182374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 273.189363] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 273.282252] 8021q: adding VLAN 0 to HW filter on device team0 01:51:55 executing program 0: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCGPHYS(r0, 0x80404507, &(0x7f0000000100)=""/4096) 01:51:55 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:55 executing program 1: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x4000000000001, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) ioctl$EVIOCGMTSLOTS(r0, 0x8040450a, &(0x7f0000000140)=""/162) 01:51:55 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) r1 = syz_open_procfs(0x0, &(0x7f0000005880)='attr/keycreate\x00') ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0x0, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "7b3177f4fc2eb04172daa8fdd1c4c4cf144a23173b6605afb888de7e07195d78f7ddd19a3782fba5bf4af44acfe05900000053c40600", "ee52c10d1e72a9432c222982fcccff747a3131991a00000000000004002000"}) 01:51:55 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:55 executing program 2: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) 01:51:55 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu\x00', 0x200002, 0x0) fchdir(r1) r2 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000000140)={0x0, 0x8000005}) 01:51:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:56 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000080)='/dev/loop#\x00', 0x0, 0x82) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffd, "e1d3f877e5eae453e55d7d64d00d4901baed21f7de92a8669b38ccd6260857dbf5ae46354569636517b50f805ae208258dbb7d0abe8d208f0f1bcc885c8ba93c", "7b3177f4fc2eb04172daa8fdd1c4c4cf144a23173b6605afb888de7e07195d78f7ddd19a3782fba5bf4af44acfe05900000053c40600", "ee52c10d1e72a9432c222982fcccff747a3131991a00000000000004002000"}) 01:51:56 executing program 4: 01:51:56 executing program 2: 01:51:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:56 executing program 0: 01:51:56 executing program 2: 01:51:56 executing program 4: 01:51:56 executing program 0: 01:51:56 executing program 4: 01:51:56 executing program 1: 01:51:56 executing program 2: 01:51:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, 0x0, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:56 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r5+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r4, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:56 executing program 0: 01:51:56 executing program 4: 01:51:56 executing program 2: 01:51:56 executing program 1: 01:51:56 executing program 0: 01:51:56 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, 0x0, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:56 executing program 4: 01:51:56 executing program 1: 01:51:57 executing program 2: 01:51:57 executing program 0: 01:51:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, 0x0, 0x103, 0x0, 0x0, {}, [{{0x8, 0x1, r2}, {0x4}}]}, 0x20}}, 0x0) 01:51:57 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r3, 0xc0505350, &(0x7f0000000140)={{}, {0x80}}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:57 executing program 1: 01:51:57 executing program 4: 01:51:57 executing program 2: 01:51:57 executing program 0: 01:51:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x0, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:57 executing program 4: 01:51:57 executing program 0: 01:51:57 executing program 1: 01:51:57 executing program 2: 01:51:57 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x0, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:57 executing program 0: 01:51:58 executing program 4: 01:51:58 executing program 1: 01:51:58 executing program 2: 01:51:58 executing program 0: 01:51:58 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x0, 0x0, 0x0, {}, [{{0x8, 0x1, r3}, {0x4}}]}, 0x20}}, 0x0) 01:51:58 executing program 2: 01:51:58 executing program 4: 01:51:58 executing program 0: 01:51:58 executing program 1: 01:51:58 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x14, r2, 0x103}, 0x14}}, 0x0) 01:51:58 executing program 1: 01:51:58 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f0000000080)={@multicast1, @remote, 0x3}, 0x10) 01:51:58 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) flistxattr(r0, &(0x7f00000000c0)=""/4, 0x4) 01:51:58 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000280)='/dev/sg#\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x2000) 01:51:58 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_targets\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)='comm\x00') sendfile(r1, r0, &(0x7f0000000240)=0x7d, 0x239fffffffffffb) 01:51:59 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:51:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x14, r2, 0x103}, 0x14}}, 0x0) 01:51:59 executing program 0: 01:51:59 executing program 1: 01:51:59 executing program 4: 01:51:59 executing program 2: syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff89, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 01:51:59 executing program 4: socket$inet6(0xa, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000600)={'ip_vti0\x00', 0x201e}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'ip_vti0\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000140)={@ipv4={[], [], @remote}, 0x0, r3}) sendto(r1, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)=@generic={0xa, "a268d051afbb30b9923e133c4f56259c85a08979aa34c5e1f0eb820d62d5b0cc4faf74f741cba4496bcce0b430f1a59cf4b0969164bfc3019718e2cecf7aea450e50c1f6c3411889c8b9aefdcf069642a4897d1ae6f8749697df253a8bcfae046f8b9741ca762548255274875d3f737894f8e5c23221b0087c41ad03467a"}, 0x80) 01:51:59 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8921, &(0x7f0000000300)={'ip6gretap0\x00', @ifru_addrs=@ethernet}) 01:51:59 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x27, &(0x7f00000002c0)={@multicast2, @loopback}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x25, &(0x7f00003fdff5)={@multicast2, @loopback, @loopback}, 0xc) 01:51:59 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x14, r2, 0x103}, 0x14}}, 0x0) 01:51:59 executing program 2: r0 = socket$inet6(0xa, 0x40000000000803, 0x44) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0a5c2d023c126285718070") r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreq(r1, 0x0, 0x23, &(0x7f0000000080)={@multicast1, @remote}, 0x8) 01:51:59 executing program 0: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) write$binfmt_elf64(r0, &(0x7f0000000080)=ANY=[], 0xffdbc2ca) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file1/file0\x00') clone(0x210007fb, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) lsetxattr(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)=@known='system.posix_acl_default\x00', &(0x7f0000000080)='GPL\x00', 0x4, 0x0) 01:52:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 01:52:00 executing program 2: clone(0x802102001ffd, 0x0, 0xfffffffffffffffe, &(0x7f0000000040), 0xffffffffffffffff) io_setup(0x5ef6, &(0x7f0000000200)=0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) getresuid(&(0x7f00000001c0), &(0x7f00000003c0), &(0x7f0000000400)) io_destroy(r0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='clear_refs\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') eventfd2(0x0, 0x0) exit(0x0) sendfile(r1, r2, &(0x7f0000000080), 0x1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000580)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000540), 0xc, &(0x7f0000000680)={&(0x7f00000005c0)={0x20, 0x0, 0x200, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_SERVICE={0x4}]}, 0x20}}, 0x0) ioctl$SG_GET_REQUEST_TABLE(r2, 0x2286, &(0x7f0000000240)) 01:52:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_targets\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000000)="6f6f6d5f73636f72655f61646a00d08cab235bc0bb9a919ea65580149e1c25274dd238483f2446622038bd57dd13b20bafe3fba5789d4dfc0b9b15e1d309fe") sendfile(r1, r0, &(0x7f0000000240)=0x5d, 0x239fffffffffffb) 01:52:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb, 0x82000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x14) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000540)={r0, &(0x7f0000000340), &(0x7f0000000440)=""/196}, 0x18) 01:52:00 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x3, 0x3, 0x2fc40501}, 0x2c) 01:52:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 01:52:00 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000fc7000)={0x5, 0x7, 0x3, 0x2}, 0x2c) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000140)={r0, &(0x7f0000000040), &(0x7f00000000c0)=""/55}, 0x18) 01:52:00 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@dev, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 01:52:00 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) semget$private(0x0, 0x0, 0x0) semctl$SEM_STAT(0x0, 0x0, 0x12, &(0x7f0000001500)=""/22) 01:52:00 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f0000001a00)="0a5c2d0240316285717070") r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f000000dc40)={'team0\x00'}) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f000000e640)={&(0x7f0000000000), 0xc, &(0x7f000000e600)={&(0x7f000000dd40)={0x20, r2, 0x103, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 01:52:00 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000400)='/dev/input/event#\x00', 0x0, 0x20000002) write$evdev(r0, &(0x7f0000057fa0)=[{}, {}], 0xfffffd24) ioctl$EVIOCSKEYCODE_V2(r0, 0x40284504, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, "2524200cb67d3f37438fbf035a116bb209e1f0136b0020cd9af6ec7fa07273b6"}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x0, 0x8031, 0xffffffffffffffff, 0x0) 01:52:00 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') readv(r2, &(0x7f0000000840)=[{&(0x7f0000000440)=""/56, 0x38}, {&(0x7f00000007c0)=""/36, 0x24}, {&(0x7f0000000800)=""/14, 0xe}], 0x3) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:00 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x2, &(0x7f00000000c0)=@raw=[@exit], &(0x7f0000000080)='GPL\x00', 0xfffffffffffffffc, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) 01:52:00 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) syz_open_procfs(0x0, &(0x7f0000000100)='sched\x00') r1 = perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r1) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f0000000580)="6f6f6d5f73636f72655f61646a009fc5720e384adb40f8bf6a31e8ce88025eb2f468545232f1891e7e6d19c96c475e6c136337f7247f3f393e62e82f3cdb6a3e3ad91004721815dc2910493cd03a0f18ec00c2778a3043f8a9ea61168ce643f5cbdc1cea609ce18edd8eaa1ff4afa35abf174d1affb18d505d3c9ee1425b79e6aee949db299bcba3576c74e9a9fcf8def05d0aa553161d6888c5eacfca35d22e93fd09902368710d9b3b83dd0f738012c68e7ed4efc73aee346375b203d5d529c9f12fea955f27fbb9a934ca9ef3fbc9d67ed5b77d42e52e86bfbb23b9f74eb3fe3f78cc585e16627a228aa4351074bbb7caa7ccde5fdcabf2b8c7b3d32624bb348109bbe3bf42286c6ebce9453c36248f29b01ac9e318a6d97a6b945aed96ade25ccb2c21130d762972f10045cc636772bfd475429fa58c38e4440fd356746489c85614173dd9cf2ac8c7b7cc18322f4a6d8c359314fd0227e3c9127ec310b7c7aecf4182337cfdba32bdc62de0455f78c7698d56d95c5f6cfbd878582e4e9b6491d5c1a1ba684c957746137bfdc8541fe1296807e8576e5de4") sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x0) sendfile(r0, r2, &(0x7f0000000080), 0x82) 01:52:00 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb, 0x82000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x14) 01:52:00 executing program 0: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0x8000, &(0x7f0000000040)=0x0) io_cancel(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000000240)) io_setup(0x0, &(0x7f00000001c0)) 01:52:00 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000100)='loginuid\x00') fchown(r0, 0x0, 0x0) ftruncate(r0, 0x0) 01:52:00 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xa) r1 = syz_open_procfs(0x0, &(0x7f0000000a80)="2f657865000000d400042a004bddd9de91be10eebf00f5e94aae22e89bb36cc7457accc3320c67a90f79805843e901d2da75af1f000000000000000045cc6158f031528844209c7ed05b160ef336721bf89686ff472f71dfca5353f6323ddf8006ffc1052d6a80985adc68017065648b35c7d321fc5c0466062fbfad5acbe7ff6cefe53c88c05ab970ceebdfa589098ad40d080deb2488f9e4069682b14483f113cb6979b2f390179a18e26b409307f31ed04a0a681f002e007436947475ab073711c98ae3b4259f1a1aff9b09aa66cb90ca43a1dbc6de15abb4ae739f9e8f047cd29ec76b9ef6beb7839f8071aaea4d247e6a9514748c93d0bb01a7c37ca6c856327af81f296d2c2c07c2d63b87d95e3d276ca6d608557fd69b9f8b30ab4eea4557181c0e72d9804ac668ac3935d8a9845f7de58cee0e918d90f659c8f66c303bf7bcc2b835840707ee0a73257f17d97b69a13f58453fee4129e7") ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000003c0)=""/110) setsockopt$inet_int(r1, 0x0, 0x27, &(0x7f0000000200)=0x100000001, 0x4) sendfile(r0, r1, &(0x7f0000000040)=0x100d00, 0x100000001) r2 = accept4$packet(0xffffffffffffffff, &(0x7f000000c640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000c680)=0x14, 0x0) keyctl$join(0x1, &(0x7f00000001c0)={'syz', 0x3}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) 01:52:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") writev(0xffffffffffffffff, &(0x7f0000003440), 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0x12}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getresgid(&(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) 01:52:01 executing program 1: r0 = gettid() r1 = syz_open_procfs(r0, &(0x7f00000002c0)='ns\x00') exit(0x0) getdents(r1, &(0x7f0000000040)=""/114, 0xab) 01:52:01 executing program 2: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rtc\x00', 0x0, 0x0) ioctl$RTC_WKALM_SET(r0, 0x4028700f, &(0x7f0000000000)={0x1, 0x0, {0x0, 0x0, 0x0, 0x12, 0x0, 0x80}}) 01:52:01 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89a3, &(0x7f0000000000)={'bridge0\x00', &(0x7f0000000080)=ANY=[]}) [ 279.120775] rtc_cmos 00:00: Alarms can be up to one day in the future 01:52:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_INFO(r2, 0x0, 0x40, &(0x7f0000000000)={'raw\x00'}, &(0x7f0000000080)=0x54) bind$bt_hci(r1, &(0x7f0000000040), 0x58) 01:52:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:01 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x10, 0x3, 0xa) r1 = syz_open_procfs(0x0, &(0x7f0000000a80)="2f657865000000d400042a004bddd9de91be10eebf00f5e94aae22e89bb36cc7457accc3320c67a90f79805843e901d2da75af1f000000000000000045cc6158f031528844209c7ed05b160ef336721bf89686ff472f71dfca5353f6323ddf8006ffc1052d6a80985adc68017065648b35c7d321fc5c0466062fbfad5acbe7ff6cefe53c88c05ab970ceebdfa589098ad40d080deb2488f9e4069682b14483f113cb6979b2f390179a18e26b409307f31ed04a0a681f002e007436947475ab073711c98ae3b4259f1a1aff9b09aa66cb90ca43a1dbc6de15abb4ae739f9e8f047cd29ec76b9ef6beb7839f8071aaea4d247e6a9514748c93d0bb01a7c37ca6c856327af81f296d2c2c07c2d63b87d95e3d276ca6d608557fd69b9f8b30ab4eea4557181c0e72d9804ac668ac3935d8a9845f7de58cee0e918d90f659c8f66c303bf7bcc2b835840707ee0a73257f17d97b69a13f58453fee4129e7") ioctl$ASHMEM_GET_NAME(r1, 0x81007702, &(0x7f00000003c0)=""/110) setsockopt$inet_int(r1, 0x0, 0x27, &(0x7f0000000200)=0x100000001, 0x4) sendfile(r0, r1, &(0x7f0000000040)=0x100d00, 0x100000001) r2 = accept4$packet(0xffffffffffffffff, &(0x7f000000c640)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f000000c680)=0x14, 0x0) keyctl$join(0x1, &(0x7f00000001c0)={'syz', 0x3}) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r2, 0x6612) 01:52:01 executing program 2: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'veth0_to_bridge\x00', &(0x7f0000000940)=ANY=[@ANYBLOB="4b0000000f00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000"]}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP_VS_SO_SET_ZERO(r0, 0x0, 0x48f, &(0x7f0000000040)={0xff, @dev={0xac, 0x14, 0x14, 0xb}, 0x4e24, 0x4, 'wlc\x00', 0xa, 0x378c, 0x60}, 0x2c) recvfrom(r1, &(0x7f0000000200)=""/159, 0x9f, 0x40, &(0x7f00000002c0)=@l2={0x1f, 0x3, {0x8, 0x400, 0x3, 0x7, 0xf7, 0x9}, 0x7, 0x9}, 0x80) ioctl(r1, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x100008912, &(0x7f00000002c0)="025cc80700145f8f764070") ioctl(0xffffffffffffffff, 0x8912, &(0x7f0000000280)="025cc83d6d345f8f762070") r3 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000980)=ANY=[@ANYBLOB="680000001235ea129e87503569e4998bd13538fabb5937653d5ffcbf2340597ac0f66e633e3ef2e28f7d81e08dc96e46d3c56be574c682a34e7c192e8fbed8456ca2aa7a7151cd699c881324375db03b04a01281f24f369526115777eac61335901462a366cccd33893180f9"], &(0x7f0000000bc0)=0x1) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000a00)={0x4, 0x4, 0x8, 0x81}, &(0x7f0000000a40)=0x10) socketpair(0x2, 0x6, 0x4, &(0x7f0000000a80)={0xffffffffffffffff}) syz_genetlink_get_family_id$nbd(&(0x7f0000000b00)='nbd\x00') openat$cgroup_ro(r3, &(0x7f0000000b40)='cpuacct.stat\x00', 0x0, 0x0) accept(r3, 0x0, &(0x7f0000000b80)) sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000c40)={&(0x7f0000000ac0)={0x10, 0x0, 0x0, 0x40010}, 0xc, &(0x7f0000000c00)={&(0x7f0000000000)=ANY=[@ANYBLOB="0c00fe06dfe0bff69bcf0da8c6020006000000fb656bbc3359cb58f2cf0b5f000000000c"], 0x1}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x4e21}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e24, 0x35, @ipv4, 0x9}, @in={0x2, 0x4e20, @remote}], 0x5c) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) socketpair$inet6_udp(0xa, 0x2, 0x0, &(0x7f0000000940)) socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x7bbd, &(0x7f0000000cc0)="0000000000b50000f400000012a4943a8e8d01b7956a7bd799c125b4a9e566f6e10e0b780c6ad30274cd27fdda94d598e47e93e0e79812437b224eaf540d50fdd5b98bab4936d19dc208ac514794") bind$inet(r3, &(0x7f0000134000)={0x2, 0x4e23, @broadcast}, 0x10) connect$inet(r3, &(0x7f00000e5000)={0x2, 0x4e23, @loopback}, 0x10) 01:52:01 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$nl_netfilter(0x10, 0x3, 0xc) poll(&(0x7f0000007300)=[{r1}], 0x1, 0x80) close(r1) [ 279.282532] IPVS: set_ctl: invalid protocol: 255 172.20.20.11:20004 01:52:01 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000000040)="480000001400190d09004beafd0d8c560a843a0080ffe00600000000000000a2bc5603ca00000f7f89000000200012000101ff0000fa0209ff5bffff8ff600c7e5ed5e0000000009", 0x48}], 0x1) 01:52:01 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000001880)={0x0, 0x0, 0x0, 0x8, 0x40}, &(0x7f00000018c0)=0x14) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f0000001900), 0x4) 01:52:01 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={"6e7230010100", 0x2}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000100)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff010}, {0x16}]}) [ 279.379523] IPVS: set_ctl: invalid protocol: 255 172.20.20.11:20004 01:52:01 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000800)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) write$cgroup_int(r2, &(0x7f0000000980), 0xffffff4d) recvmsg$kcm(r1, &(0x7f00000005c0)={&(0x7f0000000240)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80, &(0x7f0000000540)=[{&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000003c0)=""/107, 0x6b}], 0x2, &(0x7f0000000180)=""/15, 0xf}, 0x2) [ 279.480587] sctp: [Deprecated]: syz-executor4 (pid 8638) Use of int in maxseg socket option. [ 279.480587] Use struct sctp_assoc_value instead [ 279.565765] sctp: [Deprecated]: syz-executor4 (pid 8648) Use of int in maxseg socket option. [ 279.565765] Use struct sctp_assoc_value instead 01:52:01 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x40000000003, 0x4000200000087) setsockopt$inet6_opts(r1, 0x29, 0x37, &(0x7f0000000040), 0x8) sendto(r1, &(0x7f00000001c0)="f996947927cf", 0x6, 0x0, &(0x7f0000000140)=@nl=@unspec, 0x80) 01:52:01 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="1c4000000000000008001e00000000002c001200080001007369740020000200080009002900000014000300ff010000000000000000000000000001"], 0x1}}, 0x0) 01:52:01 executing program 4: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000080)="120000001600e70d017b00000000008e1584", 0x12, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000340)={&(0x7f0000000200)=@can, 0x80, &(0x7f0000000180), 0x0, &(0x7f0000000980)=""/4096, 0x1000}, 0x0) 01:52:01 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg(r0, &(0x7f0000000140)=[{{&(0x7f0000000280)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000080), 0x0, &(0x7f0000000540)=[{0x10, 0x1, 0x1000}], 0x10}}], 0x1, 0x0) 01:52:01 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:02 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={&(0x7f0000de2ff4), 0xc, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000000301ff07008fbda33d88c000001018dd"], 0x14}}, 0x0) recvmmsg(r0, &(0x7f0000004d00)=[{{&(0x7f0000000100), 0x80, &(0x7f00000007c0), 0x0, &(0x7f0000000800)=""/24, 0x18}}], 0x1, 0x0, &(0x7f0000000c40)={0x0, 0x989680}) 01:52:02 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@rc={0x1f, {}, 0x86}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x24}) r0 = syz_open_procfs(0x0, &(0x7f0000000640)='ns\x00') ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000001ac0)={0x34, 0x0, &(0x7f0000001a80)}) getdents(r0, &(0x7f0000000040)=""/46, 0x25) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 01:52:02 executing program 1: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@pptp={0x18, 0x2, {0x0, @multicast1}}, 0x80, &(0x7f0000000980), 0x257, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x24}) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x25) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 01:52:02 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@rc={0x1f, {}, 0x86}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000000c0)}, 0x0) openat$rtc(0xffffffffffffff9c, &(0x7f0000000600)='/dev/rtc0\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x24}) r0 = syz_open_procfs(0x0, &(0x7f0000000640)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x25) setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f00000019c0)='tls\x00', 0x4) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={@mcast1, @mcast2, @dev}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 01:52:02 executing program 5: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@rc, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x24}) r0 = syz_open_procfs(0x0, &(0x7f0000000640)='ns\x00') getdents(r0, &(0x7f0000000040)=""/46, 0x25) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 01:52:02 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@rc={0x1f, {}, 0x86}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x24}) r0 = syz_open_procfs(0x0, &(0x7f0000000640)='ns\x00') ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000001ac0)={0x34, 0x0, &(0x7f0000001a80)}) getdents(r0, &(0x7f0000000040)=""/46, 0x25) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 01:52:02 executing program 0: 01:52:02 executing program 1: socketpair$unix(0x1, 0x8000000001, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket(0x10, 0x20000000000003, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000180), 0xc, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001a0001020000000000000000000000808c8dbe2f79dd5fa71ab3cf6ea8b58dcd64f9be0283d8525e06de71fef40eedbb2008aeadf38f0d994b50e2d87780ca2a20e9cdc3797655bd2a1a630b3f32fee183e47e732067cc3d15a7b54b70bdfcc9d211cb3b55b0380c61522e49f0dfde961e892e82832fc940f90a90b5bca3526d9d71b3c2a1a72df8435340065b7a178f6ecf4b45083ee2f80fa4c7975718ea00a504000000d53bfad148b8e610ff1242acf2fa3d4a4d2f5c5e007660f71917b61417f6e83e0afbb47508fd5d74a395"], 0x1}}, 0x0) 01:52:02 executing program 5: 01:52:02 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@rc={0x1f, {}, 0x86}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x24}) r0 = syz_open_procfs(0x0, &(0x7f0000000640)='ns\x00') ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000001ac0)={0x34, 0x0, &(0x7f0000001a80)}) getdents(r0, &(0x7f0000000040)=""/46, 0x25) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 01:52:02 executing program 2: 01:52:02 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:02 executing program 5: 01:52:02 executing program 4: sendmsg(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000380)=@rc={0x1f, {}, 0x86}, 0x80, &(0x7f0000000000), 0x0, &(0x7f00000000c0)}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'dummy0\x00', 0x24}) r0 = syz_open_procfs(0x0, &(0x7f0000000640)='ns\x00') ioctl$ION_IOC_HEAP_QUERY(0xffffffffffffffff, 0xc0184908, &(0x7f0000001ac0)={0x34, 0x0, &(0x7f0000001a80)}) getdents(r0, &(0x7f0000000040)=""/46, 0x25) socketpair(0x1, 0x5, 0x0, &(0x7f0000000740)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x89f1, &(0x7f0000000080)='ip6tnl0\x00') 01:52:02 executing program 2: 01:52:02 executing program 0: 01:52:02 executing program 1: 01:52:02 executing program 5: 01:52:02 executing program 2: 01:52:02 executing program 5: 01:52:02 executing program 4: 01:52:02 executing program 1: 01:52:02 executing program 0: 01:52:03 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:03 executing program 2: 01:52:03 executing program 5: 01:52:03 executing program 1: 01:52:03 executing program 4: 01:52:03 executing program 0: 01:52:03 executing program 4: 01:52:03 executing program 2: 01:52:03 executing program 5: 01:52:03 executing program 0: 01:52:03 executing program 1: 01:52:03 executing program 5: 01:52:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:04 executing program 1: 01:52:04 executing program 0: 01:52:04 executing program 4: 01:52:04 executing program 2: 01:52:04 executing program 5: 01:52:04 executing program 4: 01:52:04 executing program 1: 01:52:04 executing program 0: 01:52:04 executing program 2: 01:52:04 executing program 5: 01:52:04 executing program 1: 01:52:04 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:04 executing program 5: 01:52:04 executing program 0: 01:52:04 executing program 4: 01:52:04 executing program 2: 01:52:04 executing program 1: 01:52:04 executing program 2: 01:52:04 executing program 4: 01:52:04 executing program 0: 01:52:04 executing program 1: 01:52:04 executing program 5: 01:52:04 executing program 5: 01:52:05 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:05 executing program 1: 01:52:05 executing program 4: 01:52:05 executing program 0: 01:52:05 executing program 2: 01:52:05 executing program 5: 01:52:05 executing program 2: 01:52:05 executing program 5: 01:52:05 executing program 4: 01:52:05 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) socketpair$inet(0x2, 0x0, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000010c0)="04719a66026c3cae0efd5158ea3eb143586904401dda4f9694db728058d23632a8c9d949fa50094370f28d401d3ebafbad835d9cc12b89e695d2a571f89e86fc23b93987d81aa421505cdfd16d12175240c9b1791c48", 0x56) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000040)=ANY=[], 0x7c774aac) mmap(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x300000a, 0x2011, r2, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000480)={0x0, 0x6, 0x0, 0x6}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000880)=@assoc_value={0x0, 0x10}, &(0x7f0000000440)=0x8) epoll_wait(r2, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], 0x5, 0x1) mmap(&(0x7f0000f44000/0x4000)=nil, 0x50707c, 0x1000006, 0x2013, r2, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000040)='fou\x00') bpf$OBJ_GET_PROG(0x7, &(0x7f0000000200)={&(0x7f00000001c0)='./file0\x00'}, 0x10) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)=0x800) syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') accept$packet(0xffffffffffffffff, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000400)=0x14) r3 = accept4(0xffffffffffffffff, &(0x7f0000000500)=@can, &(0x7f0000000580)=0x80, 0x80000) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f00000005c0)={{{@in=@local}}, {{@in6=@mcast2}, 0x0, @in6=@loopback}}, &(0x7f00000006c0)=0xe8) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000000700)={@dev, @loopback}, &(0x7f0000000740)=0xc) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000000780)={@local, @broadcast, 0x0}, &(0x7f00000007c0)=0xc) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000800)={@ipv4}, &(0x7f0000000840)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000280)={'vcan0\x00', r4}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000003c0)='memory.events\x00', 0x26e1, 0x0) 01:52:05 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) 01:52:05 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x15, 0x3, &(0x7f0000001fd8)=@framed={{0xffffff85, 0x0, 0x0, 0x0, 0x7, 0x57}}, &(0x7f0000000180)="4550d40a1f91eb2f57b73224433025039c3096b20c6b439348bf689c08608537d6223e63adc0624fbae2e109359dce6922324ccc13160b68cae6430697259dd52d1f73e16adc3592d02925dffae85e9cd2398c6c67c87fb5b12602f145b484be45912966e8b7e2f66069c56dd76c1dc112013c3a6b4de999cdcdc8855aee3437dcc87580cfbe546fbbfbc0eb56d8bbbea2904a7c73c2", 0x0, 0x60, &(0x7f0000000000)=""/195}, 0x16) 01:52:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000100)=@nat={"6e61740600", 0x19, 0x0, 0x90, [0x20000040, 0x0, 0x0, 0x20000070, 0x200000a0], 0x0, &(0x7f0000000000), &(0x7f0000000040)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff}]}, 0x108) 01:52:06 executing program 4: 01:52:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) 01:52:06 executing program 5: 01:52:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket(0x1e, 0x4, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r1, 0x10e, 0x8, &(0x7f00000000c0)=0xc, 0x139) sendmsg$nl_generic(r1, &(0x7f0000000080)={&(0x7f0000000480)={0x10, 0xbb7f}, 0xc, &(0x7f0000000440)={&(0x7f00000004c0)={0x1c, 0x22, 0x1, 0x0, 0x0, {0x4}, [@typed={0x8, 0xc, @pid}]}, 0x1c}}, 0x0) 01:52:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020a040007000000000013001254036205001a0005cebafc22020000000000001ac600b2000000000000000000000000000000000a000028"], 0x38}}, 0x0) sendmmsg(r1, &(0x7f0000000180), 0x20, 0x0) 01:52:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) 01:52:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$kcm(0x29, 0x1000000005, 0x0) sendmmsg(r1, &(0x7f0000002940)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000003c0)="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", 0xfe}], 0x1, 0x0, 0x0, 0x4000}, 0x9}, {{&(0x7f0000001bc0)=@ethernet={0x0, @local}, 0x80, &(0x7f0000001cc0), 0x0, &(0x7f0000001d00)}}], 0x2, 0x0) 01:52:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) io_setup(0xa3c, &(0x7f0000409000)=0x0) read$eventfd(r1, &(0x7f0000000000), 0x8) io_submit(r2, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000042000), 0x0, 0x0, 0x0, 0x1, r1}]) 01:52:06 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(r1, &(0x7f0000ccb000), 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f00009ff000)=ANY=[@ANYBLOB="18000000030000000000000000000000950000fe00000000"], &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r3 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMATTACH(r4, 0x89e0, &(0x7f00000003c0)={r1, r2}) sendmmsg(r4, &(0x7f0000006b00)=[{{&(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000003d80)=[{&(0x7f0000002a40)="06", 0x1}], 0x1, &(0x7f0000003e40)}}], 0x1, 0x0) 01:52:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) 01:52:06 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(r0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:06 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6(0xa, 0x3, 0x6) connect$inet6(r1, &(0x7f0000000340), 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080)=0x11b, 0x4) write$binfmt_elf64(r1, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) 01:52:06 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000000)={'nat\x00'}, &(0x7f0000000080)=0x78) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) 01:52:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) 01:52:06 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000340)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSSOFTCAR(0xffffffffffffffff, 0x541a, &(0x7f0000000000)) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000080)={0x5}) 01:52:06 executing program 1: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000800)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000100)) 01:52:06 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) 01:52:06 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = eventfd2(0x0, 0x0) io_setup(0xa3c, &(0x7f0000409000)=0x0) read$eventfd(r1, &(0x7f0000000000), 0x8) read$eventfd(r1, &(0x7f0000000140), 0x8) io_submit(r2, 0x1, &(0x7f0000329fd8)=[&(0x7f00002a8000)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000042000), 0x0, 0x0, 0x0, 0x1, r1}]) 01:52:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r1, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) 01:52:07 executing program 1: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x1, 0xb, 0x82000, 0x100000001, 0x0, 0xffffffffffffffff, 0x0, [0x5f]}, 0x14) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000180)="d5", &(0x7f0000000740)="8d9910493f92363649cf521b5eef735ac16e34599de246b9953c5e4120c6f48c3ce5a687d71fbc770b33b0b362a9295c34739a93d6f71d4c4690f6328c116f1155073e919244d32ca48e1fbb5d7c6a52dd8476ea5849643e4f71ebfd36e0009f9d05b741e0fb351346a27f5c8e08118ba7b2b9003e6057aea19c592ca0b32fec08454feb5c49afbc1ddad554fb2ed32f80995364faeb2e7c50054d"}, 0x20) 01:52:07 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) 01:52:07 executing program 2: rt_sigtimedwait(&(0x7f000031bff8), &(0x7f0000000000), &(0x7f000005b000), 0x8) 01:52:07 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x8eea780d) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r3, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:07 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = signalfd4(0xffffffffffffff9c, &(0x7f00000002c0)={0x8}, 0x8, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000980)) syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000180)=""/150, 0x96, 0x2102, &(0x7f0000000440)={0xa, 0x4e22, 0x0, @mcast1, 0x4}, 0x1c) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)) lsetxattr$security_smack_transmute(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64TRANSMUTE\x00', &(0x7f00000005c0)='TRUE', 0x4, 0x0) ioctl(0xffffffffffffffff, 0x94, &(0x7f00000004c0)="2ec94c60dfcf9dc357f87b1a9158c0db9448f8aa66f5565836df0aa593e8eea55522a24ad4954124c5e2373d789fa57e5fc135e016da5894aeff1f09d0f87051ab22be") perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r2, 0x2008200) r3 = open(&(0x7f0000000080)='./bus\x00', 0x4000, 0xffffffffffffffff) sendfile(0xffffffffffffffff, r3, &(0x7f0000d83ff8), 0x8000fffffbfe) socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x100082) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r4, r5, &(0x7f0000000240), 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) ioctl$VT_GETMODE(r5, 0x5601, &(0x7f0000000140)) creat(&(0x7f0000000700)='./bus\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4004}, 0xc, &(0x7f0000000280)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) close(r4) 01:52:07 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) 01:52:07 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f0000000100)=0xc) fchown(r0, r1, 0x0) 01:52:07 executing program 5: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = signalfd4(0xffffffffffffff9c, &(0x7f00000002c0)={0x8}, 0x8, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000980)) syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000180)=""/150, 0x96, 0x2102, &(0x7f0000000440)={0xa, 0x4e22, 0x0, @mcast1, 0x4}, 0x1c) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)) lsetxattr$security_smack_transmute(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64TRANSMUTE\x00', &(0x7f00000005c0)='TRUE', 0x4, 0x0) ioctl(0xffffffffffffffff, 0x94, &(0x7f00000004c0)="2ec94c60dfcf9dc357f87b1a9158c0db9448f8aa66f5565836df0aa593e8eea55522a24ad4954124c5e2373d789fa57e5fc135e016da5894aeff1f09d0f87051ab22be") perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r2, 0x2008200) r3 = open(&(0x7f0000000080)='./bus\x00', 0x4000, 0xffffffffffffffff) sendfile(0xffffffffffffffff, r3, &(0x7f0000d83ff8), 0x8000fffffbfe) socket(0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x100082) r5 = memfd_create(&(0x7f0000000380)="000000000000000100000001000000768e05f7c155ad7dc6947c573e5a69244e76382c0aa63d575ea3597f8b1728277ef76b30544d7ba92dcf978f1f81dc1b7f8f7b3451dada02ecb4f1ddcc8b5241da8945666e0073c25a6201004dbea37aabd3eb9888c4c629419f50937a6848e0d281dbee568c4de9a036c26f1922f64971d4df97fbab04e8ce4938b31dcf259b4bc60901e18661fab8fb2988cd2bc260c2f572353e6bb0a002fc164d4f189b068062d10100000000000000400c0c4ca57b546b9430172ea5362ee0141b3df06ad235e815d89eead3d9473409c09c2e27a952337a24f20188c013123cc0316a33d8b443453773e4a09edd8031124dee13ce9c75288f2ec833c7e66af5b19a00000000000000", 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r4, r5, &(0x7f0000000240), 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) ioctl$VT_GETMODE(r5, 0x5601, &(0x7f0000000140)) creat(&(0x7f0000000700)='./bus\x00', 0x0) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4004}, 0xc, &(0x7f0000000280)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) close(r4) 01:52:07 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) [ 285.691427] kauditd_printk_skb: 9 callbacks suppressed [ 285.691448] audit: type=1804 audit(1540777927.775:31): pid=8952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir030753054/syzkaller.zzHhsW/81/bus" dev="sda1" ino=16799 res=1 01:52:07 executing program 2: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) close(r0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000b40)='oom_adj\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000580)="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") sendfile(r1, r0, &(0x7f0000000000), 0x3fff) [ 285.792390] audit: type=1804 audit(1540777927.785:32): pid=8956 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir177132263/syzkaller.zO9yY2/81/bus" dev="sda1" ino=16803 res=1 01:52:08 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x30180, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x5) socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f00000005c0)=""/97, &(0x7f0000000680)=0x61) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x4, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) sendmsg$nl_route(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20010020}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="e1000100e00000011af50fc89e308a1ff3d66aba8b590fca102da753936d9305afe00b546dc96e45a081118f090001000000000000f03c4b8fc964e409654b0f52c60fa3c38116c4f5dd47bf19018757d163c09fe6639e20"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r3) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000a00)=ANY=[@ANYBLOB="6e61740000000000000000000000009f83cae96ed048b7a4ba1da80000000000000000000000000000000000ee9d3fa81ef5b3d989400c21884f33d36a9161d520deb7adefa2fe7afb22b4a01393674d08cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b70400000000000000885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d51b80944f9acc33e706d2cbc0f0667a1feee3513bd6649f3af066f39283e95e27fc45b4b625528d2a90573d652140"], &(0x7f0000000480)=0x1) r4 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) fstat(r2, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r4, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000600)={0x4, @broadcast, 0x4e23, 0x3, 'lblcr\x00', 0x2, 0x206, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x0, &(0x7f00000002c0), &(0x7f0000000340)=0x10) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c650000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000180c2000001000000000000000000007f000001ac1414aa04000000010000000000813de0000001ffffffffffffffffffffffffffff00000000000000000000000000000000000000ff000000ff00000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setuid(r5) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x80000001ff) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x2, &(0x7f0000000980)) sched_setscheduler(0x0, 0x2, &(0x7f00000009c0)=0x998) restart_syscall() 01:52:08 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) 01:52:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") sendto$inet6(r0, &(0x7f0000000080), 0x0, 0x0, &(0x7f0000000100)={0xa, 0x4e24, 0x0, @dev}, 0x1b) [ 285.893265] audit: type=1800 audit(1540777927.785:33): pid=8956 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="bus" dev="sda1" ino=16803 res=0 [ 286.033245] audit: type=1800 audit(1540777927.815:34): pid=8952 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor1" name="bus" dev="sda1" ino=16799 res=0 01:52:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000080)="87d4b8be1337ec030c07b11f7e2e", 0xe) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup\x00', 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000240)='cpuset.sched_load_balance\x00', 0x2, 0x0) r2 = socket$alg(0x26, 0x5, 0x0) bind$alg(r2, &(0x7f0000002800)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(morus640)\x00'}, 0xffffffffffffff01) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0x0) setsockopt$ALG_SET_KEY(r2, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r3 = socket$inet6(0xa, 0x800, 0x0) socket$inet(0x2, 0x1, 0x6) ioctl(r3, 0x20008912, &(0x7f00000003c0)="025cc83d6d345f8f762070") r4 = socket$inet6_sctp(0xa, 0x5, 0x84) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000140)={0xffffffffffffffff}) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f0000000080)={0x931, {0x2, 0x0, @loopback}, {0x2, 0x4e21, @multicast2}, {}, 0x2, 0x4, 0x5, 0x0, 0x7d, &(0x7f0000000040)='yam0\x00', 0x7, 0x2, 0x1}) r6 = socket(0x8000000000a, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r4, 0x84, 0x75, &(0x7f00000026c0)={0x0, 0x1}, &(0x7f0000002700)=0x8) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f00000000c0)={0x2, "697025746e6c3000000000038c0400"}, 0x18) 01:52:08 executing program 0: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) [ 286.213310] audit: type=1804 audit(1540777927.855:35): pid=8964 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir177132263/syzkaller.zO9yY2/81/bus" dev="sda1" ino=16803 res=1 [ 286.347734] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1_to_team, syncid = 0, id = 0 [ 286.348450] IPVS: stopping backup sync thread 8999 ... [ 286.390485] audit: type=1804 audit(1540777927.915:36): pid=8964 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir177132263/syzkaller.zO9yY2/81/bus" dev="sda1" ino=16803 res=1 [ 286.502275] IPVS: ftp: loaded support on port[0] = 21 [ 286.504701] IPVS: stopping backup sync thread 9005 ... [ 286.510077] audit: type=1804 audit(1540777927.935:37): pid=8964 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor5" name="/root/syzkaller-testdir177132263/syzkaller.zO9yY2/81/bus" dev="sda1" ino=16803 res=1 [ 286.513466] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1_to_team, syncid = 0, id = 0 01:52:08 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) pipe(&(0x7f0000000680)={0xffffffffffffffff}) write$FUSE_NOTIFY_STORE(r1, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r3+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 286.594108] audit: type=1800 audit(1540777927.935:38): pid=8964 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor5" name="bus" dev="sda1" ino=16803 res=0 [ 286.614594] audit: type=1804 audit(1540777927.945:39): pid=8969 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir030753054/syzkaller.zzHhsW/81/bus" dev="sda1" ino=16799 res=1 [ 286.638887] audit: type=1804 audit(1540777928.035:40): pid=8956 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor5" name="/root/syzkaller-testdir177132263/syzkaller.zO9yY2/81/bus" dev="sda1" ino=16803 res=1 01:52:08 executing program 1: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = signalfd4(0xffffffffffffff9c, &(0x7f00000002c0)={0x8}, 0x8, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000980)) syz_open_dev$mice(&(0x7f0000000480)='/dev/input/mice\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000180)=""/150, 0x96, 0x2102, &(0x7f0000000440)={0xa, 0x4e22, 0x0, @mcast1, 0x4}, 0x1c) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000240)) lsetxattr$security_smack_transmute(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='security.SMACK64TRANSMUTE\x00', &(0x7f00000005c0)='TRUE', 0x4, 0x0) ioctl(0xffffffffffffffff, 0x94, &(0x7f00000004c0)="2ec94c60dfcf9dc357f87b1a9158c0db9448f8aa66f5565836df0aa593e8eea55522a24ad4954124c5e2373d789fa57e5fc135e016da5894aeff1f09d0f87051ab22be") perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x200000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r2, 0x2008200) r3 = open(&(0x7f0000000080)='./bus\x00', 0x4000, 0xffffffffffffffff) sendfile(0xffffffffffffffff, r3, &(0x7f0000d83ff8), 0x8000fffffbfe) socket(0x10, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000600)='/dev/loop#\x00', 0x0, 0x100082) r5 = memfd_create(&(0x7f0000000380)="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", 0x0) pwritev(r5, &(0x7f0000000340)=[{&(0x7f00000001c0)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r4, 0x4c00, r5) sendfile(r4, r5, &(0x7f0000000240), 0x20000102000007) getsockopt$IPT_SO_GET_REVISION_MATCH(r4, 0x0, 0x42, &(0x7f0000000580)={'TPROXY\x00'}, &(0x7f00000005c0)=0x1e) ioctl$VT_GETMODE(r5, 0x5601, &(0x7f0000000140)) creat(&(0x7f0000000700)='./bus\x00', 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4004}, 0xc, &(0x7f0000000280)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x1}}, 0x0) close(r4) 01:52:08 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000000280)={0x0, 0x0}) write$binfmt_aout(r1, &(0x7f0000000040)=ANY=[@ANYBLOB="0b01000363020000d203000009000000240000000400000000000000000000004dec72540e7cc140706d8892771d5bcd194f3882fd37bce8a58e2ee15427d71927069ec033a000e4dc795cd86a0bed9094625465bdfc55b4b4370f1f16c2375539f8645cf13bd864eb2a59b95069a678307ec8ffa4b63231dffcd6bdaf64eb965c6134007b9f85e1e4c4fc82cdf0cbcf434e8ad529050e"], 0x97) close(r2) recvmmsg(r1, &(0x7f0000005b80)=[{{&(0x7f0000005440)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000005600)=[{&(0x7f0000005540)=""/163, 0xa3}], 0x1, &(0x7f0000005640)=""/190, 0xbe}}], 0x1, 0x0, &(0x7f0000005d00)={0x0, 0x989680}) 01:52:08 executing program 0: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) 01:52:08 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 01:52:08 executing program 0: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) [ 286.864139] IPVS: ftp: loaded support on port[0] = 21 [ 286.870364] dccp_invalid_packet: P.Data Offset(68) too large [ 286.903984] dccp_invalid_packet: P.Data Offset(68) too large 01:52:09 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 287.060319] dccp_invalid_packet: P.Data Offset(68) too large 01:52:10 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) 01:52:10 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000200)={0xffffffffffffffff}) sendmmsg(r2, &(0x7f0000006b00)=[{{&(0x7f0000000140)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast}, 0x80, &(0x7f0000003d80)=[{&(0x7f0000002a40)="06", 0x1}], 0x1, &(0x7f0000003e40)}}], 0x1, 0x0) 01:52:10 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 01:52:10 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") socket$inet(0x2, 0x80001, 0x9) bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000000), 0x4) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) 01:52:10 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:10 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x30180, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x5) socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f00000005c0)=""/97, &(0x7f0000000680)=0x61) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x4, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) sendmsg$nl_route(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20010020}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="e1000100e00000011af50fc89e308a1ff3d66aba8b590fca102da753936d9305afe00b546dc96e45a081118f090001000000000000f03c4b8fc964e409654b0f52c60fa3c38116c4f5dd47bf19018757d163c09fe6639e20"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r3) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000a00)=ANY=[@ANYBLOB="6e61740000000000000000000000009f83cae96ed048b7a4ba1da80000000000000000000000000000000000ee9d3fa81ef5b3d989400c21884f33d36a9161d520deb7adefa2fe7afb22b4a01393674d08cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b70400000000000000885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d51b80944f9acc33e706d2cbc0f0667a1feee3513bd6649f3af066f39283e95e27fc45b4b625528d2a90573d652140"], &(0x7f0000000480)=0x1) r4 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) fstat(r2, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r4, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000600)={0x4, @broadcast, 0x4e23, 0x3, 'lblcr\x00', 0x2, 0x206, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x0, &(0x7f00000002c0), &(0x7f0000000340)=0x10) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c650000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000180c2000001000000000000000000007f000001ac1414aa04000000010000000000813de0000001ffffffffffffffffffffffffffff00000000000000000000000000000000000000ff000000ff00000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setuid(r5) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x80000001ff) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x2, &(0x7f0000000980)) sched_setscheduler(0x0, 0x2, &(0x7f00000009c0)=0x998) restart_syscall() [ 288.914145] dccp_invalid_packet: P.Data Offset(68) too large 01:52:11 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 01:52:11 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x30180, 0x0) ioctl$VT_ACTIVATE(r0, 0x5606, 0x5) socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket(0x0, 0x0, 0x0) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f00000005c0)=""/97, &(0x7f0000000680)=0x61) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x4, 0x0) unshare(0x40000000) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000500)={{{@in6=@remote, @in6}}, {{@in=@multicast2}, 0x0, @in=@dev}}, &(0x7f0000000300)=0xe8) sendmsg$nl_route(r3, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x20010020}, 0xc, &(0x7f0000000400)={&(0x7f0000000ac0)=ANY=[@ANYBLOB="e1000100e00000011af50fc89e308a1ff3d66aba8b590fca102da753936d9305afe00b546dc96e45a081118f090001000000000000f03c4b8fc964e409654b0f52c60fa3c38116c4f5dd47bf19018757d163c09fe6639e20"], 0x1}, 0x1, 0x0, 0x0, 0x801}, 0x0) ioctl$LOOP_SET_FD(r3, 0x4c00, r3) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000a00)=ANY=[@ANYBLOB="6e61740000000000000000000000009f83cae96ed048b7a4ba1da80000000000000000000000000000000000ee9d3fa81ef5b3d989400c21884f33d36a9161d520deb7adefa2fe7afb22b4a01393674d08cf8bf10d8e07eebbe8ed4ef6aac656cc636210069397d0fd20b70400000000000000885af516e0919b85e016d15d23f0155a203b0b4e5603f6370250355a36d5d51b80944f9acc33e706d2cbc0f0667a1feee3513bd6649f3af066f39283e95e27fc45b4b625528d2a90573d652140"], &(0x7f0000000480)=0x1) r4 = geteuid() getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000100)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000200)=0xe8) fstat(r2, &(0x7f0000000380)) chown(&(0x7f0000000280)='./file0\x00', r4, 0x0) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) setsockopt$IP_VS_SO_SET_EDIT(0xffffffffffffffff, 0x0, 0x483, &(0x7f0000000600)={0x4, @broadcast, 0x4e23, 0x3, 'lblcr\x00', 0x2, 0x206, 0x40}, 0x2c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60fd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/loop-control\x00', 0x40, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x0, &(0x7f00000002c0), &(0x7f0000000340)=0x10) setsockopt$ARPT_SO_SET_REPLACE(r3, 0x0, 0x60, &(0x7f0000000700)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0004001000000000000000000000000000000000000000000000000000050006d616e676c650000000000000000000000000000000000aaaaaaaaaaaa000000000000000000000180c2000001000000000000000000007f000001ac1414aa04000000010000000000813de0000001ffffffffffffffffffffffffffff00000000000000000000000000000000000000ff000000ff00000000000000000000aaaaaaaaaaaa00000000000000000000000000000000000000ffffffff00000000000000000000000000000000000000000000000000000000000000000000"], 0x1) setuid(r5) ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x80000001ff) perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x2, &(0x7f0000000980)) sched_setscheduler(0x0, 0x2, &(0x7f00000009c0)=0x998) restart_syscall() 01:52:11 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) 01:52:11 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 01:52:11 executing program 0: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r0 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) [ 289.112337] dccp_invalid_packet: P.Data Offset(68) too large 01:52:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000000c0)="0a5c2d0240316285717070") unshare(0x400) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 289.324554] IPVS: ftp: loaded support on port[0] = 21 [ 289.391487] IPVS: ftp: loaded support on port[0] = 21 01:52:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6={{0x2, 0x0, 0x0, @local}}}, &(0x7f0000000180)=0x98) 01:52:13 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 01:52:13 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket(0x1e, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth1_to_team\x00'}) 01:52:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x100, 0xfd7f) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xfffffffffffffedd, 0x20000103, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty={[0xe00000000000000]}}, 0x1c) close(r1) 01:52:13 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000005c0)="0a5c2d0240316285717070") socket$kcm(0x11, 0x40000000a, 0x300) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000380)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000400)={r1, 0x0, 0xe, 0x8f, &(0x7f0000000100)="2a88a80000000000000000000000", &(0x7f0000000280)=""/143}, 0x28) 01:52:13 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x8eea780d) write$FUSE_NOTIFY_STORE(0xffffffffffffffff, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x0) getsockname$unix(r0, &(0x7f0000000500), &(0x7f0000000180)=0x6e) lookup_dcookie(0x0, &(0x7f0000000480)=""/87, 0x57) syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000600)='net/udp\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, &(0x7f0000000200)={0x0, r2+30000000}, &(0x7f0000000300)={&(0x7f00000002c0), 0x8}) ioctl$FS_IOC_FSGETXATTR(r1, 0x801c581f, &(0x7f0000000880)={0x4, 0x2, 0xb55, 0x7}) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 291.612444] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 291.625755] dccp_invalid_packet: P.Data Offset(68) too large [ 291.653069] ODEBUG: object 00000000e8c9277e is on stack 0000000034658664, but NOT annotated. [ 291.664380] WARNING: CPU: 0 PID: 9105 at lib/debugobjects.c:369 __debug_object_init.cold.14+0x51/0xdf [ 291.673739] Kernel panic - not syncing: panic_on_warn set ... [ 291.679628] CPU: 0 PID: 9105 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #99 [ 291.688038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 291.697386] Call Trace: [ 291.699984] dump_stack+0x244/0x39d [ 291.703626] ? dump_stack_print_info.cold.1+0x20/0x20 [ 291.708827] panic+0x2ad/0x55c [ 291.712035] ? add_taint.cold.5+0x16/0x16 [ 291.716200] ? __warn.cold.8+0x5/0x45 [ 291.720018] ? __debug_object_init.cold.14+0x51/0xdf [ 291.725304] __warn.cold.8+0x20/0x45 [ 291.729044] ? __debug_object_init.cold.14+0x51/0xdf [ 291.734163] report_bug+0x254/0x2d0 [ 291.737799] do_error_trap+0x11b/0x200 [ 291.741722] do_invalid_op+0x36/0x40 [ 291.745447] ? __debug_object_init.cold.14+0x51/0xdf [ 291.750563] invalid_op+0x14/0x20 [ 291.754035] RIP: 0010:__debug_object_init.cold.14+0x51/0xdf [ 291.759790] Code: ea 03 80 3c 02 00 75 7c 49 8b 54 24 18 48 89 de 48 c7 c7 80 fb 60 88 4c 89 85 d0 fd ff ff e8 39 f7 d0 fd 4c 8b 85 d0 fd ff ff <0f> 0b e9 09 d6 ff ff 41 83 c4 01 b8 ff ff 37 00 44 89 25 07 c6 87 [ 291.775607] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 291.778702] RSP: 0018:ffff8801bd1f7308 EFLAGS: 00010086 [ 291.794383] RAX: 0000000000000050 RBX: ffff8801bd1f7af8 RCX: ffffc90006579000 [ 291.801658] RDX: 0000000000000000 RSI: ffffffff8165ba85 RDI: 0000000000000005 [ 291.808938] RBP: ffff8801bd1f7560 R08: ffff8801bd027ef0 R09: ffffed003b5c5020 [ 291.816211] R10: ffffed003b5c5020 R11: ffff8801dae28107 R12: ffff8801d4cae4c0 [ 291.818562] kobject: 'loop4' (00000000a731a019): kobject_uevent_env [ 291.823482] R13: 00000000000b0e40 R14: ffff8801d4cae4c0 R15: ffff8801bd027ee0 [ 291.823509] ? vprintk_func+0x85/0x181 [ 291.823530] ? __debug_object_init.cold.14+0x4a/0xdf [ 291.829944] kobject: 'loop4' (00000000a731a019): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 291.837196] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 291.837219] ? debug_object_free+0x690/0x690 [ 291.841564] kobject: 'loop5' (000000006188c1f2): kobject_uevent_env [ 291.846182] ? unwind_get_return_address+0x61/0xa0 [ 291.846210] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 291.855738] kobject: 'loop5' (000000006188c1f2): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 291.860237] ? depot_save_stack+0x292/0x470 [ 291.860258] ? save_stack+0xa9/0xd0 [ 291.897075] dccp_invalid_packet: P.Data Offset(68) too large [ 291.898408] ? save_stack+0x43/0xd0 [ 291.898421] ? kasan_kmalloc+0xc7/0xe0 [ 291.898438] ? zap_class+0x640/0x640 [ 291.898460] ? do_syscall_64+0x1b9/0x820 [ 291.919486] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 291.924854] ? _raw_spin_unlock_irqrestore+0xbb/0xd0 [ 291.929983] ? find_held_lock+0x36/0x1c0 [ 291.932537] dccp_invalid_packet: P.Data Offset(68) too large [ 291.934065] debug_object_init+0x16/0x20 [ 291.934081] init_timer_key+0xa9/0x480 [ 291.934099] ? init_timer_on_stack_key+0xe0/0xe0 [ 291.952556] ? __might_fault+0x12b/0x1e0 [ 291.956629] ? __lockdep_init_map+0x105/0x590 [ 291.961134] ? __lockdep_init_map+0x105/0x590 [ 291.965643] ? lockdep_init_map+0x9/0x10 [ 291.969719] sock_init_data+0xe1/0xdc0 [ 291.973614] ? sk_stop_timer+0x50/0x50 [ 291.977521] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.983065] ? _copy_from_user+0xdf/0x150 [ 291.987226] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 291.991434] kobject: 'loop5' (000000006188c1f2): kobject_uevent_env [ 291.992774] ? bpf_test_init.isra.10+0x70/0x100 01:52:13 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 01:52:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(r0, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x29, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 01:52:14 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 01:52:14 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 01:52:14 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 01:52:14 executing program 5: ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 291.992795] bpf_prog_test_run_skb+0x255/0xc40 [ 291.992816] ? __lock_acquire+0x62f/0x4c20 [ 291.999236] kobject: 'loop5' (000000006188c1f2): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 292.003880] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 292.003897] ? __lock_acquire+0x62f/0x4c20 [ 292.003988] ? fput+0x130/0x1a0 [ 292.034473] ? __bpf_prog_get+0x9b/0x290 [ 292.038548] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 292.043403] bpf_prog_test_run+0x130/0x1a0 [ 292.047649] __x64_sys_bpf+0x3d8/0x510 [ 292.051548] ? bpf_prog_get+0x20/0x20 01:52:14 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) 01:52:14 executing program 5: socket$inet6_udplite(0xa, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x20000000008912, &(0x7f00000001c0)="0a5c2d0240316285717070") syz_emit_ethernet(0x4a, &(0x7f0000000100)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x21, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f00000002c0)) [ 292.055380] do_syscall_64+0x1b9/0x820 [ 292.059276] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.064652] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.069591] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.074451] ? trace_hardirqs_on_caller+0x310/0x310 [ 292.079474] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 292.084503] ? prepare_exit_to_usermode+0x291/0x3b0 [ 292.089531] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.094385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.099581] RIP: 0033:0x457569 [ 292.102783] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.121686] RSP: 002b:00007fc0bbfcac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 292.129390] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 292.136643] RDX: 0000000000000028 RSI: 0000000020000400 RDI: 000000000000000a [ 292.143899] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 292.151158] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc0bbfcb6d4 [ 292.158419] R13: 00000000004bd892 R14: 00000000004cc468 R15: 00000000ffffffff [ 292.165678] [ 292.165682] ====================================================== [ 292.165686] WARNING: possible circular locking dependency detected [ 292.165689] 4.19.0-rc8-next-20181019+ #99 Not tainted [ 292.165692] ------------------------------------------------------ [ 292.165696] syz-executor2/9105 is trying to acquire lock: [ 292.165698] 0000000009937275 ((console_sem).lock){-.-.}, at: down_trylock+0x13/0x70 [ 292.165707] [ 292.165709] but task is already holding lock: [ 292.165711] 00000000431dd67e (&obj_hash[i].lock){-.-.}, at: __debug_object_init+0x127/0x1290 [ 292.165720] [ 292.165723] which lock already depends on the new lock. [ 292.165725] [ 292.165726] [ 292.165729] the existing dependency chain (in reverse order) is: [ 292.165731] [ 292.165732] -> #3 (&obj_hash[i].lock){-.-.}: [ 292.165741] _raw_spin_lock_irqsave+0x99/0xd0 [ 292.165744] __debug_object_init+0x127/0x1290 [ 292.165746] debug_object_init+0x16/0x20 [ 292.165749] hrtimer_init+0x97/0x490 [ 292.165751] init_dl_task_timer+0x1b/0x50 [ 292.165754] __sched_fork+0x2ae/0x590 [ 292.165756] init_idle+0x75/0x740 [ 292.165759] sched_init+0xb33/0xc07 [ 292.165761] start_kernel+0x4be/0xa2b [ 292.165764] x86_64_start_reservations+0x2e/0x30 [ 292.165767] x86_64_start_kernel+0x76/0x79 [ 292.165769] secondary_startup_64+0xa4/0xb0 [ 292.165771] [ 292.165772] -> #2 (&rq->lock){-.-.}: [ 292.165780] _raw_spin_lock+0x2d/0x40 [ 292.165783] task_fork_fair+0xb0/0x6d0 [ 292.165785] sched_fork+0x443/0xba0 [ 292.165788] copy_process+0x25b8/0x8790 [ 292.165790] _do_fork+0x1cb/0x11c0 [ 292.165793] kernel_thread+0x34/0x40 [ 292.165795] rest_init+0x28/0x372 [ 292.165798] arch_call_rest_init+0xe/0x1b [ 292.165800] start_kernel+0x9f0/0xa2b [ 292.165803] x86_64_start_reservations+0x2e/0x30 [ 292.165806] x86_64_start_kernel+0x76/0x79 [ 292.165810] secondary_startup_64+0xa4/0xb0 [ 292.165812] [ 292.165814] -> #1 (&p->pi_lock){-.-.}: [ 292.165822] _raw_spin_lock_irqsave+0x99/0xd0 [ 292.165825] try_to_wake_up+0xdc/0x1490 [ 292.165827] wake_up_process+0x10/0x20 [ 292.165830] __up.isra.1+0x1c0/0x2a0 [ 292.165832] up+0x13c/0x1c0 [ 292.165834] __up_console_sem+0xbe/0x1b0 [ 292.165837] console_unlock+0x80c/0x1190 [ 292.165839] vprintk_emit+0x391/0x990 [ 292.165842] vprintk_default+0x28/0x30 [ 292.165844] vprintk_func+0x7e/0x181 [ 292.165846] printk+0xa7/0xcf [ 292.165849] do_exit.cold.18+0x57/0x16f [ 292.165851] do_group_exit+0x177/0x440 [ 292.165854] __x64_sys_exit_group+0x3e/0x50 [ 292.165856] do_syscall_64+0x1b9/0x820 [ 292.165860] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.165861] [ 292.165862] -> #0 ((console_sem).lock){-.-.}: [ 292.165871] lock_acquire+0x1ed/0x520 [ 292.165873] _raw_spin_lock_irqsave+0x99/0xd0 [ 292.165876] down_trylock+0x13/0x70 [ 292.165879] __down_trylock_console_sem+0xae/0x1f0 [ 292.165881] console_trylock+0x15/0xa0 [ 292.165883] vprintk_emit+0x372/0x990 [ 292.165886] vprintk_default+0x28/0x30 [ 292.165888] vprintk_func+0x7e/0x181 [ 292.165890] printk+0xa7/0xcf [ 292.165893] __debug_object_init.cold.14+0x4a/0xdf [ 292.165896] debug_object_init+0x16/0x20 [ 292.165898] init_timer_key+0xa9/0x480 [ 292.165901] sock_init_data+0xe1/0xdc0 [ 292.165904] bpf_prog_test_run_skb+0x255/0xc40 [ 292.165906] bpf_prog_test_run+0x130/0x1a0 [ 292.165909] __x64_sys_bpf+0x3d8/0x510 [ 292.165911] do_syscall_64+0x1b9/0x820 [ 292.165914] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.165915] [ 292.165918] other info that might help us debug this: [ 292.165919] [ 292.165921] Chain exists of: [ 292.165923] (console_sem).lock --> &rq->lock --> &obj_hash[i].lock [ 292.165933] [ 292.165935] Possible unsafe locking scenario: [ 292.165937] [ 292.165939] CPU0 CPU1 [ 292.165942] ---- ---- [ 292.165943] lock(&obj_hash[i].lock); [ 292.165949] lock(&rq->lock); [ 292.165955] lock(&obj_hash[i].lock); [ 292.165959] lock((console_sem).lock); [ 292.165964] [ 292.165966] *** DEADLOCK *** [ 292.165967] [ 292.165970] 1 lock held by syz-executor2/9105: [ 292.165971] #0: 00000000431dd67e (&obj_hash[i].lock){-.-.}, at: __debug_object_init+0x127/0x1290 [ 292.165981] [ 292.165983] stack backtrace: [ 292.165988] CPU: 0 PID: 9105 Comm: syz-executor2 Not tainted 4.19.0-rc8-next-20181019+ #99 [ 292.165992] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 292.165994] Call Trace: [ 292.165996] dump_stack+0x244/0x39d [ 292.165999] ? dump_stack_print_info.cold.1+0x20/0x20 [ 292.166010] ? vprintk_func+0x85/0x181 [ 292.166013] print_circular_bug.isra.35.cold.54+0x1bd/0x27d [ 292.166015] ? save_trace+0xe0/0x290 [ 292.166018] __lock_acquire+0x3399/0x4c20 [ 292.166020] ? mark_held_locks+0x130/0x130 [ 292.166023] ? put_dec+0xf0/0xf0 [ 292.166025] ? mark_held_locks+0x130/0x130 [ 292.166028] ? pointer_string+0x14e/0x1b0 [ 292.166030] ? number+0xca0/0xca0 [ 292.166033] ? print_usage_bug+0xc0/0xc0 [ 292.166035] ? ptr_to_id+0xd0/0x1d0 [ 292.166037] ? dentry_name+0x8f0/0x8f0 [ 292.166040] ? is_bpf_text_address+0xac/0x170 [ 292.166043] ? zap_class+0x640/0x640 [ 292.166046] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 292.166048] lock_acquire+0x1ed/0x520 [ 292.166051] ? down_trylock+0x13/0x70 [ 292.166053] ? lock_release+0xa10/0xa10 [ 292.166056] ? trace_hardirqs_off+0xb8/0x310 [ 292.166059] ? vprintk_emit+0x1de/0x990 [ 292.166061] ? trace_hardirqs_on+0x310/0x310 [ 292.166064] ? trace_hardirqs_off+0xb8/0x310 [ 292.166066] ? log_store+0x344/0x4c0 [ 292.166069] ? vprintk_emit+0x372/0x990 [ 292.166071] _raw_spin_lock_irqsave+0x99/0xd0 [ 292.166074] ? down_trylock+0x13/0x70 [ 292.166076] down_trylock+0x13/0x70 [ 292.166079] __down_trylock_console_sem+0xae/0x1f0 [ 292.166081] console_trylock+0x15/0xa0 [ 292.166084] vprintk_emit+0x372/0x990 [ 292.166086] ? wake_up_klogd+0x180/0x180 [ 292.166089] ? zap_class+0x640/0x640 [ 292.166092] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 292.166094] ? print_usage_bug+0xc0/0xc0 [ 292.166097] ? find_held_lock+0x36/0x1c0 [ 292.166099] vprintk_default+0x28/0x30 [ 292.166102] vprintk_func+0x7e/0x181 [ 292.166104] printk+0xa7/0xcf [ 292.166107] ? kmsg_dump_rewind_nolock+0xe4/0xe4 [ 292.166109] __debug_object_init.cold.14+0x4a/0xdf [ 292.166112] ? lockdep_hardirqs_on+0x3bb/0x5b0 [ 292.166115] ? debug_object_free+0x690/0x690 [ 292.166118] ? unwind_get_return_address+0x61/0xa0 [ 292.166121] ? _raw_spin_unlock_irqrestore+0x6d/0xd0 [ 292.166123] ? depot_save_stack+0x292/0x470 [ 292.166126] ? save_stack+0xa9/0xd0 [ 292.166128] ? save_stack+0x43/0xd0 [ 292.166130] ? kasan_kmalloc+0xc7/0xe0 [ 292.166133] ? zap_class+0x640/0x640 [ 292.166135] ? do_syscall_64+0x1b9/0x820 [ 292.166138] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.166141] ? _raw_spin_unlock_irqrestore+0xbb/0xd0 [ 292.166144] ? find_held_lock+0x36/0x1c0 [ 292.166146] debug_object_init+0x16/0x20 [ 292.166149] init_timer_key+0xa9/0x480 [ 292.166152] ? init_timer_on_stack_key+0xe0/0xe0 [ 292.166154] ? __might_fault+0x12b/0x1e0 [ 292.166157] ? __lockdep_init_map+0x105/0x590 [ 292.166160] ? __lockdep_init_map+0x105/0x590 [ 292.166162] ? lockdep_init_map+0x9/0x10 [ 292.166165] sock_init_data+0xe1/0xdc0 [ 292.166167] ? sk_stop_timer+0x50/0x50 [ 292.166170] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.166173] ? _copy_from_user+0xdf/0x150 [ 292.166176] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 292.166179] ? bpf_test_init.isra.10+0x70/0x100 [ 292.166181] bpf_prog_test_run_skb+0x255/0xc40 [ 292.166184] ? __lock_acquire+0x62f/0x4c20 [ 292.166187] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 292.166189] ? __lock_acquire+0x62f/0x4c20 [ 292.166192] ? fput+0x130/0x1a0 [ 292.166194] ? __bpf_prog_get+0x9b/0x290 [ 292.166197] ? bpf_test_finish.isra.9+0x1f0/0x1f0 [ 292.166199] bpf_prog_test_run+0x130/0x1a0 [ 292.166202] __x64_sys_bpf+0x3d8/0x510 [ 292.166204] ? bpf_prog_get+0x20/0x20 [ 292.166207] do_syscall_64+0x1b9/0x820 [ 292.166210] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 292.166213] ? syscall_return_slowpath+0x5e0/0x5e0 [ 292.166215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.166218] ? trace_hardirqs_on_caller+0x310/0x310 [ 292.166221] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 292.166224] ? prepare_exit_to_usermode+0x291/0x3b0 [ 292.166227] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 292.166230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 292.166232] RIP: 0033:0x457569 [ 292.166241] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 292.166244] RSP: 002b:00007fc0bbfcac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 292.166250] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457569 [ 292.166254] RDX: 0000000000000028 RSI: 0000000020000400 RDI: 000000000000000a [ 292.166258] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 292.166262] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fc0bbfcb6d4 [ 292.166266] R13: 00000000004bd892 R14: 00000000004cc468 R15: 00000000ffffffff [ 292.167245] Kernel Offset: disabled [ 293.062425] Rebooting in 86400 seconds..