0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x5437, 0x0) [ 1297.028287] 8021q: adding VLAN 0 to HW filter on device team0 [ 1297.058503] device team0 entered promiscuous mode [ 1297.072729] NILFS (loop3): couldn't find nilfs on the device [ 1297.080895] device team_slave_0 entered promiscuous mode [ 1297.129304] bond0: Enslaving team0 as an active interface with an up link 20:53:43 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000004000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1297.182431] bond0: Releasing backup interface team0 [ 1297.188176] device team0 left promiscuous mode [ 1297.248632] device team_slave_0 left promiscuous mode [ 1297.328636] NILFS (loop3): couldn't find nilfs on the device 20:53:43 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000204000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1297.506555] NILFS (loop3): couldn't find nilfs on the device 20:53:43 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000fc0704000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1297.712984] NILFS (loop3): couldn't find nilfs on the device [ 1297.939147] bridge0: port 3(team0) entered blocking state [ 1297.957127] bridge0: port 3(team0) entered disabled state [ 1297.968561] device team0 entered promiscuous mode [ 1297.982537] device team_slave_0 entered promiscuous mode 20:53:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:44 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000804000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1297.989239] device team0 left promiscuous mode [ 1298.008784] device team_slave_0 left promiscuous mode [ 1298.018284] bridge0: port 3(team0) entered disabled state [ 1298.038089] NILFS (loop3): couldn't find nilfs on the device [ 1298.089085] bond0: team0 is up - this may be due to an out of date ifenslave [ 1298.102950] bridge0: port 3(team0) entered blocking state [ 1298.112604] bridge0: port 3(team0) entered disabled state [ 1298.130400] device team0 entered promiscuous mode 20:53:44 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1298.171160] device team_slave_0 entered promiscuous mode [ 1298.180508] bridge0: port 3(team0) entered blocking state [ 1298.186197] bridge0: port 3(team0) entered forwarding state [ 1298.200501] device team0 left promiscuous mode [ 1298.211416] device team_slave_0 left promiscuous mode 20:53:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x5441, 0x0) 20:53:44 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000008000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1298.227541] device team_slave_1 left promiscuous mode [ 1298.254103] bridge0: port 3(team0) entered disabled state [ 1298.264715] NILFS (loop3): couldn't find nilfs on the device [ 1298.304048] bond0: team0 is up - this may be due to an out of date ifenslave [ 1298.338948] bridge0: port 3(team0) entered blocking state [ 1298.346851] bridge0: port 3(team0) entered disabled state [ 1298.373282] device team0 entered promiscuous mode [ 1298.383910] device team_slave_0 entered promiscuous mode [ 1298.393702] device team_slave_1 entered promiscuous mode [ 1298.404216] bridge0: port 3(team0) entered blocking state [ 1298.409937] bridge0: port 3(team0) entered forwarding state 20:53:44 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x6000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1298.424893] device team0 left promiscuous mode [ 1298.431432] device team_slave_0 left promiscuous mode [ 1298.463825] device team_slave_1 left promiscuous mode [ 1298.484263] bridge0: port 3(team0) entered disabled state [ 1298.499719] bond0: team0 is up - this may be due to an out of date ifenslave [ 1298.507604] bridge0: port 3(team0) entered blocking state [ 1298.528478] bridge0: port 3(team0) entered disabled state [ 1298.578644] device team0 entered promiscuous mode [ 1298.598549] device team_slave_0 entered promiscuous mode [ 1298.623605] device team_slave_1 entered promiscuous mode [ 1298.651401] bridge0: port 3(team0) entered blocking state [ 1298.657119] bridge0: port 3(team0) entered forwarding state 20:53:44 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:44 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000408000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1298.717651] device team0 left promiscuous mode [ 1298.722275] device team_slave_0 left promiscuous mode [ 1298.754551] bridge0: port 3(team0) entered disabled state [ 1298.812361] NILFS (loop3): couldn't find nilfs on the device [ 1298.824610] 8021q: adding VLAN 0 to HW filter on device team0 [ 1298.929338] device team0 entered promiscuous mode 20:53:45 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000c000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1298.970790] device team_slave_0 entered promiscuous mode [ 1299.009489] bond0: Enslaving team0 as an active interface with an up link [ 1299.042711] validate_nla: 13 callbacks suppressed [ 1299.042719] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1299.066796] bond0: Releasing backup interface team0 [ 1299.073529] device team0 left promiscuous mode [ 1299.092502] device team_slave_0 left promiscuous mode [ 1299.104028] NILFS (loop3): couldn't find nilfs on the device 20:53:45 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000ffff1f000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1299.251376] NILFS (loop3): couldn't find nilfs on the device [ 1299.307275] NILFS (loop3): couldn't find nilfs on the device 20:53:45 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000010010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1299.462206] NILFS (loop3): couldn't find nilfs on the device [ 1299.521572] NILFS (loop3): couldn't find nilfs on the device [ 1299.539836] bridge0: port 3(team0) entered blocking state 20:53:45 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000020010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1299.567472] bridge0: port 3(team0) entered disabled state [ 1299.600104] device team0 entered promiscuous mode 20:53:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x5450, 0x0) [ 1299.614085] device team_slave_0 entered promiscuous mode [ 1299.633874] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1299.661055] device team0 left promiscuous mode [ 1299.670812] device team_slave_0 left promiscuous mode [ 1299.680763] bridge0: port 3(team0) entered disabled state [ 1299.710396] NILFS (loop3): couldn't find nilfs on the device [ 1299.749265] bond0: team0 is up - this may be due to an out of date ifenslave [ 1299.829496] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1299.863103] bridge0: port 3(team0) entered blocking state [ 1299.917142] bridge0: port 3(team0) entered disabled state [ 1299.956037] device team0 entered promiscuous mode [ 1299.960926] device team_slave_0 entered promiscuous mode [ 1300.061487] bridge0: port 3(team0) entered blocking state [ 1300.067172] bridge0: port 3(team0) entered forwarding state [ 1300.092455] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 20:53:46 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:46 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000030010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:53:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1300.111031] device team0 left promiscuous mode [ 1300.146359] device team_slave_0 left promiscuous mode [ 1300.151861] device team_slave_1 left promiscuous mode [ 1300.170217] NILFS (loop3): couldn't find nilfs on the device [ 1300.188421] bridge0: port 3(team0) entered disabled state [ 1300.222710] bond0: team0 is up - this may be due to an out of date ifenslave [ 1300.250797] NILFS (loop3): couldn't find nilfs on the device [ 1300.255889] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1300.264219] bridge0: port 3(team0) entered blocking state [ 1300.306110] bridge0: port 3(team0) entered disabled state [ 1300.317713] device team0 entered promiscuous mode [ 1300.322809] device team_slave_0 entered promiscuous mode [ 1300.330312] device team_slave_1 entered promiscuous mode [ 1300.357412] bridge0: port 3(team0) entered blocking state [ 1300.363109] bridge0: port 3(team0) entered forwarding state [ 1300.390160] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 20:53:46 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x6558, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1300.407701] device team0 left promiscuous mode [ 1300.413253] device team_slave_0 left promiscuous mode [ 1300.428843] device team_slave_1 left promiscuous mode [ 1300.434675] bridge0: port 3(team0) entered disabled state [ 1300.454043] bond0: team0 is up - this may be due to an out of date ifenslave [ 1300.469539] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1300.499300] bridge0: port 3(team0) entered blocking state [ 1300.509163] bridge0: port 3(team0) entered disabled state [ 1300.519778] device team0 entered promiscuous mode [ 1300.527761] device team_slave_0 entered promiscuous mode [ 1300.533708] device team_slave_1 entered promiscuous mode [ 1300.553735] bridge0: port 3(team0) entered blocking state [ 1300.559641] bridge0: port 3(team0) entered forwarding state [ 1300.578889] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1300.622316] device team0 left promiscuous mode [ 1300.647156] device team_slave_0 left promiscuous mode 20:53:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:46 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000040010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1300.707990] bridge0: port 3(team0) entered disabled state [ 1300.748116] NILFS (loop3): couldn't find nilfs on the device 20:53:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x5451, 0x0) 20:53:47 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1300.837209] NILFS (loop3): couldn't find nilfs on the device [ 1300.841506] bond0: team0 is up - this may be due to an out of date ifenslave [ 1300.867425] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1300.881466] bridge0: port 3(team0) entered blocking state 20:53:47 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000050010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1300.933852] bridge0: port 3(team0) entered disabled state [ 1300.977419] NILFS (loop3): couldn't find nilfs on the device [ 1301.003763] device team0 entered promiscuous mode 20:53:47 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000060010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1301.059668] device team_slave_0 entered promiscuous mode 20:53:47 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1301.114107] bridge0: port 3(team0) entered blocking state [ 1301.119827] bridge0: port 3(team0) entered forwarding state [ 1301.134457] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1301.156908] device team0 left promiscuous mode [ 1301.204905] device team_slave_0 left promiscuous mode [ 1301.220770] NILFS (loop3): couldn't find nilfs on the device [ 1301.230029] device team_slave_1 left promiscuous mode [ 1301.249457] bridge0: port 3(team0) entered disabled state [ 1301.321755] bond0: team0 is up - this may be due to an out of date ifenslave [ 1301.349968] NILFS (loop3): couldn't find nilfs on the device [ 1301.369981] bridge0: port 3(team0) entered blocking state [ 1301.376646] bridge0: port 3(team0) entered disabled state 20:53:47 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000070010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1301.423809] device team0 entered promiscuous mode [ 1301.453338] device team_slave_0 entered promiscuous mode [ 1301.469931] device team_slave_1 entered promiscuous mode [ 1301.481579] NILFS (loop3): couldn't find nilfs on the device [ 1301.486011] bridge0: port 3(team0) entered blocking state [ 1301.493035] bridge0: port 3(team0) entered forwarding state [ 1301.534402] device team0 left promiscuous mode [ 1301.543198] device team_slave_0 left promiscuous mode [ 1301.543655] NILFS (loop3): couldn't find nilfs on the device [ 1301.554368] bridge0: port 3(team0) entered disabled state 20:53:47 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000080010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1301.746083] ieee802154 phy0 wpan0: encryption failed: -22 [ 1301.751824] ieee802154 phy1 wpan1: encryption failed: -22 [ 1301.781377] 8021q: adding VLAN 0 to HW filter on device team0 [ 1301.810420] device team0 entered promiscuous mode [ 1301.827414] device team_slave_0 entered promiscuous mode [ 1301.834026] bond0: Enslaving team0 as an active interface with an up link [ 1301.834756] NILFS (loop3): couldn't find nilfs on the device [ 1301.847301] bond0: Releasing backup interface team0 [ 1301.847883] device team0 left promiscuous mode [ 1301.862517] device team_slave_0 left promiscuous mode [ 1301.913800] NILFS (loop3): couldn't find nilfs on the device [ 1302.244140] bridge0: port 3(team0) entered blocking state [ 1302.253430] bridge0: port 3(team0) entered disabled state [ 1302.293408] device team0 entered promiscuous mode [ 1302.312580] device team_slave_0 entered promiscuous mode [ 1302.321518] device team0 left promiscuous mode [ 1302.332891] device team_slave_0 left promiscuous mode [ 1302.390991] device team_slave_1 left promiscuous mode [ 1302.403851] bridge0: port 3(team0) entered disabled state [ 1302.420316] bond0: team0 is up - this may be due to an out of date ifenslave [ 1302.434825] bridge0: port 3(team0) entered blocking state [ 1302.441499] bridge0: port 3(team0) entered disabled state [ 1302.449219] device team0 entered promiscuous mode [ 1302.454880] device team_slave_0 entered promiscuous mode [ 1302.462166] device team_slave_1 entered promiscuous mode [ 1302.470686] bridge0: port 3(team0) entered blocking state [ 1302.476603] bridge0: port 3(team0) entered forwarding state [ 1302.491195] device team0 left promiscuous mode [ 1302.499186] device team_slave_0 left promiscuous mode [ 1302.532028] bridge0: port 3(team0) entered disabled state [ 1302.571905] bond0: team0 is up - this may be due to an out of date ifenslave [ 1302.592151] device team0 left promiscuous mode [ 1302.604948] device team_slave_0 left promiscuous mode [ 1302.622171] device team_slave_1 left promiscuous mode [ 1302.654881] bridge0: port 3(team0) entered disabled state [ 1302.703131] bond0: team0 is up - this may be due to an out of date ifenslave [ 1302.749296] bridge0: port 3(team0) entered blocking state [ 1302.754920] bridge0: port 3(team0) entered disabled state [ 1302.766849] device team0 entered promiscuous mode [ 1302.772570] device team_slave_0 entered promiscuous mode [ 1302.781408] bridge0: port 3(team0) entered blocking state [ 1302.787076] bridge0: port 3(team0) entered forwarding state [ 1302.795311] bridge0: port 3(team0) entered blocking state [ 1302.802609] bridge0: port 3(team0) entered disabled state [ 1302.834077] device team0 entered promiscuous mode 20:53:49 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x8100, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:53:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x5452, 0x0) 20:53:49 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000090010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:53:49 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:49 executing program 1: shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1302.854202] device team_slave_0 entered promiscuous mode [ 1302.861388] device team_slave_1 entered promiscuous mode [ 1302.868972] bridge0: port 3(team0) entered blocking state [ 1302.874604] bridge0: port 3(team0) entered forwarding state [ 1302.946719] NILFS (loop3): couldn't find nilfs on the device [ 1302.963231] device team0 left promiscuous mode [ 1302.997815] device team_slave_0 left promiscuous mode [ 1303.007087] device team_slave_1 left promiscuous mode [ 1303.016063] bridge0: port 3(team0) entered disabled state [ 1303.033942] bond0: team0 is up - this may be due to an out of date ifenslave 20:53:49 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000c0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1303.048016] NILFS (loop3): couldn't find nilfs on the device [ 1303.074227] device team0 left promiscuous mode [ 1303.089001] device team_slave_0 left promiscuous mode [ 1303.162958] bridge0: port 3(team0) entered disabled state [ 1303.210008] NILFS (loop3): couldn't find nilfs on the device [ 1303.322434] NILFS (loop3): couldn't find nilfs on the device 20:53:49 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000120010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1303.387199] 8021q: adding VLAN 0 to HW filter on device team0 [ 1303.472142] device team0 entered promiscuous mode [ 1303.482617] device team_slave_0 entered promiscuous mode [ 1303.518960] bond0: Enslaving team0 as an active interface with an up link [ 1303.549526] device team0 left promiscuous mode [ 1303.554471] device team_slave_0 left promiscuous mode [ 1303.554479] NILFS (loop3): couldn't find nilfs on the device [ 1303.555796] device team_slave_1 left promiscuous mode [ 1303.612141] NILFS (loop3): couldn't find nilfs on the device [ 1303.641977] bridge0: port 3(team0) entered disabled state 20:53:49 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000200010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1303.759430] bond0: team0 is up - this may be due to an out of date ifenslave [ 1303.766970] bridge0: port 3(team0) entered blocking state [ 1303.779047] bridge0: port 3(team0) entered disabled state [ 1303.813115] NILFS (loop3): couldn't find nilfs on the device [ 1303.835410] device team0 entered promiscuous mode 20:53:50 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000230010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1303.880093] device team_slave_0 entered promiscuous mode [ 1303.909816] device team_slave_1 entered promiscuous mode [ 1303.932275] bridge0: port 3(team0) entered blocking state [ 1303.937946] bridge0: port 3(team0) entered forwarding state 20:53:50 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x1000000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1303.984229] bond0: Releasing backup interface team0 [ 1303.989969] device team0 left promiscuous mode [ 1304.005335] device team_slave_0 left promiscuous mode [ 1304.014114] NILFS (loop3): couldn't find nilfs on the device 20:53:50 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x545d, 0x0) [ 1304.116552] NILFS (loop3): couldn't find nilfs on the device 20:53:50 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000034340010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1304.288913] NILFS (loop3): couldn't find nilfs on the device 20:53:50 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000003f0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:53:50 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000400010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1304.557154] NILFS (loop3): couldn't find nilfs on the device [ 1304.698755] bridge0: port 3(team0) entered blocking state [ 1304.724647] bridge0: port 3(team0) entered disabled state 20:53:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1304.744855] device team0 entered promiscuous mode [ 1304.758940] device team_slave_0 entered promiscuous mode [ 1304.776556] validate_nla: 14 callbacks suppressed [ 1304.776565] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1304.790156] device team0 left promiscuous mode [ 1304.820044] device team_slave_0 left promiscuous mode [ 1304.845148] bridge0: port 3(team0) entered disabled state [ 1304.878707] bond0: team0 is up - this may be due to an out of date ifenslave [ 1304.900895] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1304.936368] bridge0: port 3(team0) entered blocking state [ 1304.954155] bridge0: port 3(team0) entered disabled state [ 1304.962351] device team0 entered promiscuous mode [ 1304.967391] device team_slave_0 entered promiscuous mode [ 1304.975004] device team_slave_1 entered promiscuous mode [ 1304.985698] bridge0: port 3(team0) entered blocking state [ 1304.991405] bridge0: port 3(team0) entered forwarding state 20:53:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1305.001177] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1305.015510] bridge0: port 3(team0) entered blocking state [ 1305.046634] bridge0: port 3(team0) entered disabled state [ 1305.071057] device team0 entered promiscuous mode [ 1305.080813] device team_slave_0 entered promiscuous mode [ 1305.106929] bridge0: port 3(team0) entered blocking state [ 1305.112642] bridge0: port 3(team0) entered forwarding state 20:53:51 executing program 1: shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:51 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000480010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:53:51 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x5460, 0x0) [ 1305.183978] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1305.191539] device team0 left promiscuous mode [ 1305.224716] device team_slave_0 left promiscuous mode [ 1305.235559] NILFS (loop3): couldn't find nilfs on the device [ 1305.241909] device team_slave_1 left promiscuous mode [ 1305.249544] bridge0: port 3(team0) entered disabled state [ 1305.268395] bond0: team0 is up - this may be due to an out of date ifenslave [ 1305.302566] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1305.314029] NILFS (loop3): couldn't find nilfs on the device [ 1305.315810] bridge0: port 3(team0) entered blocking state 20:53:51 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000004c0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1305.370614] bridge0: port 3(team0) entered disabled state [ 1305.409277] device team0 entered promiscuous mode [ 1305.419433] device team_slave_0 entered promiscuous mode [ 1305.436102] NILFS (loop3): couldn't find nilfs on the device [ 1305.447173] device team_slave_1 entered promiscuous mode 20:53:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x2000000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1305.469434] bridge0: port 3(team0) entered blocking state [ 1305.475166] bridge0: port 3(team0) entered forwarding state [ 1305.498995] NILFS (loop3): couldn't find nilfs on the device [ 1305.508398] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 20:53:51 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000600010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1305.523898] device team0 left promiscuous mode [ 1305.532309] device team_slave_0 left promiscuous mode [ 1305.589676] device team_slave_1 left promiscuous mode [ 1305.609694] bridge0: port 3(team0) entered disabled state [ 1305.625184] NILFS (loop3): couldn't find nilfs on the device [ 1305.672157] bond0: team0 is up - this may be due to an out of date ifenslave [ 1305.681504] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1305.696059] bridge0: port 3(team0) entered blocking state [ 1305.701881] bridge0: port 3(team0) entered disabled state [ 1305.712089] device team0 entered promiscuous mode 20:53:51 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000680010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1305.718446] device team_slave_0 entered promiscuous mode [ 1305.725925] NILFS (loop3): couldn't find nilfs on the device [ 1305.735070] device team_slave_1 entered promiscuous mode [ 1305.742284] bridge0: port 3(team0) entered blocking state [ 1305.748006] bridge0: port 3(team0) entered forwarding state [ 1305.778887] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1305.790016] device team0 left promiscuous mode [ 1305.800253] device team_slave_0 left promiscuous mode [ 1305.809781] bridge0: port 3(team0) entered disabled state [ 1305.820992] NILFS (loop3): couldn't find nilfs on the device 20:53:52 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1305.831608] 8021q: adding VLAN 0 to HW filter on device team0 [ 1305.840695] device team0 entered promiscuous mode [ 1305.848450] device team_slave_0 entered promiscuous mode [ 1305.879344] bond0: Enslaving team0 as an active interface with an up link [ 1305.890756] NILFS (loop3): couldn't find nilfs on the device [ 1305.899544] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1305.917200] bond0: Releasing backup interface team0 20:53:52 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000002786b0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1305.941047] device team0 left promiscuous mode [ 1305.960902] device team_slave_0 left promiscuous mode [ 1305.984366] NILFS (loop3): couldn't find nilfs on the device [ 1306.024725] NILFS (loop3): couldn't find nilfs on the device 20:53:52 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000006c0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:53:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x40049409, 0x0) [ 1306.143424] NILFS (loop3): couldn't find nilfs on the device [ 1306.200896] NILFS (loop3): couldn't find nilfs on the device [ 1306.301715] bridge0: port 3(team0) entered blocking state [ 1306.322491] bridge0: port 3(team0) entered disabled state [ 1306.339494] device team0 entered promiscuous mode [ 1306.344375] device team_slave_0 entered promiscuous mode [ 1306.366955] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1306.374501] device team0 left promiscuous mode [ 1306.403283] device team_slave_0 left promiscuous mode [ 1306.421553] bridge0: port 3(team0) entered disabled state [ 1306.442917] bond0: team0 is up - this may be due to an out of date ifenslave [ 1306.474352] bridge0: port 3(team0) entered blocking state [ 1306.486020] bridge0: port 3(team0) entered disabled state [ 1306.505755] device team0 entered promiscuous mode [ 1306.528856] device team_slave_0 entered promiscuous mode [ 1306.534971] bridge0: port 3(team0) entered blocking state [ 1306.540644] bridge0: port 3(team0) entered forwarding state [ 1306.593858] device team0 left promiscuous mode [ 1306.600935] device team_slave_0 left promiscuous mode [ 1306.606302] device team_slave_1 left promiscuous mode 20:53:52 executing program 1: shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:52 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000002786c0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:53:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1306.650735] bridge0: port 3(team0) entered disabled state [ 1306.689436] bond0: team0 is up - this may be due to an out of date ifenslave [ 1306.696804] bridge0: port 3(team0) entered blocking state [ 1306.703591] bridge0: port 3(team0) entered disabled state [ 1306.723446] device team0 entered promiscuous mode [ 1306.731016] NILFS (loop3): couldn't find nilfs on the device [ 1306.770166] NILFS (loop3): couldn't find nilfs on the device [ 1306.787818] device team_slave_0 entered promiscuous mode 20:53:52 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000002786d0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:53:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x4020940d, 0x0) 20:53:53 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x4000000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1306.827025] device team_slave_1 entered promiscuous mode [ 1306.854956] bridge0: port 3(team0) entered blocking state [ 1306.860703] bridge0: port 3(team0) entered forwarding state [ 1306.867731] device team0 left promiscuous mode [ 1306.876197] device team_slave_0 left promiscuous mode [ 1306.895525] device team_slave_1 left promiscuous mode [ 1306.905299] NILFS (loop3): couldn't find nilfs on the device [ 1306.911684] bridge0: port 3(team0) entered disabled state [ 1306.925833] bond0: team0 is up - this may be due to an out of date ifenslave [ 1306.947719] NILFS (loop3): couldn't find nilfs on the device [ 1306.955948] bridge0: port 3(team0) entered blocking state [ 1306.970123] bridge0: port 3(team0) entered disabled state [ 1306.986559] device team0 entered promiscuous mode 20:53:53 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000002786e0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1307.014139] device team_slave_0 entered promiscuous mode [ 1307.030614] device team_slave_1 entered promiscuous mode [ 1307.045068] bridge0: port 3(team0) entered blocking state [ 1307.050763] bridge0: port 3(team0) entered forwarding state 20:53:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1307.062315] NILFS (loop3): couldn't find nilfs on the device [ 1307.070286] device team0 left promiscuous mode [ 1307.074974] device team_slave_0 left promiscuous mode [ 1307.085413] bridge0: port 3(team0) entered disabled state [ 1307.104011] 8021q: adding VLAN 0 to HW filter on device team0 [ 1307.110729] NILFS (loop3): couldn't find nilfs on the device [ 1307.117921] device team0 entered promiscuous mode [ 1307.135019] device team_slave_0 entered promiscuous mode 20:53:53 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000002786f0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1307.174261] bond0: Enslaving team0 as an active interface with an up link [ 1307.193892] bond0: Releasing backup interface team0 [ 1307.199578] device team0 left promiscuous mode [ 1307.218040] device team_slave_0 left promiscuous mode [ 1307.235494] NILFS (loop3): couldn't find nilfs on the device [ 1307.280239] NILFS (loop3): couldn't find nilfs on the device 20:53:53 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000278700010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1307.446483] NILFS (loop3): couldn't find nilfs on the device [ 1307.493163] NILFS (loop3): couldn't find nilfs on the device [ 1307.529692] bridge0: port 3(team0) entered blocking state 20:53:53 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000278710010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1307.540150] bridge0: port 3(team0) entered disabled state [ 1307.556969] device team0 entered promiscuous mode [ 1307.566831] device team_slave_0 entered promiscuous mode 20:53:53 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1307.612983] device team0 left promiscuous mode [ 1307.618022] device team_slave_0 left promiscuous mode [ 1307.635958] NILFS (loop3): couldn't find nilfs on the device [ 1307.649271] bridge0: port 3(team0) entered disabled state [ 1307.676076] bond0: team0 is up - this may be due to an out of date ifenslave [ 1307.688870] bridge0: port 3(team0) entered blocking state [ 1307.708313] bridge0: port 3(team0) entered disabled state [ 1307.717066] NILFS (loop3): couldn't find nilfs on the device [ 1307.735910] device team0 entered promiscuous mode [ 1307.740795] device team_slave_0 entered promiscuous mode [ 1307.748558] bridge0: port 3(team0) entered blocking state [ 1307.754230] bridge0: port 3(team0) entered forwarding state [ 1307.761998] device team0 left promiscuous mode [ 1307.779987] device team_slave_0 left promiscuous mode 20:53:53 executing program 1: socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x404c4701, 0x0) 20:53:53 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000278720010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1307.798167] device team_slave_1 left promiscuous mode [ 1307.812164] bridge0: port 3(team0) entered disabled state [ 1307.827927] bond0: team0 is up - this may be due to an out of date ifenslave [ 1307.847734] bridge0: port 3(team0) entered blocking state [ 1307.856868] bridge0: port 3(team0) entered disabled state [ 1307.875673] NILFS (loop3): couldn't find nilfs on the device [ 1307.896837] device team0 entered promiscuous mode [ 1307.919521] device team_slave_0 entered promiscuous mode [ 1307.952662] NILFS (loop3): couldn't find nilfs on the device 20:53:54 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000740010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1307.979534] device team_slave_1 entered promiscuous mode [ 1308.005200] bridge0: port 3(team0) entered blocking state [ 1308.010915] bridge0: port 3(team0) entered forwarding state 20:53:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x6000000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1308.047531] device team0 left promiscuous mode [ 1308.052202] device team_slave_0 left promiscuous mode [ 1308.068780] NILFS (loop3): couldn't find nilfs on the device [ 1308.081252] device team_slave_1 left promiscuous mode [ 1308.106970] bridge0: port 3(team0) entered disabled state [ 1308.122802] NILFS (loop3): couldn't find nilfs on the device [ 1308.131645] bond0: team0 is up - this may be due to an out of date ifenslave [ 1308.149620] bridge0: port 3(team0) entered blocking state 20:53:54 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000007a0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1308.159026] bridge0: port 3(team0) entered disabled state [ 1308.186031] device team0 entered promiscuous mode [ 1308.191045] device team_slave_0 entered promiscuous mode [ 1308.228539] device team_slave_1 entered promiscuous mode [ 1308.244439] NILFS (loop3): couldn't find nilfs on the device [ 1308.248116] bridge0: port 3(team0) entered blocking state [ 1308.255927] bridge0: port 3(team0) entered forwarding state 20:53:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:54 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000060880010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1308.340069] device team0 left promiscuous mode [ 1308.355416] device team_slave_0 left promiscuous mode [ 1308.408453] bridge0: port 3(team0) entered disabled state [ 1308.485311] 8021q: adding VLAN 0 to HW filter on device team0 [ 1308.504051] NILFS (loop3): couldn't find nilfs on the device 20:53:54 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000ffffff8c0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1308.569034] device team0 entered promiscuous mode [ 1308.592449] device team_slave_0 entered promiscuous mode [ 1308.613801] bond0: Enslaving team0 as an active interface with an up link [ 1308.655228] bond0: Releasing backup interface team0 [ 1308.663898] device team0 left promiscuous mode [ 1308.683975] NILFS (loop3): couldn't find nilfs on the device [ 1308.694540] device team_slave_0 left promiscuous mode 20:53:54 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000ffffffe40010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:53:54 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x80045432, 0x0) [ 1309.251444] bridge0: port 3(team0) entered blocking state [ 1309.257067] bridge0: port 3(team0) entered disabled state [ 1309.299003] device team0 entered promiscuous mode 20:53:55 executing program 5: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1309.321575] device team_slave_0 entered promiscuous mode [ 1309.338593] device team0 left promiscuous mode [ 1309.344604] device team_slave_0 left promiscuous mode [ 1309.400562] bridge0: port 3(team0) entered disabled state [ 1309.421328] bond0: team0 is up - this may be due to an out of date ifenslave [ 1309.450066] bridge0: port 3(team0) entered blocking state [ 1309.457097] bridge0: port 3(team0) entered disabled state [ 1309.501481] device team0 entered promiscuous mode [ 1309.525606] device team_slave_0 entered promiscuous mode [ 1309.538071] bridge0: port 3(team0) entered blocking state [ 1309.543785] bridge0: port 3(team0) entered forwarding state [ 1309.557505] device team0 left promiscuous mode [ 1309.562233] device team_slave_0 left promiscuous mode [ 1309.567599] device team_slave_1 left promiscuous mode 20:53:55 executing program 1: socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:55 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000fffffff50010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:53:55 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x80045440, 0x0) [ 1309.599685] bridge0: port 3(team0) entered disabled state [ 1309.625562] bond0: team0 is up - this may be due to an out of date ifenslave [ 1309.643338] NILFS (loop3): couldn't find nilfs on the device [ 1309.643682] bridge0: port 3(team0) entered blocking state 20:53:55 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000fffffff60010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1309.677175] bridge0: port 3(team0) entered disabled state [ 1309.701404] device team0 entered promiscuous mode [ 1309.713913] NILFS (loop3): couldn't find nilfs on the device [ 1309.770745] device team_slave_0 entered promiscuous mode [ 1309.789587] device team_slave_1 entered promiscuous mode [ 1309.796910] bridge0: port 3(team0) entered blocking state [ 1309.802611] bridge0: port 3(team0) entered forwarding state [ 1309.811227] validate_nla: 19 callbacks suppressed 20:53:55 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x7000000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1309.811235] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1309.852923] device team0 left promiscuous mode 20:53:56 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000fffffffb0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1309.877905] device team_slave_0 left promiscuous mode [ 1309.910562] device team_slave_1 left promiscuous mode [ 1309.929732] bridge0: port 3(team0) entered disabled state [ 1309.939300] NILFS (loop3): couldn't find nilfs on the device [ 1309.946649] bond0: team0 is up - this may be due to an out of date ifenslave [ 1309.968022] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1309.999492] bridge0: port 3(team0) entered blocking state [ 1310.011290] NILFS (loop3): couldn't find nilfs on the device [ 1310.023199] bridge0: port 3(team0) entered disabled state [ 1310.034648] device team0 entered promiscuous mode [ 1310.039921] device team_slave_0 entered promiscuous mode 20:53:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:56 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000407fc0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1310.073091] device team_slave_1 entered promiscuous mode [ 1310.092704] bridge0: port 3(team0) entered blocking state [ 1310.098471] bridge0: port 3(team0) entered forwarding state [ 1310.109031] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1310.147832] device team0 left promiscuous mode [ 1310.151208] NILFS (loop3): couldn't find nilfs on the device [ 1310.152625] device team_slave_0 left promiscuous mode [ 1310.252727] bridge0: port 3(team0) entered disabled state [ 1310.259934] NILFS (loop3): couldn't find nilfs on the device 20:53:56 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000101fe0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1310.312528] 8021q: adding VLAN 0 to HW filter on device team0 [ 1310.377820] device team0 entered promiscuous mode [ 1310.403423] device team_slave_0 entered promiscuous mode [ 1310.426626] bond0: Enslaving team0 as an active interface with an up link [ 1310.445276] NILFS (loop3): couldn't find nilfs on the device [ 1310.501966] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1310.530072] bond0: Releasing backup interface team0 [ 1310.543321] device team0 left promiscuous mode 20:53:56 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1310.551518] device team_slave_0 left promiscuous mode 20:53:56 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000fff0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1310.782968] NILFS (loop3): couldn't find nilfs on the device [ 1311.151746] bridge0: port 3(team0) entered blocking state [ 1311.158047] bridge0: port 3(team0) entered disabled state [ 1311.180919] device team0 entered promiscuous mode [ 1311.185811] device team_slave_0 entered promiscuous mode 20:53:57 executing program 5: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1311.198414] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1311.219490] device team0 left promiscuous mode [ 1311.235762] device team_slave_0 left promiscuous mode [ 1311.248785] bridge0: port 3(team0) entered disabled state [ 1311.264391] bond0: team0 is up - this may be due to an out of date ifenslave [ 1311.286343] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1311.308046] bridge0: port 3(team0) entered blocking state [ 1311.364518] bridge0: port 3(team0) entered disabled state [ 1311.383516] device team0 entered promiscuous mode [ 1311.388533] device team_slave_0 entered promiscuous mode [ 1311.399335] bridge0: port 3(team0) entered blocking state [ 1311.405064] bridge0: port 3(team0) entered forwarding state [ 1311.417574] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1311.427560] device team0 left promiscuous mode [ 1311.450144] device team_slave_0 left promiscuous mode 20:53:57 executing program 1: socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:57 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000080ff0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:53:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0xc0045878, 0x0) [ 1311.465211] device team_slave_1 left promiscuous mode [ 1311.487192] bridge0: port 3(team0) entered disabled state [ 1311.510376] bond0: team0 is up - this may be due to an out of date ifenslave [ 1311.510665] NILFS (loop3): couldn't find nilfs on the device [ 1311.531580] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1311.539805] bridge0: port 3(team0) entered blocking state [ 1311.660380] bridge0: port 3(team0) entered disabled state [ 1311.756231] NILFS (loop3): couldn't find nilfs on the device [ 1311.762392] device team0 entered promiscuous mode [ 1311.808161] device team_slave_0 entered promiscuous mode [ 1311.850414] device team_slave_1 entered promiscuous mode [ 1311.883082] bridge0: port 3(team0) entered blocking state [ 1311.888813] bridge0: port 3(team0) entered forwarding state 20:53:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x8000000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:53:58 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000003ffff0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:53:58 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1311.904277] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1311.933875] device team0 left promiscuous mode [ 1311.945002] device team_slave_0 left promiscuous mode [ 1311.969368] bridge0: port 3(team0) entered disabled state [ 1311.980280] NILFS (loop3): couldn't find nilfs on the device [ 1312.093085] NILFS (loop3): couldn't find nilfs on the device [ 1312.107537] 8021q: adding VLAN 0 to HW filter on device team0 [ 1312.116615] device team0 entered promiscuous mode [ 1312.122918] device team_slave_0 entered promiscuous mode 20:53:58 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000001fffff0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1312.140647] bond0: Enslaving team0 as an active interface with an up link [ 1312.153748] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1312.186327] bond0: Releasing backup interface team0 [ 1312.211858] device team0 left promiscuous mode [ 1312.255946] NILFS (loop3): couldn't find nilfs on the device [ 1312.269952] device team_slave_0 left promiscuous mode 20:53:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0xc0045878, 0x0) [ 1312.321702] NILFS (loop3): couldn't find nilfs on the device 20:53:58 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000007fffffff0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1312.446409] NILFS (loop3): couldn't find nilfs on the device [ 1312.518515] NILFS (loop3): couldn't find nilfs on the device 20:53:58 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000008cffffff0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1312.647211] NILFS (loop3): couldn't find nilfs on the device [ 1312.747375] NILFS (loop3): couldn't find nilfs on the device [ 1312.848061] bridge0: port 3(team0) entered blocking state [ 1312.886338] bridge0: port 3(team0) entered disabled state [ 1312.902236] device team0 entered promiscuous mode [ 1312.916058] device team_slave_0 entered promiscuous mode [ 1312.935973] device team0 left promiscuous mode [ 1312.940822] device team_slave_0 left promiscuous mode 20:53:59 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000e4ffffff0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1312.963010] bridge0: port 3(team0) entered disabled state [ 1312.995140] bond0: team0 is up - this may be due to an out of date ifenslave [ 1313.028213] bridge0: port 3(team0) entered blocking state [ 1313.041098] bridge0: port 3(team0) entered disabled state [ 1313.053100] NILFS (loop3): couldn't find nilfs on the device [ 1313.054283] device team0 entered promiscuous mode [ 1313.066064] device team_slave_0 entered promiscuous mode 20:53:59 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:59 executing program 5: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0xc0189436, 0x0) [ 1313.076961] bridge0: port 3(team0) entered blocking state [ 1313.082647] bridge0: port 3(team0) entered forwarding state [ 1313.089298] device team0 left promiscuous mode [ 1313.104200] device team_slave_0 left promiscuous mode [ 1313.123878] NILFS (loop3): couldn't find nilfs on the device [ 1313.144632] device team_slave_1 left promiscuous mode [ 1313.164143] bridge0: port 3(team0) entered disabled state 20:53:59 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000f5ffffff0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1313.197099] bond0: team0 is up - this may be due to an out of date ifenslave [ 1313.208891] device team0 left promiscuous mode [ 1313.225811] device team_slave_0 left promiscuous mode [ 1313.235933] device team_slave_1 left promiscuous mode [ 1313.247659] bridge0: port 3(team0) entered disabled state [ 1313.258709] bond0: team0 is up - this may be due to an out of date ifenslave [ 1313.270751] bridge0: port 3(team0) entered blocking state [ 1313.278352] NILFS (loop3): couldn't find nilfs on the device [ 1313.282596] bridge0: port 3(team0) entered disabled state [ 1313.298354] device team0 entered promiscuous mode [ 1313.311230] device team_slave_0 entered promiscuous mode [ 1313.365870] device team_slave_1 entered promiscuous mode [ 1313.376383] NILFS (loop3): couldn't find nilfs on the device [ 1313.411826] bridge0: port 3(team0) entered blocking state [ 1313.417540] bridge0: port 3(team0) entered forwarding state 20:53:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xa000000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:53:59 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000f6ffffff0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1313.499294] bridge0: port 3(team0) entered blocking state [ 1313.505257] bridge0: port 3(team0) entered disabled state [ 1313.541902] device team0 entered promiscuous mode [ 1313.572617] NILFS (loop3): couldn't find nilfs on the device [ 1313.572750] device team_slave_0 entered promiscuous mode [ 1313.629442] device team_slave_1 entered promiscuous mode [ 1313.639479] bridge0: port 3(team0) entered blocking state [ 1313.645212] bridge0: port 3(team0) entered forwarding state [ 1313.658172] device team0 left promiscuous mode [ 1313.663899] device team_slave_0 left promiscuous mode 20:53:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:53:59 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000fbffffff0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1313.701297] bridge0: port 3(team0) entered disabled state [ 1313.814513] NILFS (loop3): couldn't find nilfs on the device [ 1313.841229] 8021q: adding VLAN 0 to HW filter on device team0 [ 1313.906811] device team0 entered promiscuous mode [ 1313.915838] device team_slave_0 entered promiscuous mode 20:54:00 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000000000400000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1313.972816] bond0: Enslaving team0 as an active interface with an up link [ 1313.980938] device team0 left promiscuous mode [ 1313.993323] device team_slave_0 left promiscuous mode [ 1314.005424] bridge0: port 3(team0) entered disabled state [ 1314.015814] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:00 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000000000800000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1314.046333] bond0: Releasing backup interface team0 [ 1314.056026] NILFS (loop3): couldn't find nilfs on the device [ 1314.062765] device team0 left promiscuous mode [ 1314.068833] device team_slave_0 left promiscuous mode 20:54:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0xc020660b, 0x0) [ 1314.208422] NILFS (loop3): couldn't find nilfs on the device [ 1314.274377] NILFS (loop3): couldn't find nilfs on the device 20:54:00 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000032a800000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1314.391878] NILFS (loop3): couldn't find nilfs on the device [ 1314.556184] bridge0: port 3(team0) entered blocking state [ 1314.584394] bridge0: port 3(team0) entered disabled state [ 1314.603975] device team0 entered promiscuous mode [ 1314.614358] device team_slave_0 entered promiscuous mode [ 1314.631403] bridge0: port 3(team0) entered blocking state [ 1314.637256] bridge0: port 3(team0) entered disabled state [ 1314.686071] device team0 entered promiscuous mode [ 1314.700540] device team_slave_0 entered promiscuous mode [ 1314.733486] bridge0: port 3(team0) entered blocking state [ 1314.739160] bridge0: port 3(team0) entered forwarding state 20:54:00 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:00 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000032ac00000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:00 executing program 5: shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1314.830693] device team0 left promiscuous mode [ 1314.836897] device team_slave_0 left promiscuous mode [ 1314.856124] device team_slave_1 left promiscuous mode [ 1314.870682] bridge0: port 3(team0) entered disabled state [ 1314.893264] bond0: team0 is up - this may be due to an out of date ifenslave [ 1314.905487] validate_nla: 11 callbacks suppressed [ 1314.905496] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1314.944542] bridge0: port 3(team0) entered blocking state [ 1314.947074] NILFS (loop3): couldn't find nilfs on the device [ 1314.985848] bridge0: port 3(team0) entered disabled state [ 1315.016284] device team0 entered promiscuous mode [ 1315.030850] device team_slave_0 entered promiscuous mode 20:54:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x4000) [ 1315.072002] device team_slave_1 entered promiscuous mode [ 1315.097009] bridge0: port 3(team0) entered blocking state [ 1315.104124] bridge0: port 3(team0) entered forwarding state 20:54:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xc000000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:01 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000032b000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1315.125675] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1315.134292] device team0 left promiscuous mode [ 1315.139088] device team_slave_0 left promiscuous mode [ 1315.173086] NILFS (loop3): couldn't find nilfs on the device [ 1315.184181] device team_slave_1 left promiscuous mode [ 1315.189836] bridge0: port 3(team0) entered disabled state [ 1315.203593] bond0: team0 is up - this may be due to an out of date ifenslave [ 1315.212856] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1315.253965] NILFS (loop3): couldn't find nilfs on the device [ 1315.258603] bridge0: port 3(team0) entered blocking state [ 1315.267756] bridge0: port 3(team0) entered disabled state [ 1315.280570] device team0 entered promiscuous mode [ 1315.287528] device team_slave_0 entered promiscuous mode [ 1315.293564] device team_slave_1 entered promiscuous mode [ 1315.313517] bridge0: port 3(team0) entered blocking state [ 1315.319199] bridge0: port 3(team0) entered forwarding state [ 1315.334492] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1315.349872] device team0 left promiscuous mode 20:54:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:01 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000032b400000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1315.368197] device team_slave_0 left promiscuous mode [ 1315.374853] bridge0: port 3(team0) entered disabled state [ 1315.396044] bond0: team0 is up - this may be due to an out of date ifenslave [ 1315.407192] NILFS (loop3): couldn't find nilfs on the device [ 1315.410690] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1315.465715] device team0 left promiscuous mode [ 1315.478984] device team_slave_0 left promiscuous mode [ 1315.498729] bridge0: port 3(team0) entered disabled state [ 1315.570697] NILFS (loop3): couldn't find nilfs on the device 20:54:01 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000032bc00000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1315.684903] 8021q: adding VLAN 0 to HW filter on device team0 [ 1315.755398] device team0 entered promiscuous mode [ 1315.771817] device team_slave_0 entered promiscuous mode [ 1315.809826] NILFS (loop3): couldn't find nilfs on the device [ 1315.833147] bond0: Enslaving team0 as an active interface with an up link 20:54:02 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000200000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1315.942353] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1315.961114] bridge0: port 3(team0) entered blocking state [ 1315.998623] bridge0: port 3(team0) entered disabled state [ 1316.008320] device team0 entered promiscuous mode [ 1316.015029] device team_slave_0 entered promiscuous mode [ 1316.025717] bridge0: port 3(team0) entered blocking state [ 1316.026266] NILFS (loop3): couldn't find nilfs on the device [ 1316.031446] bridge0: port 3(team0) entered forwarding state [ 1316.034097] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 20:54:02 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:02 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000300000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1316.108472] bond0: Releasing backup interface team0 [ 1316.117549] device team0 left promiscuous mode [ 1316.125982] device team_slave_0 left promiscuous mode [ 1316.250368] NILFS (loop3): couldn't find nilfs on the device 20:54:02 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000400000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x9700) [ 1316.420898] NILFS (loop3): couldn't find nilfs on the device [ 1316.659590] bridge0: port 3(team0) entered blocking state [ 1316.681403] bridge0: port 3(team0) entered disabled state [ 1316.703380] device team0 entered promiscuous mode [ 1316.721431] device team_slave_0 entered promiscuous mode [ 1316.741817] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 20:54:02 executing program 5: shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:02 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000500000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1316.771781] device team0 left promiscuous mode [ 1316.807370] device team_slave_0 left promiscuous mode [ 1316.824659] device team_slave_1 left promiscuous mode [ 1316.834659] NILFS (loop3): couldn't find nilfs on the device [ 1316.890980] bridge0: port 3(team0) entered disabled state [ 1316.938331] NILFS (loop3): couldn't find nilfs on the device [ 1316.947367] bond0: team0 is up - this may be due to an out of date ifenslave [ 1316.967644] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1316.975263] bridge0: port 3(team0) entered blocking state [ 1317.000788] bridge0: port 3(team0) entered disabled state [ 1317.019477] device team0 entered promiscuous mode [ 1317.024455] device team_slave_0 entered promiscuous mode [ 1317.045751] device team_slave_1 entered promiscuous mode [ 1317.059647] bridge0: port 3(team0) entered blocking state [ 1317.065270] bridge0: port 3(team0) entered forwarding state 20:54:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xe000000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:03 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000600000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1317.104365] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1317.133429] device team0 left promiscuous mode [ 1317.158946] NILFS (loop3): couldn't find nilfs on the device [ 1317.162747] device team_slave_0 left promiscuous mode [ 1317.183657] device team_slave_1 left promiscuous mode [ 1317.194075] bridge0: port 3(team0) entered disabled state [ 1317.207267] bond0: team0 is up - this may be due to an out of date ifenslave [ 1317.214741] NILFS (loop3): couldn't find nilfs on the device [ 1317.220669] bridge0: port 3(team0) entered blocking state [ 1317.233042] bridge0: port 3(team0) entered disabled state [ 1317.252449] device team0 entered promiscuous mode [ 1317.261765] device team_slave_0 entered promiscuous mode [ 1317.267604] device team_slave_1 entered promiscuous mode [ 1317.277574] bridge0: port 3(team0) entered blocking state [ 1317.283312] bridge0: port 3(team0) entered forwarding state [ 1317.296569] device team0 left promiscuous mode [ 1317.301644] device team_slave_0 left promiscuous mode 20:54:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x104000) 20:54:03 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000700000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1317.319170] bridge0: port 3(team0) entered disabled state [ 1317.354219] bond0: team0 is up - this may be due to an out of date ifenslave [ 1317.404349] bridge0: port 3(team0) entered blocking state [ 1317.411505] bridge0: port 3(team0) entered disabled state [ 1317.435940] device team0 entered promiscuous mode [ 1317.450204] NILFS (loop3): couldn't find nilfs on the device [ 1317.450242] device team_slave_0 entered promiscuous mode [ 1317.474772] bridge0: port 3(team0) entered blocking state [ 1317.480536] bridge0: port 3(team0) entered forwarding state [ 1317.503358] device team0 left promiscuous mode [ 1317.508643] device team_slave_0 left promiscuous mode 20:54:03 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1317.548507] bridge0: port 3(team0) entered disabled state [ 1317.551867] NILFS (loop3): couldn't find nilfs on the device 20:54:03 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000800000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1317.646754] 8021q: adding VLAN 0 to HW filter on device team0 [ 1317.654415] device team0 entered promiscuous mode [ 1317.659885] device team_slave_0 entered promiscuous mode [ 1317.667563] bond0: Enslaving team0 as an active interface with an up link [ 1317.676222] bond0: Releasing backup interface team0 [ 1317.692136] device team0 left promiscuous mode [ 1317.709985] device team_slave_0 left promiscuous mode [ 1317.735153] NILFS (loop3): couldn't find nilfs on the device [ 1317.812843] NILFS (loop3): couldn't find nilfs on the device 20:54:04 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000900000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1317.993900] NILFS (loop3): couldn't find nilfs on the device [ 1318.050666] NILFS (loop3): couldn't find nilfs on the device 20:54:04 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000c00000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1318.198573] NILFS (loop3): couldn't find nilfs on the device 20:54:04 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000001200000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1318.319306] bridge0: port 3(team0) entered blocking state [ 1318.341339] bridge0: port 3(team0) entered disabled state [ 1318.373605] device team0 entered promiscuous mode [ 1318.391234] device team_slave_0 entered promiscuous mode [ 1318.402666] device team0 left promiscuous mode [ 1318.408133] device team_slave_0 left promiscuous mode 20:54:04 executing program 5: shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x105400) [ 1318.420059] device team_slave_1 left promiscuous mode [ 1318.441364] NILFS (loop3): couldn't find nilfs on the device [ 1318.443967] bridge0: port 3(team0) entered disabled state [ 1318.462955] bond0: team0 is up - this may be due to an out of date ifenslave [ 1318.488399] bridge0: port 3(team0) entered blocking state [ 1318.497128] bridge0: port 3(team0) entered disabled state [ 1318.516865] device team0 entered promiscuous mode [ 1318.528952] device team_slave_0 entered promiscuous mode 20:54:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x10000000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:04 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000002300000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1318.538633] device team_slave_1 entered promiscuous mode [ 1318.545831] bridge0: port 3(team0) entered blocking state [ 1318.551529] bridge0: port 3(team0) entered forwarding state [ 1318.560388] device team0 left promiscuous mode [ 1318.565194] device team_slave_0 left promiscuous mode [ 1318.576325] device team_slave_1 left promiscuous mode [ 1318.600360] bridge0: port 3(team0) entered disabled state [ 1318.613524] NILFS (loop3): couldn't find nilfs on the device [ 1318.625259] bond0: team0 is up - this may be due to an out of date ifenslave [ 1318.641966] bridge0: port 3(team0) entered blocking state [ 1318.658046] bridge0: port 3(team0) entered disabled state [ 1318.668498] device team0 entered promiscuous mode [ 1318.674834] device team_slave_0 entered promiscuous mode [ 1318.687160] NILFS (loop3): couldn't find nilfs on the device [ 1318.700407] device team_slave_1 entered promiscuous mode 20:54:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:04 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000004800000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1318.708736] bridge0: port 3(team0) entered blocking state [ 1318.714411] bridge0: port 3(team0) entered forwarding state [ 1318.746443] device team0 left promiscuous mode [ 1318.753247] device team_slave_0 left promiscuous mode [ 1318.783400] bridge0: port 3(team0) entered disabled state [ 1318.795562] NILFS (loop3): couldn't find nilfs on the device [ 1318.807073] bond0: team0 is up - this may be due to an out of date ifenslave [ 1318.835487] bridge0: port 3(team0) entered blocking state [ 1318.844684] bridge0: port 3(team0) entered disabled state [ 1318.864308] NILFS (loop3): couldn't find nilfs on the device [ 1318.866214] device team0 entered promiscuous mode 20:54:05 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000004c00000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1318.889712] device team_slave_0 entered promiscuous mode [ 1318.907162] bridge0: port 3(team0) entered blocking state [ 1318.912868] bridge0: port 3(team0) entered forwarding state [ 1318.974781] device team0 left promiscuous mode [ 1318.986480] device team_slave_0 left promiscuous mode 20:54:05 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1319.037565] bridge0: port 3(team0) entered disabled state 20:54:05 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000006000000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1319.082353] NILFS (loop3): couldn't find nilfs on the device [ 1319.151268] NILFS (loop3): couldn't find nilfs on the device [ 1319.191748] NILFS (loop3): couldn't find nilfs on the device [ 1319.197232] 8021q: adding VLAN 0 to HW filter on device team0 20:54:05 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000006800000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1319.285279] device team0 entered promiscuous mode [ 1319.290270] device team_slave_0 entered promiscuous mode [ 1319.308192] bond0: Enslaving team0 as an active interface with an up link 20:54:05 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x400000) [ 1319.333379] bond0: Releasing backup interface team0 [ 1319.339432] device team0 left promiscuous mode [ 1319.344831] device team_slave_0 left promiscuous mode [ 1319.403870] NILFS (loop3): couldn't find nilfs on the device [ 1319.469927] NILFS (loop3): couldn't find nilfs on the device [ 1319.490772] bridge0: port 3(team0) entered blocking state [ 1319.498415] bridge0: port 3(team0) entered disabled state [ 1319.507048] device team0 entered promiscuous mode 20:54:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1319.517648] device team_slave_0 entered promiscuous mode [ 1319.538995] device team0 left promiscuous mode 20:54:05 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000006c00000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1319.580940] device team_slave_0 left promiscuous mode [ 1319.614894] device team_slave_1 left promiscuous mode [ 1319.630122] NILFS (loop3): couldn't find nilfs on the device [ 1319.633672] bridge0: port 3(team0) entered disabled state [ 1319.660606] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1319.686597] bridge0: port 3(team0) entered blocking state [ 1319.697818] bridge0: port 3(team0) entered disabled state [ 1319.711325] device team0 entered promiscuous mode [ 1319.721737] device team_slave_0 entered promiscuous mode [ 1319.728916] NILFS (loop3): couldn't find nilfs on the device [ 1319.731916] device team_slave_1 entered promiscuous mode [ 1319.756227] bridge0: port 3(team0) entered blocking state [ 1319.761866] bridge0: port 3(team0) entered forwarding state 20:54:05 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x60000000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:05 executing program 5: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1319.858913] device team0 left promiscuous mode [ 1319.863759] device team_slave_0 left promiscuous mode [ 1319.886026] device team_slave_1 left promiscuous mode [ 1319.907728] bridge0: port 3(team0) entered disabled state [ 1319.948334] bond0: team0 is up - this may be due to an out of date ifenslave [ 1319.979942] validate_nla: 16 callbacks suppressed [ 1319.979950] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1320.013905] bridge0: port 3(team0) entered blocking state [ 1320.036219] bridge0: port 3(team0) entered disabled state [ 1320.045537] device team0 entered promiscuous mode [ 1320.072648] device team_slave_0 entered promiscuous mode [ 1320.114835] device team_slave_1 entered promiscuous mode [ 1320.130800] bridge0: port 3(team0) entered blocking state [ 1320.136478] bridge0: port 3(team0) entered forwarding state [ 1320.195001] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1320.215966] device team0 left promiscuous mode 20:54:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:06 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000007400000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:06 executing program 5: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1320.241008] device team_slave_0 left promiscuous mode [ 1320.257329] bridge0: port 3(team0) entered disabled state [ 1320.297660] bond0: team0 is up - this may be due to an out of date ifenslave [ 1320.332240] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1320.346847] bridge0: port 3(team0) entered blocking state [ 1320.352877] bridge0: port 3(team0) entered disabled state [ 1320.360220] device team0 entered promiscuous mode [ 1320.365614] device team_slave_0 entered promiscuous mode [ 1320.367553] NILFS (loop3): couldn't find nilfs on the device [ 1320.377881] bridge0: port 3(team0) entered blocking state [ 1320.383597] bridge0: port 3(team0) entered forwarding state [ 1320.394683] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1320.406849] device team0 left promiscuous mode [ 1320.422462] device team_slave_0 left promiscuous mode [ 1320.428865] device team_slave_1 left promiscuous mode 20:54:06 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x401000) [ 1320.446057] bridge0: port 3(team0) entered disabled state 20:54:06 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000007a00000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1320.506183] bond0: team0 is up - this may be due to an out of date ifenslave [ 1320.534626] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1320.552708] bridge0: port 3(team0) entered blocking state [ 1320.577597] bridge0: port 3(team0) entered disabled state [ 1320.597745] NILFS (loop3): couldn't find nilfs on the device [ 1320.609938] device team0 entered promiscuous mode [ 1320.630128] device team_slave_0 entered promiscuous mode [ 1320.654260] device team_slave_1 entered promiscuous mode [ 1320.675810] NILFS (loop3): couldn't find nilfs on the device [ 1320.706662] bridge0: port 3(team0) entered blocking state [ 1320.712354] bridge0: port 3(team0) entered forwarding state 20:54:06 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000003000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1320.760609] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1320.781699] device team0 left promiscuous mode [ 1320.805552] device team_slave_0 left promiscuous mode [ 1320.838146] bridge0: port 3(team0) entered disabled state [ 1320.859347] NILFS (loop3): couldn't find nilfs on the device 20:54:07 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000005000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1321.044066] 8021q: adding VLAN 0 to HW filter on device team0 [ 1321.060288] NILFS (loop3): couldn't find nilfs on the device [ 1321.130259] device team0 entered promiscuous mode [ 1321.147697] NILFS (loop3): couldn't find nilfs on the device [ 1321.157152] device team_slave_0 entered promiscuous mode 20:54:07 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000006000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1321.194239] bond0: Enslaving team0 as an active interface with an up link [ 1321.249037] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1321.278146] device team0 left promiscuous mode [ 1321.292017] device team_slave_0 left promiscuous mode [ 1321.302919] NILFS (loop3): couldn't find nilfs on the device [ 1321.345271] device team_slave_1 left promiscuous mode 20:54:07 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000007000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1321.377310] bridge0: port 3(team0) entered disabled state [ 1321.463145] bond0: team0 is up - this may be due to an out of date ifenslave [ 1321.484800] NILFS (loop3): couldn't find nilfs on the device [ 1321.492481] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1321.545513] bond0: Releasing backup interface team0 [ 1321.562607] device team0 left promiscuous mode [ 1321.567232] device team_slave_0 left promiscuous mode [ 1321.903781] bridge0: port 3(team0) entered blocking state [ 1321.909553] bridge0: port 3(team0) entered disabled state [ 1321.922838] device team0 entered promiscuous mode [ 1321.927834] device team_slave_0 entered promiscuous mode [ 1321.965008] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1321.980581] bridge0: port 3(team0) entered blocking state [ 1321.986299] bridge0: port 3(team0) entered disabled state [ 1322.009904] device team0 entered promiscuous mode [ 1322.016332] device team_slave_0 entered promiscuous mode [ 1322.028757] device team_slave_1 entered promiscuous mode [ 1322.034962] bridge0: port 3(team0) entered blocking state [ 1322.040643] bridge0: port 3(team0) entered forwarding state [ 1322.066592] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1322.085797] device team0 left promiscuous mode [ 1322.105515] device team_slave_0 left promiscuous mode [ 1322.117552] bridge0: port 3(team0) entered disabled state [ 1322.142503] bond0: team0 is up - this may be due to an out of date ifenslave [ 1322.154434] bridge0: port 3(team0) entered blocking state [ 1322.167854] bridge0: port 3(team0) entered disabled state [ 1322.177577] device team0 entered promiscuous mode [ 1322.186797] device team_slave_0 entered promiscuous mode [ 1322.208274] bridge0: port 3(team0) entered blocking state [ 1322.213942] bridge0: port 3(team0) entered forwarding state [ 1322.224949] device team0 left promiscuous mode [ 1322.233057] device team_slave_0 left promiscuous mode [ 1322.258450] device team_slave_1 left promiscuous mode [ 1322.291599] bridge0: port 3(team0) entered disabled state [ 1322.318294] bond0: team0 is up - this may be due to an out of date ifenslave [ 1322.327526] bridge0: port 3(team0) entered blocking state [ 1322.337963] bridge0: port 3(team0) entered disabled state [ 1322.347183] device team0 entered promiscuous mode [ 1322.360801] device team_slave_0 entered promiscuous mode [ 1322.381606] device team_slave_1 entered promiscuous mode 20:54:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x65580000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:08 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000009000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:08 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x4af000) 20:54:08 executing program 5: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:08 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:08 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1322.389148] bridge0: port 3(team0) entered blocking state [ 1322.394841] bridge0: port 3(team0) entered forwarding state [ 1322.487732] device team0 left promiscuous mode [ 1322.503495] NILFS (loop3): couldn't find nilfs on the device 20:54:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x81000000, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1322.554224] device team_slave_0 left promiscuous mode [ 1322.600383] NILFS (loop3): couldn't find nilfs on the device [ 1322.623431] bridge0: port 3(team0) entered disabled state 20:54:08 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000c000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1322.736926] NILFS (loop3): couldn't find nilfs on the device [ 1322.796521] NILFS (loop3): couldn't find nilfs on the device [ 1322.812067] 8021q: adding VLAN 0 to HW filter on device team0 20:54:08 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000012000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1322.872599] device team0 entered promiscuous mode [ 1322.885746] device team_slave_0 entered promiscuous mode [ 1322.945153] NILFS (loop3): couldn't find nilfs on the device [ 1322.957876] bond0: Enslaving team0 as an active interface with an up link [ 1322.982288] device team0 left promiscuous mode [ 1322.987890] device team_slave_0 left promiscuous mode [ 1323.005298] bridge0: port 3(team0) entered disabled state [ 1323.024527] bond0: team0 is up - this may be due to an out of date ifenslave [ 1323.045289] NILFS (loop3): couldn't find nilfs on the device 20:54:09 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000020000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1323.047752] bond0: Releasing backup interface team0 [ 1323.068720] device team0 left promiscuous mode [ 1323.118567] device team_slave_0 left promiscuous mode [ 1323.217416] NILFS (loop3): couldn't find nilfs on the device 20:54:09 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000023000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1323.403670] NILFS (loop3): couldn't find nilfs on the device 20:54:09 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000003434000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1323.590367] NILFS (loop3): couldn't find nilfs on the device 20:54:09 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x4fd000) 20:54:09 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000003f000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1323.754180] bridge0: port 3(team0) entered blocking state [ 1323.762492] bridge0: port 3(team0) entered disabled state [ 1323.774387] device team0 entered promiscuous mode [ 1323.786600] device team_slave_0 entered promiscuous mode [ 1323.794180] NILFS (loop3): couldn't find nilfs on the device 20:54:09 executing program 5: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r0}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1323.805200] device team0 left promiscuous mode [ 1323.811873] device team_slave_0 left promiscuous mode [ 1323.834263] device team_slave_1 left promiscuous mode 20:54:09 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000040000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1323.864239] bridge0: port 3(team0) entered disabled state [ 1323.887936] bond0: team0 is up - this may be due to an out of date ifenslave [ 1323.902276] bridge0: port 3(team0) entered blocking state [ 1323.914336] bridge0: port 3(team0) entered disabled state [ 1323.976989] device team0 entered promiscuous mode [ 1323.997537] device team_slave_0 entered promiscuous mode [ 1324.036231] bridge0: port 3(team0) entered blocking state [ 1324.043473] bridge0: port 3(team0) entered forwarding state [ 1324.072269] bridge0: port 3(team0) entered blocking state [ 1324.081646] bridge0: port 3(team0) entered disabled state [ 1324.126351] device team0 entered promiscuous mode [ 1324.147639] device team_slave_0 entered promiscuous mode [ 1324.170417] device team_slave_1 entered promiscuous mode [ 1324.198221] bridge0: port 3(team0) entered blocking state [ 1324.203912] bridge0: port 3(team0) entered forwarding state [ 1324.246495] device team0 left promiscuous mode [ 1324.271273] device team_slave_0 left promiscuous mode [ 1324.276671] device team_slave_1 left promiscuous mode 20:54:10 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:10 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000048000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1324.328750] bridge0: port 3(team0) entered disabled state [ 1324.369507] bond0: team0 is up - this may be due to an out of date ifenslave [ 1324.388572] NILFS (loop3): couldn't find nilfs on the device [ 1324.397372] bridge0: port 3(team0) entered blocking state [ 1324.405198] bridge0: port 3(team0) entered disabled state [ 1324.462648] device team0 entered promiscuous mode [ 1324.482982] device team_slave_0 entered promiscuous mode [ 1324.521349] device team_slave_1 entered promiscuous mode [ 1324.563142] bridge0: port 3(team0) entered blocking state [ 1324.568905] bridge0: port 3(team0) entered forwarding state 20:54:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x88a8ffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:10 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:10 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000004c000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1324.614276] device team0 left promiscuous mode [ 1324.626201] device team_slave_0 left promiscuous mode [ 1324.713046] bridge0: port 3(team0) entered disabled state [ 1324.756918] NILFS (loop3): couldn't find nilfs on the device [ 1324.758938] 8021q: adding VLAN 0 to HW filter on device team0 [ 1324.795592] device team0 entered promiscuous mode [ 1324.811978] device team_slave_0 entered promiscuous mode [ 1324.829620] bond0: Enslaving team0 as an active interface with an up link [ 1324.844323] bond0: Releasing backup interface team0 [ 1324.852137] NILFS (loop3): couldn't find nilfs on the device [ 1324.871638] device team0 left promiscuous mode 20:54:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x541000) [ 1324.895285] device team_slave_0 left promiscuous mode 20:54:11 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000060000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1325.047981] NILFS (loop3): couldn't find nilfs on the device 20:54:11 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000008860000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1325.184556] NILFS (loop3): couldn't find nilfs on the device 20:54:11 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000068000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1325.367066] NILFS (loop3): couldn't find nilfs on the device [ 1325.419457] NILFS (loop3): couldn't find nilfs on the device 20:54:11 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000006c000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1325.742239] bridge0: port 3(team0) entered blocking state [ 1325.752255] bridge0: port 3(team0) entered disabled state [ 1325.763361] device team0 entered promiscuous mode [ 1325.780033] device team_slave_0 entered promiscuous mode 20:54:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:11 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000074000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1325.798837] validate_nla: 13 callbacks suppressed [ 1325.798848] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1325.834729] device team0 left promiscuous mode [ 1325.867382] device team_slave_0 left promiscuous mode [ 1325.880682] device team_slave_1 left promiscuous mode [ 1325.892510] bridge0: port 3(team0) entered disabled state [ 1325.902188] NILFS (loop3): couldn't find nilfs on the device [ 1325.912745] bond0: team0 is up - this may be due to an out of date ifenslave [ 1325.964469] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1325.989089] bridge0: port 3(team0) entered blocking state [ 1325.994728] bridge0: port 3(team0) entered disabled state [ 1326.029474] device team0 entered promiscuous mode [ 1326.041529] device team_slave_0 entered promiscuous mode [ 1326.072741] device team_slave_1 entered promiscuous mode [ 1326.087654] bridge0: port 3(team0) entered blocking state [ 1326.093303] bridge0: port 3(team0) entered forwarding state [ 1326.114242] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1326.126593] device team0 left promiscuous mode 20:54:12 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:12 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x970000) [ 1326.186983] device team_slave_0 left promiscuous mode [ 1326.206782] bridge0: port 3(team0) entered disabled state [ 1326.234143] bond0: team0 is up - this may be due to an out of date ifenslave [ 1326.288383] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1326.315917] device team0 left promiscuous mode [ 1326.332726] device team_slave_0 left promiscuous mode [ 1326.368397] device team_slave_1 left promiscuous mode [ 1326.377809] bridge0: port 3(team0) entered disabled state [ 1326.402004] bond0: team0 is up - this may be due to an out of date ifenslave [ 1326.424366] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1326.441869] bridge0: port 3(team0) entered blocking state [ 1326.456875] bridge0: port 3(team0) entered disabled state [ 1326.467634] device team0 entered promiscuous mode [ 1326.475027] device team_slave_0 entered promiscuous mode [ 1326.482850] bridge0: port 3(team0) entered blocking state [ 1326.489045] bridge0: port 3(team0) entered forwarding state [ 1326.496534] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1326.517195] bridge0: port 3(team0) entered blocking state [ 1326.531639] bridge0: port 3(team0) entered disabled state [ 1326.557514] device team0 entered promiscuous mode [ 1326.563010] device team_slave_0 entered promiscuous mode [ 1326.576018] device team_slave_1 entered promiscuous mode 20:54:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffa888, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:12 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000007a000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:12 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1326.584488] bridge0: port 3(team0) entered blocking state [ 1326.590200] bridge0: port 3(team0) entered forwarding state [ 1326.602755] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1326.624749] device team0 left promiscuous mode 20:54:12 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000ff80000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1326.642996] device team_slave_0 left promiscuous mode [ 1326.653022] NILFS (loop3): couldn't find nilfs on the device [ 1326.670699] bridge0: port 3(team0) entered disabled state [ 1326.734741] 8021q: adding VLAN 0 to HW filter on device team0 [ 1326.786882] device team0 entered promiscuous mode [ 1326.818195] NILFS (loop3): couldn't find nilfs on the device [ 1326.848528] device team_slave_0 entered promiscuous mode [ 1326.890830] bond0: Enslaving team0 as an active interface with an up link [ 1326.929203] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 20:54:13 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000fff000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0xc04a01) [ 1326.956618] bond0: Releasing backup interface team0 [ 1326.983106] device team0 left promiscuous mode [ 1326.998684] device team_slave_0 left promiscuous mode [ 1327.022450] NILFS (loop3): couldn't find nilfs on the device 20:54:13 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000080ff000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1327.102786] NILFS (loop3): couldn't find nilfs on the device [ 1327.311671] NILFS (loop3): couldn't find nilfs on the device [ 1327.358165] NILFS (loop3): couldn't find nilfs on the device 20:54:13 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000fe01010010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1327.513270] NILFS (loop3): couldn't find nilfs on the device [ 1327.556523] bridge0: port 3(team0) entered blocking state [ 1327.661309] bridge0: port 3(team0) entered disabled state [ 1327.699129] device team0 entered promiscuous mode [ 1327.704012] device team_slave_0 entered promiscuous mode 20:54:13 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000002010010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1327.729178] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1327.736814] device team0 left promiscuous mode [ 1327.743542] device team_slave_0 left promiscuous mode [ 1327.761922] device team_slave_1 left promiscuous mode [ 1327.770314] bridge0: port 3(team0) entered disabled state [ 1327.785341] NILFS (loop3): couldn't find nilfs on the device [ 1327.791962] bond0: team0 is up - this may be due to an out of date ifenslave [ 1327.800343] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1327.811244] bridge0: port 3(team0) entered blocking state [ 1327.818916] bridge0: port 3(team0) entered disabled state [ 1327.828191] device team0 entered promiscuous mode [ 1327.833178] device team_slave_0 entered promiscuous mode [ 1327.842992] device team_slave_1 entered promiscuous mode [ 1327.851360] NILFS (loop3): couldn't find nilfs on the device [ 1327.858522] bridge0: port 3(team0) entered blocking state [ 1327.864133] bridge0: port 3(team0) entered forwarding state [ 1327.873212] device team0 left promiscuous mode [ 1327.879975] device team_slave_0 left promiscuous mode 20:54:14 executing program 0: shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0xd04f00) [ 1327.897755] bridge0: port 3(team0) entered disabled state [ 1327.922071] bond0: team0 is up - this may be due to an out of date ifenslave [ 1328.023134] device team0 left promiscuous mode [ 1328.029196] device team_slave_0 left promiscuous mode [ 1328.070819] device team_slave_1 left promiscuous mode [ 1328.107099] bridge0: port 3(team0) entered disabled state [ 1328.166815] bond0: team0 is up - this may be due to an out of date ifenslave [ 1328.213050] bridge0: port 3(team0) entered blocking state [ 1328.221662] bridge0: port 3(team0) entered disabled state [ 1328.245915] device team0 entered promiscuous mode [ 1328.254685] device team_slave_0 entered promiscuous mode [ 1328.281383] bridge0: port 3(team0) entered blocking state [ 1328.287113] bridge0: port 3(team0) entered forwarding state [ 1328.311641] bridge0: port 3(team0) entered blocking state [ 1328.332192] bridge0: port 3(team0) entered disabled state [ 1328.369755] device team0 entered promiscuous mode [ 1328.400843] device team_slave_0 entered promiscuous mode [ 1328.424033] device team_slave_1 entered promiscuous mode [ 1328.450769] bridge0: port 3(team0) entered blocking state [ 1328.456459] bridge0: port 3(team0) entered forwarding state 20:54:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0xffffff7f, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:14 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000001020010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:14 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1328.505990] device team0 left promiscuous mode [ 1328.530868] device team_slave_0 left promiscuous mode [ 1328.550198] bridge0: port 3(team0) entered disabled state [ 1328.579849] NILFS (loop3): couldn't find nilfs on the device [ 1328.588590] 8021q: adding VLAN 0 to HW filter on device team0 20:54:14 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000004020010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1328.699782] device team0 entered promiscuous mode [ 1328.733332] device team_slave_0 entered promiscuous mode [ 1328.758237] bond0: Enslaving team0 as an active interface with an up link [ 1328.783198] NILFS (loop3): couldn't find nilfs on the device [ 1328.795048] bond0: Releasing backup interface team0 [ 1328.804829] device team0 left promiscuous mode 20:54:15 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000006b78020010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1328.834751] device team_slave_0 left promiscuous mode 20:54:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0xf04a00) [ 1328.933054] NILFS (loop3): couldn't find nilfs on the device 20:54:15 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000006c78020010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1329.183594] NILFS (loop3): couldn't find nilfs on the device 20:54:15 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000006d78020010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1329.364123] NILFS (loop3): couldn't find nilfs on the device 20:54:15 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000006e78020010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1329.608220] NILFS (loop3): couldn't find nilfs on the device [ 1329.634329] bridge0: port 3(team0) entered blocking state [ 1329.663263] bridge0: port 3(team0) entered disabled state [ 1329.684136] device team0 entered promiscuous mode [ 1329.693993] device team_slave_0 entered promiscuous mode [ 1329.702102] device team0 left promiscuous mode [ 1329.711248] device team_slave_0 left promiscuous mode [ 1329.748670] device team_slave_1 left promiscuous mode 20:54:15 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1329.786563] bridge0: port 3(team0) entered disabled state [ 1329.852464] bond0: team0 is up - this may be due to an out of date ifenslave [ 1329.866740] bridge0: port 3(team0) entered blocking state [ 1329.876239] bridge0: port 3(team0) entered disabled state [ 1329.891387] device team0 entered promiscuous mode [ 1329.899032] device team_slave_0 entered promiscuous mode [ 1329.908468] device team_slave_1 entered promiscuous mode [ 1329.925937] bridge0: port 3(team0) entered blocking state [ 1329.931605] bridge0: port 3(team0) entered forwarding state [ 1329.942526] device team0 left promiscuous mode 20:54:16 executing program 0: shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:16 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000006f78020010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1329.953662] device team_slave_0 left promiscuous mode [ 1330.002221] device team_slave_1 left promiscuous mode [ 1330.022352] NILFS (loop3): couldn't find nilfs on the device [ 1330.036642] bridge0: port 3(team0) entered disabled state [ 1330.080436] bond0: team0 is up - this may be due to an out of date ifenslave [ 1330.128576] device team0 left promiscuous mode [ 1330.133377] device team_slave_0 left promiscuous mode [ 1330.157015] bridge0: port 3(team0) entered disabled state [ 1330.195171] bond0: team0 is up - this may be due to an out of date ifenslave [ 1330.216461] bridge0: port 3(team0) entered blocking state [ 1330.229494] bridge0: port 3(team0) entered disabled state [ 1330.278591] device team0 entered promiscuous mode [ 1330.302622] device team_slave_0 entered promiscuous mode 20:54:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="0f00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:16 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000007078020010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1330.338300] device team_slave_1 entered promiscuous mode [ 1330.351810] bridge0: port 3(team0) entered blocking state [ 1330.357539] bridge0: port 3(team0) entered forwarding state [ 1330.374459] bridge0: port 3(team0) entered blocking state [ 1330.401306] bridge0: port 3(team0) entered disabled state [ 1330.420257] NILFS (loop3): couldn't find nilfs on the device [ 1330.427478] device team0 entered promiscuous mode [ 1330.440224] device team_slave_0 entered promiscuous mode 20:54:16 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x14ac000) [ 1330.449696] bridge0: port 3(team0) entered blocking state [ 1330.455440] bridge0: port 3(team0) entered forwarding state [ 1330.473743] device team0 left promiscuous mode [ 1330.479611] device team_slave_0 left promiscuous mode 20:54:16 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000007178020010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1330.579323] bridge0: port 3(team0) entered disabled state [ 1330.618264] 8021q: adding VLAN 0 to HW filter on device team0 [ 1330.639108] device team0 entered promiscuous mode [ 1330.658158] device team_slave_0 entered promiscuous mode [ 1330.664970] bond0: Enslaving team0 as an active interface with an up link [ 1330.665496] NILFS (loop3): couldn't find nilfs on the device [ 1330.683543] bond0: Releasing backup interface team0 [ 1330.689199] device team0 left promiscuous mode [ 1330.737426] device team_slave_0 left promiscuous mode [ 1330.780067] NILFS (loop3): couldn't find nilfs on the device 20:54:17 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000007278020010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1330.961436] NILFS (loop3): couldn't find nilfs on the device [ 1331.033272] NILFS (loop3): couldn't find nilfs on the device 20:54:17 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000ffff030010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1331.241831] NILFS (loop3): couldn't find nilfs on the device 20:54:17 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000040010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1331.452232] NILFS (loop3): couldn't find nilfs on the device 20:54:17 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000002040010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1331.512149] NILFS (loop3): couldn't find nilfs on the device [ 1331.662678] bridge0: port 3(team0) entered blocking state [ 1331.668566] bridge0: port 3(team0) entered disabled state [ 1331.734866] device team0 entered promiscuous mode [ 1331.783882] device team_slave_0 entered promiscuous mode [ 1331.793588] validate_nla: 14 callbacks suppressed [ 1331.793598] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 20:54:18 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1331.825082] device team0 left promiscuous mode [ 1331.837260] device team_slave_0 left promiscuous mode [ 1331.856383] device team_slave_1 left promiscuous mode [ 1331.863152] bridge0: port 3(team0) entered disabled state [ 1331.884311] bond0: team0 is up - this may be due to an out of date ifenslave [ 1331.897257] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1331.915698] bridge0: port 3(team0) entered blocking state [ 1331.921881] bridge0: port 3(team0) entered disabled state [ 1331.938087] device team0 entered promiscuous mode [ 1331.947097] device team_slave_0 entered promiscuous mode [ 1331.960947] device team_slave_1 entered promiscuous mode [ 1331.968353] bridge0: port 3(team0) entered blocking state [ 1331.974093] bridge0: port 3(team0) entered forwarding state 20:54:18 executing program 0: shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:18 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000fc07040010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1331.992341] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1332.013503] device team0 left promiscuous mode [ 1332.034825] device team_slave_0 left promiscuous mode [ 1332.079260] device team_slave_1 left promiscuous mode [ 1332.098923] bridge0: port 3(team0) entered disabled state 20:54:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x400000000000) 20:54:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="1000000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1332.125334] NILFS (loop3): couldn't find nilfs on the device [ 1332.140191] bond0: team0 is up - this may be due to an out of date ifenslave [ 1332.149209] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1332.186273] device team0 left promiscuous mode [ 1332.207961] device team_slave_0 left promiscuous mode [ 1332.233441] bridge0: port 3(team0) entered disabled state [ 1332.273715] bond0: team0 is up - this may be due to an out of date ifenslave [ 1332.331429] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1332.344186] bridge0: port 3(team0) entered blocking state [ 1332.413701] bridge0: port 3(team0) entered disabled state [ 1332.478720] device team0 entered promiscuous mode [ 1332.515141] device team_slave_0 entered promiscuous mode [ 1332.545914] bridge0: port 3(team0) entered blocking state [ 1332.551688] bridge0: port 3(team0) entered forwarding state [ 1332.561008] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1332.573747] device team0 left promiscuous mode 20:54:18 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:18 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000008040010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1332.612806] device team_slave_0 left promiscuous mode [ 1332.633424] bridge0: port 3(team0) entered disabled state [ 1332.647451] 8021q: adding VLAN 0 to HW filter on device team0 [ 1332.657165] device team0 entered promiscuous mode [ 1332.676739] device team_slave_0 entered promiscuous mode [ 1332.697833] NILFS (loop3): couldn't find nilfs on the device [ 1332.706247] bond0: Enslaving team0 as an active interface with an up link [ 1332.720930] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1332.740985] bond0: Releasing backup interface team0 20:54:18 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000080010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1332.748265] device team0 left promiscuous mode [ 1332.758704] device team_slave_0 left promiscuous mode [ 1332.864604] NILFS (loop3): couldn't find nilfs on the device [ 1332.932786] NILFS (loop3): couldn't find nilfs on the device 20:54:19 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000004080010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1333.149003] NILFS (loop3): couldn't find nilfs on the device 20:54:19 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000c0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x7fffffffefff) [ 1333.372407] NILFS (loop3): couldn't find nilfs on the device [ 1333.402954] bridge0: port 3(team0) entered blocking state [ 1333.411607] bridge0: port 3(team0) entered disabled state 20:54:19 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000ffff1f0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1333.424399] device team0 entered promiscuous mode [ 1333.432714] device team_slave_0 entered promiscuous mode [ 1333.445747] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1333.461699] device team0 left promiscuous mode [ 1333.466322] device team_slave_0 left promiscuous mode [ 1333.522916] device team_slave_1 left promiscuous mode [ 1333.556246] NILFS (loop3): couldn't find nilfs on the device [ 1333.563364] bridge0: port 3(team0) entered disabled state [ 1333.598056] bond0: team0 is up - this may be due to an out of date ifenslave [ 1333.632809] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1333.654788] bond0: team0 is up - this may be due to an out of date ifenslave [ 1333.718305] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1333.760495] bridge0: port 3(team0) entered blocking state [ 1333.782075] bridge0: port 3(team0) entered disabled state [ 1333.813449] device team0 entered promiscuous mode [ 1333.825537] device team_slave_0 entered promiscuous mode [ 1333.853228] device team_slave_1 entered promiscuous mode [ 1333.901142] bridge0: port 3(team0) entered blocking state [ 1333.906790] bridge0: port 3(team0) entered forwarding state 20:54:20 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:20 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000110000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:20 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="c000000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1333.960856] device team0 left promiscuous mode [ 1333.965780] device team_slave_0 left promiscuous mode [ 1333.991220] bridge0: port 3(team0) entered disabled state [ 1334.055117] bond0: team0 is up - this may be due to an out of date ifenslave [ 1334.106944] bridge0: port 3(team0) entered blocking state [ 1334.112936] bridge0: port 3(team0) entered disabled state [ 1334.140240] device team0 entered promiscuous mode [ 1334.148578] NILFS (loop3): couldn't find nilfs on the device 20:54:20 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000210000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1334.262230] device team_slave_0 entered promiscuous mode [ 1334.314100] bridge0: port 3(team0) entered blocking state [ 1334.319789] bridge0: port 3(team0) entered forwarding state 20:54:20 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:20 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x970000000000) [ 1334.375643] device team0 left promiscuous mode [ 1334.382385] device team_slave_0 left promiscuous mode [ 1334.398750] NILFS (loop3): couldn't find nilfs on the device [ 1334.427531] bridge0: port 3(team0) entered disabled state [ 1334.455831] 8021q: adding VLAN 0 to HW filter on device team0 [ 1334.527232] device team0 entered promiscuous mode 20:54:20 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000310000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1334.595643] device team_slave_0 entered promiscuous mode [ 1334.614943] bond0: Enslaving team0 as an active interface with an up link [ 1334.625507] NILFS (loop3): couldn't find nilfs on the device [ 1334.648480] bond0: Releasing backup interface team0 [ 1334.671208] device team0 left promiscuous mode [ 1334.697210] device team_slave_0 left promiscuous mode 20:54:20 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000410000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1334.845787] NILFS (loop3): couldn't find nilfs on the device 20:54:21 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000510000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1335.061837] NILFS (loop3): couldn't find nilfs on the device 20:54:21 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000610000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1335.185200] NILFS (loop3): couldn't find nilfs on the device [ 1335.327138] NILFS (loop3): couldn't find nilfs on the device 20:54:21 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000710000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1335.534809] NILFS (loop3): couldn't find nilfs on the device [ 1335.556698] bridge0: port 3(team0) entered blocking state [ 1335.578202] bridge0: port 3(team0) entered disabled state [ 1335.596516] NILFS (loop3): couldn't find nilfs on the device [ 1335.653882] device team0 entered promiscuous mode [ 1335.687343] device team_slave_0 entered promiscuous mode [ 1335.715390] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1335.741835] device team0 left promiscuous mode [ 1335.752123] device team_slave_0 left promiscuous mode [ 1335.769697] device team_slave_1 left promiscuous mode [ 1335.780482] bridge0: port 3(team0) entered disabled state [ 1335.798706] bond0: team0 is up - this may be due to an out of date ifenslave [ 1335.806410] bridge0: port 3(team0) entered blocking state [ 1335.815736] bridge0: port 3(team0) entered disabled state [ 1335.824410] device team0 entered promiscuous mode [ 1335.829623] device team_slave_0 entered promiscuous mode [ 1335.840331] device team_slave_1 entered promiscuous mode 20:54:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:22 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000810000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x10400000000000) 20:54:22 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2302000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1335.848725] bridge0: port 3(team0) entered blocking state [ 1335.854455] bridge0: port 3(team0) entered forwarding state [ 1335.866031] device team0 left promiscuous mode [ 1335.870932] device team_slave_0 left promiscuous mode [ 1335.878994] bridge0: port 3(team0) entered disabled state [ 1335.947651] bond0: team0 is up - this may be due to an out of date ifenslave [ 1335.973958] NILFS (loop3): couldn't find nilfs on the device [ 1336.001193] bridge0: port 3(team0) entered blocking state [ 1336.008834] bridge0: port 3(team0) entered disabled state [ 1336.037014] device team0 entered promiscuous mode [ 1336.054180] device team_slave_0 entered promiscuous mode [ 1336.069810] bridge0: port 3(team0) entered blocking state [ 1336.075555] bridge0: port 3(team0) entered forwarding state [ 1336.091368] device team0 left promiscuous mode [ 1336.097204] device team_slave_0 left promiscuous mode 20:54:22 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:22 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000910000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1336.110864] bridge0: port 3(team0) entered disabled state [ 1336.150942] 8021q: adding VLAN 0 to HW filter on device team0 [ 1336.170119] device team0 entered promiscuous mode [ 1336.188182] NILFS (loop3): couldn't find nilfs on the device [ 1336.195494] device team_slave_0 entered promiscuous mode 20:54:22 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000c10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:22 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000001210000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1336.287668] bond0: Enslaving team0 as an active interface with an up link 20:54:22 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000002010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1336.372743] bond0: Releasing backup interface team0 [ 1336.395376] device team0 left promiscuous mode [ 1336.402767] device team_slave_0 left promiscuous mode [ 1336.481358] NILFS (loop3): couldn't find nilfs on the device 20:54:22 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000002310000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1336.719132] NILFS (loop3): couldn't find nilfs on the device 20:54:22 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000343410000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1336.891785] NILFS (loop3): couldn't find nilfs on the device [ 1337.151478] bridge0: port 3(team0) entered blocking state [ 1337.168647] bridge0: port 3(team0) entered disabled state [ 1337.185217] device team0 entered promiscuous mode [ 1337.196894] device team_slave_0 entered promiscuous mode [ 1337.211297] validate_nla: 11 callbacks suppressed [ 1337.211306] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1337.232073] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:23 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000003f10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1337.267405] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1337.276400] device team0 left promiscuous mode [ 1337.291426] device team_slave_0 left promiscuous mode [ 1337.298888] device team_slave_1 left promiscuous mode [ 1337.308027] bridge0: port 3(team0) entered disabled state [ 1337.315009] bond0: team0 is up - this may be due to an out of date ifenslave [ 1337.325246] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1337.357524] NILFS (loop3): couldn't find nilfs on the device [ 1337.363947] bridge0: port 3(team0) entered blocking state [ 1337.382000] bridge0: port 3(team0) entered disabled state [ 1337.418559] device team0 entered promiscuous mode [ 1337.438424] device team_slave_0 entered promiscuous mode [ 1337.447298] device team_slave_1 entered promiscuous mode [ 1337.454898] bridge0: port 3(team0) entered blocking state [ 1337.460601] bridge0: port 3(team0) entered forwarding state [ 1337.473755] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1337.488469] device team0 left promiscuous mode [ 1337.513285] device team_slave_0 left promiscuous mode 20:54:23 executing program 0: r0 = socket$inet6_sctp(0xa, 0x0, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:23 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x10540000000000) 20:54:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="c00e000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1337.524146] bridge0: port 3(team0) entered disabled state [ 1337.612706] bond0: team0 is up - this may be due to an out of date ifenslave [ 1337.641437] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1337.667746] bridge0: port 3(team0) entered blocking state [ 1337.713573] bridge0: port 3(team0) entered disabled state 20:54:23 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:23 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000004010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1337.755882] device team0 entered promiscuous mode [ 1337.761057] device team_slave_0 entered promiscuous mode [ 1337.767892] bridge0: port 3(team0) entered blocking state [ 1337.773545] bridge0: port 3(team0) entered forwarding state [ 1337.795177] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 20:54:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="e03f030010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1337.834512] bond0: team0 is up - this may be due to an out of date ifenslave [ 1337.854963] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1337.866418] device team0 left promiscuous mode [ 1337.877212] NILFS (loop3): couldn't find nilfs on the device 20:54:24 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000004810000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1337.942010] device team_slave_0 left promiscuous mode [ 1337.959855] bridge0: port 3(team0) entered disabled state [ 1337.988466] 8021q: adding VLAN 0 to HW filter on device team0 [ 1338.034329] device team0 entered promiscuous mode [ 1338.095074] device team_slave_0 entered promiscuous mode [ 1338.116082] NILFS (loop3): couldn't find nilfs on the device [ 1338.144731] bond0: Enslaving team0 as an active interface with an up link 20:54:24 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000004c10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1338.210602] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1338.233939] bond0: Releasing backup interface team0 [ 1338.272114] device team0 left promiscuous mode [ 1338.296923] device team_slave_0 left promiscuous mode [ 1338.315317] NILFS (loop3): couldn't find nilfs on the device 20:54:24 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000006010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1338.571299] NILFS (loop3): couldn't find nilfs on the device 20:54:24 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000006810000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:24 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0xc04a0100000000) [ 1338.819657] NILFS (loop3): couldn't find nilfs on the device [ 1338.940471] bridge0: port 3(team0) entered blocking state [ 1338.961370] bridge0: port 3(team0) entered disabled state [ 1338.996694] device team0 entered promiscuous mode [ 1339.018427] device team_slave_0 entered promiscuous mode [ 1339.040181] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1339.075818] device team0 left promiscuous mode [ 1339.098431] device team_slave_0 left promiscuous mode [ 1339.111155] device team_slave_1 left promiscuous mode [ 1339.133377] bridge0: port 3(team0) entered disabled state [ 1339.161779] bond0: team0 is up - this may be due to an out of date ifenslave [ 1339.184593] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1339.209219] bridge0: port 3(team0) entered blocking state [ 1339.245054] bridge0: port 3(team0) entered disabled state [ 1339.286792] device team0 entered promiscuous mode [ 1339.318204] device team_slave_0 entered promiscuous mode [ 1339.354762] device team_slave_1 entered promiscuous mode [ 1339.387108] bridge0: port 3(team0) entered blocking state [ 1339.392771] bridge0: port 3(team0) entered forwarding state [ 1339.444774] device team0 left promiscuous mode [ 1339.465577] device team_slave_0 left promiscuous mode [ 1339.487892] bridge0: port 3(team0) entered disabled state [ 1339.512678] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:25 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:25 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000002786b10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0xd04f0000000000) [ 1339.543881] bond0: team0 is up - this may be due to an out of date ifenslave [ 1339.589342] bridge0: port 3(team0) entered blocking state [ 1339.600270] bridge0: port 3(team0) entered disabled state [ 1339.651971] device team0 entered promiscuous mode [ 1339.663137] NILFS (loop3): couldn't find nilfs on the device [ 1339.683510] device team_slave_0 entered promiscuous mode [ 1339.727775] NILFS (loop3): couldn't find nilfs on the device [ 1339.752574] bridge0: port 3(team0) entered blocking state [ 1339.758390] bridge0: port 3(team0) entered forwarding state [ 1339.852778] device team0 left promiscuous mode [ 1339.860772] device team_slave_0 left promiscuous mode [ 1339.887132] bridge0: port 3(team0) entered disabled state 20:54:26 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:26 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="ee00002010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:26 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000006c10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1339.964833] 8021q: adding VLAN 0 to HW filter on device team0 [ 1339.995678] device team0 entered promiscuous mode [ 1340.002985] NILFS (loop3): couldn't find nilfs on the device [ 1340.038162] device team_slave_0 entered promiscuous mode 20:54:26 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000002786c10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1340.084108] bond0: Enslaving team0 as an active interface with an up link [ 1340.136644] bond0: Releasing backup interface team0 [ 1340.146243] device team0 left promiscuous mode [ 1340.174651] device team_slave_0 left promiscuous mode [ 1340.182097] NILFS (loop3): couldn't find nilfs on the device 20:54:26 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000002786d10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0xf04a0000000000) 20:54:26 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000002786e10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1340.416706] NILFS (loop3): couldn't find nilfs on the device 20:54:26 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000002786f10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1340.685948] NILFS (loop3): couldn't find nilfs on the device [ 1340.755249] bridge0: port 3(team0) entered blocking state [ 1340.765034] bridge0: port 3(team0) entered disabled state [ 1340.790855] device team0 entered promiscuous mode [ 1340.799198] device team_slave_0 entered promiscuous mode [ 1340.818909] device team0 left promiscuous mode [ 1340.824790] device team_slave_0 left promiscuous mode [ 1340.870281] device team_slave_1 left promiscuous mode [ 1340.886827] bridge0: port 3(team0) entered disabled state [ 1340.895371] bond0: team0 is up - this may be due to an out of date ifenslave [ 1340.906072] bridge0: port 3(team0) entered blocking state [ 1340.913883] bridge0: port 3(team0) entered disabled state [ 1340.922964] device team0 entered promiscuous mode [ 1340.929286] device team_slave_0 entered promiscuous mode [ 1340.951839] device team_slave_1 entered promiscuous mode [ 1340.961875] bridge0: port 3(team0) entered blocking state [ 1340.967522] bridge0: port 3(team0) entered forwarding state [ 1340.977055] bond0: team0 is up - this may be due to an out of date ifenslave [ 1340.997081] device team0 left promiscuous mode [ 1341.004081] device team_slave_0 left promiscuous mode 20:54:27 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:27 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000002787010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="00f0ff7f10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1341.029563] bridge0: port 3(team0) entered disabled state [ 1341.075616] bond0: team0 is up - this may be due to an out of date ifenslave [ 1341.115521] bridge0: port 3(team0) entered blocking state [ 1341.121264] bridge0: port 3(team0) entered disabled state [ 1341.133900] NILFS (loop3): couldn't find nilfs on the device [ 1341.135996] device team0 entered promiscuous mode [ 1341.159843] device team_slave_0 entered promiscuous mode [ 1341.183512] bridge0: port 3(team0) entered blocking state [ 1341.189224] bridge0: port 3(team0) entered forwarding state [ 1341.263338] device team0 left promiscuous mode [ 1341.268233] device team_slave_0 left promiscuous mode [ 1341.294431] NILFS (loop3): couldn't find nilfs on the device [ 1341.297585] bridge0: port 3(team0) entered disabled state [ 1341.330575] 8021q: adding VLAN 0 to HW filter on device team0 [ 1341.362732] device team0 entered promiscuous mode 20:54:27 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1341.399009] device team_slave_0 entered promiscuous mode [ 1341.408834] bond0: Enslaving team0 as an active interface with an up link [ 1341.439111] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:27 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000002787110000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1341.449866] device team0 left promiscuous mode [ 1341.463120] device team_slave_0 left promiscuous mode 20:54:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e0000000f008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1341.539235] device team_slave_1 left promiscuous mode 20:54:27 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000002787210000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1341.581901] NILFS (loop3): couldn't find nilfs on the device [ 1341.583478] bridge0: port 3(team0) entered disabled state [ 1341.741248] bond0: team0 is up - this may be due to an out of date ifenslave [ 1341.756844] NILFS (loop3): couldn't find nilfs on the device [ 1341.764803] bond0: Releasing backup interface team0 [ 1341.773476] device team0 left promiscuous mode [ 1341.788348] device team_slave_0 left promiscuous mode 20:54:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0xffefffffff7f0000) 20:54:28 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000007410000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1341.950945] NILFS (loop3): couldn't find nilfs on the device 20:54:28 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000007a10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1342.152402] NILFS (loop3): couldn't find nilfs on the device 20:54:28 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000608810000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1342.334602] bridge0: port 3(team0) entered blocking state [ 1342.340793] NILFS (loop3): couldn't find nilfs on the device [ 1342.341494] bridge0: port 3(team0) entered disabled state [ 1342.354484] device team0 entered promiscuous mode [ 1342.360465] device team_slave_0 entered promiscuous mode [ 1342.367441] validate_nla: 14 callbacks suppressed [ 1342.367451] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1342.418920] bridge0: port 3(team0) entered blocking state [ 1342.435480] bridge0: port 3(team0) entered disabled state [ 1342.490066] device team0 entered promiscuous mode [ 1342.523984] device team_slave_0 entered promiscuous mode [ 1342.564082] device team_slave_1 entered promiscuous mode [ 1342.603674] bridge0: port 3(team0) entered blocking state [ 1342.609338] bridge0: port 3(team0) entered forwarding state [ 1342.669141] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1342.695549] device team0 left promiscuous mode 20:54:28 executing program 0: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:28 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:28 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000ffffff8c10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1342.736829] device team_slave_0 left promiscuous mode [ 1342.769157] bridge0: port 3(team0) entered disabled state [ 1342.805795] bond0: team0 is up - this may be due to an out of date ifenslave [ 1342.820908] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1342.850315] NILFS (loop3): couldn't find nilfs on the device [ 1342.866723] bridge0: port 3(team0) entered blocking state 20:54:29 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000ffffffe410000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1342.920581] bridge0: port 3(team0) entered disabled state [ 1342.944615] device team0 entered promiscuous mode [ 1342.953379] device team_slave_0 entered promiscuous mode [ 1342.959909] bridge0: port 3(team0) entered blocking state [ 1342.965587] bridge0: port 3(team0) entered forwarding state [ 1342.974349] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1342.994751] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:29 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e02000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1343.026307] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1343.048968] NILFS (loop3): couldn't find nilfs on the device 20:54:29 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000fffffff510000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1343.076484] device team0 left promiscuous mode [ 1343.108184] device team_slave_0 left promiscuous mode [ 1343.132347] bridge0: port 3(team0) entered disabled state [ 1343.190024] 8021q: adding VLAN 0 to HW filter on device team0 [ 1343.217471] NILFS (loop3): couldn't find nilfs on the device 20:54:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) syz_open_pts(r0, 0x1) r1 = syz_open_pts(r0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) fcntl$setstatus(r2, 0x4, 0x400) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) fcntl$setstatus(r0, 0x4, 0x0) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1343.310349] device team0 entered promiscuous mode 20:54:29 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000fffffff610000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1343.336379] device team_slave_0 entered promiscuous mode [ 1343.398223] NILFS (loop3): couldn't find nilfs on the device [ 1343.412558] bond0: Enslaving team0 as an active interface with an up link 20:54:29 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000fffffffb10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1343.488733] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1343.518157] bond0: Releasing backup interface team0 [ 1343.554586] device team0 left promiscuous mode [ 1343.566096] device team_slave_0 left promiscuous mode [ 1343.584548] NILFS (loop3): couldn't find nilfs on the device 20:54:29 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000407fc10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1343.794879] NILFS (loop3): couldn't find nilfs on the device 20:54:30 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000101fe10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1344.004716] NILFS (loop3): couldn't find nilfs on the device [ 1344.177849] bridge0: port 3(team0) entered blocking state [ 1344.186849] bridge0: port 3(team0) entered disabled state [ 1344.199306] device team0 entered promiscuous mode [ 1344.204756] device team_slave_0 entered promiscuous mode [ 1344.212348] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1344.232798] device team0 left promiscuous mode [ 1344.237785] device team_slave_0 left promiscuous mode [ 1344.244813] device team_slave_1 left promiscuous mode [ 1344.251355] bridge0: port 3(team0) entered disabled state [ 1344.261685] bond0: team0 is up - this may be due to an out of date ifenslave [ 1344.305040] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1344.314237] bridge0: port 3(team0) entered blocking state [ 1344.320916] bridge0: port 3(team0) entered disabled state [ 1344.329046] device team0 entered promiscuous mode [ 1344.336278] device team_slave_0 entered promiscuous mode [ 1344.347593] device team_slave_1 entered promiscuous mode [ 1344.372315] bridge0: port 3(team0) entered blocking state [ 1344.378075] bridge0: port 3(team0) entered forwarding state 20:54:30 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:30 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000fff10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1344.469930] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1344.495658] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e04000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1344.555629] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1344.571826] device team0 left promiscuous mode [ 1344.583895] device team_slave_0 left promiscuous mode [ 1344.596531] NILFS (loop3): couldn't find nilfs on the device [ 1344.609508] bridge0: port 3(team0) entered disabled state [ 1344.652779] bond0: team0 is up - this may be due to an out of date ifenslave [ 1344.671543] bridge0: port 3(team0) entered blocking state [ 1344.679804] bridge0: port 3(team0) entered disabled state [ 1344.698234] device team0 entered promiscuous mode 20:54:30 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) syz_open_pts(0xffffffffffffffff, 0x10000) ioctl$TCFLSH(r1, 0x804c4700, 0x20) fcntl$addseals(r1, 0x409, 0x6) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000000)={0x8af, 0x7f, 0x8000, 0x10000, 0xfe, "23153cf70100efcd6029f24ea582d1cfea6984", 0xaed2, 0x80000001}) 20:54:30 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000080ff10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1344.703535] device team_slave_0 entered promiscuous mode [ 1344.709758] bridge0: port 3(team0) entered blocking state [ 1344.715426] bridge0: port 3(team0) entered forwarding state [ 1344.733808] device team0 left promiscuous mode [ 1344.738535] device team_slave_0 left promiscuous mode [ 1344.747773] bridge0: port 3(team0) entered disabled state [ 1344.772826] NILFS (loop3): couldn't find nilfs on the device [ 1344.801549] 8021q: adding VLAN 0 to HW filter on device team0 [ 1344.871793] device team0 entered promiscuous mode 20:54:31 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000003ffff10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1344.901377] device team_slave_0 entered promiscuous mode [ 1344.935357] bond0: Enslaving team0 as an active interface with an up link [ 1344.975891] device team0 left promiscuous mode [ 1344.980711] device team_slave_0 left promiscuous mode [ 1345.008121] device team_slave_1 left promiscuous mode [ 1345.019722] NILFS (loop3): couldn't find nilfs on the device 20:54:31 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000001fffff10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1345.061222] bridge0: port 3(team0) entered disabled state [ 1345.122082] bond0: team0 is up - this may be due to an out of date ifenslave [ 1345.155698] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:31 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1345.179835] bond0: Releasing backup interface team0 [ 1345.196050] device team0 left promiscuous mode 20:54:31 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e06000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:31 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000007fffffff10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1345.227740] device team_slave_0 left promiscuous mode [ 1345.347658] NILFS (loop3): couldn't find nilfs on the device [ 1346.218242] bridge0: port 3(team0) entered blocking state [ 1346.240775] bridge0: port 3(team0) entered disabled state [ 1346.268275] device team0 entered promiscuous mode [ 1346.278148] device team_slave_0 entered promiscuous mode [ 1346.314153] bridge0: port 3(team0) entered blocking state [ 1346.320544] bridge0: port 3(team0) entered disabled state [ 1346.360432] device team0 entered promiscuous mode [ 1346.402309] device team_slave_0 entered promiscuous mode [ 1346.407968] device team_slave_1 entered promiscuous mode [ 1346.448985] bridge0: port 3(team0) entered blocking state [ 1346.454649] bridge0: port 3(team0) entered forwarding state [ 1346.476324] bond0: team0 is up - this may be due to an out of date ifenslave [ 1346.499450] device team0 left promiscuous mode [ 1346.507392] device team_slave_0 left promiscuous mode [ 1346.515998] bridge0: port 3(team0) entered disabled state [ 1346.531789] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f0000000000)={0x753, 0x1, 0x2, 0x5, 0x13, "3111f0ba8e4626fc46e815d16081fcc3925b99"}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0xa0100, 0x0) ioctl$KDSKBSENT(r2, 0x4b49, &(0x7f0000000280)={0x1, "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"}) ioctl$TCFLSH(r1, 0x804c4700, 0x0) 20:54:32 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000008cffffff10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:32 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e07000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1346.555324] bridge0: port 3(team0) entered blocking state [ 1346.561016] bridge0: port 3(team0) entered disabled state [ 1346.615388] NILFS (loop3): couldn't find nilfs on the device [ 1346.626476] device team0 entered promiscuous mode [ 1346.647916] device team_slave_0 entered promiscuous mode [ 1346.678945] NILFS (loop3): couldn't find nilfs on the device [ 1346.691534] bridge0: port 3(team0) entered blocking state [ 1346.697460] bridge0: port 3(team0) entered forwarding state [ 1346.711852] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:32 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000e4ffffff10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e08000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1346.738935] device team0 left promiscuous mode [ 1346.748045] device team_slave_0 left promiscuous mode 20:54:32 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1346.789472] bridge0: port 3(team0) entered disabled state [ 1346.848405] NILFS (loop3): couldn't find nilfs on the device [ 1346.880359] 8021q: adding VLAN 0 to HW filter on device team0 [ 1346.912018] device team0 entered promiscuous mode [ 1346.925855] device team_slave_0 entered promiscuous mode [ 1346.953981] NILFS (loop3): couldn't find nilfs on the device [ 1346.958350] bond0: Enslaving team0 as an active interface with an up link [ 1346.989039] device team0 left promiscuous mode [ 1346.993731] device team_slave_0 left promiscuous mode 20:54:33 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000f5ffffff10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1347.004884] device team_slave_1 left promiscuous mode [ 1347.010726] bridge0: port 3(team0) entered disabled state [ 1347.054961] bond0: team0 is up - this may be due to an out of date ifenslave [ 1347.082702] NILFS (loop3): couldn't find nilfs on the device [ 1347.099690] bond0: Releasing backup interface team0 [ 1347.112857] device team0 left promiscuous mode [ 1347.135372] device team_slave_0 left promiscuous mode [ 1347.167088] NILFS (loop3): couldn't find nilfs on the device 20:54:33 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000f6ffffff10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1347.331776] NILFS (loop3): couldn't find nilfs on the device 20:54:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0x200, 0xdd, 0x2, 0x0, 0x18, "074a2e5fc98a3d737b400c732ed9dc30184b9f"}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1347.420352] NILFS (loop3): couldn't find nilfs on the device 20:54:33 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000fbffffff10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1347.530333] bridge0: port 3(team0) entered blocking state [ 1347.539110] NILFS (loop3): couldn't find nilfs on the device [ 1347.547462] bridge0: port 3(team0) entered disabled state [ 1347.562308] device team0 entered promiscuous mode [ 1347.568345] device team_slave_0 entered promiscuous mode [ 1347.589753] validate_nla: 13 callbacks suppressed [ 1347.589769] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1347.617078] bridge0: port 3(team0) entered blocking state [ 1347.637789] NILFS (loop3): couldn't find nilfs on the device [ 1347.642956] bridge0: port 3(team0) entered disabled state [ 1347.656376] device team0 entered promiscuous mode [ 1347.669168] device team_slave_0 entered promiscuous mode [ 1347.684626] device team_slave_1 entered promiscuous mode [ 1347.705701] bridge0: port 3(team0) entered blocking state [ 1347.711426] bridge0: port 3(team0) entered forwarding state [ 1347.734212] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1347.745648] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:33 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:33 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000001000000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e0a000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1347.764826] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1347.801018] device team0 left promiscuous mode [ 1347.805648] device team_slave_0 left promiscuous mode [ 1347.814200] NILFS (loop3): couldn't find nilfs on the device [ 1347.862139] bridge0: port 3(team0) entered disabled state [ 1347.882787] bond0: team0 is up - this may be due to an out of date ifenslave [ 1347.893773] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1347.902512] NILFS (loop3): couldn't find nilfs on the device 20:54:34 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000001000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1347.909153] bridge0: port 3(team0) entered blocking state [ 1347.923612] bridge0: port 3(team0) entered disabled state [ 1347.942724] device team0 entered promiscuous mode [ 1347.954143] device team_slave_0 entered promiscuous mode 20:54:34 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1347.984149] bridge0: port 3(team0) entered blocking state [ 1347.989871] bridge0: port 3(team0) entered forwarding state [ 1348.003604] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1348.030843] NILFS (loop3): couldn't find nilfs on the device [ 1348.064241] device team0 left promiscuous mode [ 1348.080351] device team_slave_0 left promiscuous mode 20:54:34 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000002000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1348.160063] NILFS (loop3): couldn't find nilfs on the device [ 1348.179611] bridge0: port 3(team0) entered disabled state [ 1348.236625] NILFS (loop3): couldn't find nilfs on the device [ 1348.273535] NILFS (loop3): couldn't find nilfs on the device [ 1348.276620] 8021q: adding VLAN 0 to HW filter on device team0 20:54:34 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000003000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0xe2c8, 0x200000, 0x10, 0x0, 0x5, "00000000000000000000090000ddc1517600"}) r1 = syz_open_pts(r0, 0x800) ioctl$VT_DISALLOCATE(r0, 0x5608) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCSBRK(r1, 0x5409, 0x6) ioctl$TCFLSH(r1, 0x804c4700, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) dup2(r2, r1) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x3, 0x0, 0x5, 0x1, 0xa, "7d2d5a89e36533da1a02f8ef7f3c9d171069c1"}) 20:54:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1348.373427] NILFS (loop3): couldn't find nilfs on the device [ 1348.382900] device team0 entered promiscuous mode [ 1348.428145] device team_slave_0 entered promiscuous mode [ 1348.450291] bond0: Enslaving team0 as an active interface with an up link [ 1348.466469] NILFS (loop3): couldn't find nilfs on the device 20:54:34 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000004000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1348.482329] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1348.493675] device team0 left promiscuous mode [ 1348.499549] device team_slave_0 left promiscuous mode [ 1348.505229] device team_slave_1 left promiscuous mode [ 1348.511394] bridge0: port 3(team0) entered disabled state [ 1348.543564] bond0: team0 is up - this may be due to an out of date ifenslave [ 1348.552783] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1348.570217] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:34 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e0c000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1348.605551] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1348.631481] bond0: Releasing backup interface team0 [ 1348.653089] NILFS (loop3): couldn't find nilfs on the device [ 1348.659425] device team0 left promiscuous mode [ 1348.673288] device team_slave_0 left promiscuous mode [ 1348.711148] NILFS (loop3): couldn't find nilfs on the device [ 1349.105441] bridge0: port 3(team0) entered blocking state [ 1349.117489] bridge0: port 3(team0) entered disabled state [ 1349.125880] device team0 entered promiscuous mode [ 1349.131340] device team_slave_0 entered promiscuous mode [ 1349.137529] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1349.149491] bridge0: port 3(team0) entered blocking state [ 1349.158837] bridge0: port 3(team0) entered disabled state [ 1349.169695] device team0 entered promiscuous mode [ 1349.183842] device team_slave_0 entered promiscuous mode [ 1349.189671] device team_slave_1 entered promiscuous mode [ 1349.199552] bridge0: port 3(team0) entered blocking state [ 1349.205300] bridge0: port 3(team0) entered forwarding state [ 1349.217678] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1349.239562] device team0 left promiscuous mode [ 1349.248432] device team_slave_0 left promiscuous mode 20:54:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:35 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000005000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0xe) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) 20:54:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1349.258606] bridge0: port 3(team0) entered disabled state [ 1349.287257] bond0: team0 is up - this may be due to an out of date ifenslave [ 1349.294525] NILFS (loop3): couldn't find nilfs on the device [ 1349.307708] bridge0: port 3(team0) entered blocking state [ 1349.314631] bridge0: port 3(team0) entered disabled state [ 1349.339610] device team0 entered promiscuous mode [ 1349.343200] NILFS (loop3): couldn't find nilfs on the device [ 1349.349299] device team_slave_0 entered promiscuous mode 20:54:35 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000006000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1349.394056] bridge0: port 3(team0) entered blocking state [ 1349.399725] bridge0: port 3(team0) entered forwarding state [ 1349.440931] bond0: team0 is up - this may be due to an out of date ifenslave [ 1349.461638] device team0 left promiscuous mode [ 1349.467367] device team_slave_0 left promiscuous mode [ 1349.477520] NILFS (loop3): couldn't find nilfs on the device 20:54:35 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e0e000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1349.515886] bridge0: port 3(team0) entered disabled state [ 1349.559775] NILFS (loop3): couldn't find nilfs on the device 20:54:35 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000007000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1349.708423] 8021q: adding VLAN 0 to HW filter on device team0 [ 1349.743707] NILFS (loop3): couldn't find nilfs on the device [ 1349.775070] device team0 entered promiscuous mode [ 1349.787439] device team_slave_0 entered promiscuous mode [ 1349.813508] bond0: Enslaving team0 as an active interface with an up link [ 1349.829108] bond0: Releasing backup interface team0 [ 1349.845667] NILFS (loop3): couldn't find nilfs on the device [ 1349.852571] device team0 left promiscuous mode [ 1349.870471] device team_slave_0 left promiscuous mode 20:54:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) r3 = syz_open_pts(r2, 0x2080) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) ioctl$TIOCSLCKTRMIOS(r2, 0x5457, &(0x7f0000000080)) ioctl$TIOCL_PASTESEL(r3, 0x541c, &(0x7f0000000040)) 20:54:36 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000008000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1350.022183] NILFS (loop3): couldn't find nilfs on the device 20:54:36 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000009000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1350.089625] NILFS (loop3): couldn't find nilfs on the device 20:54:36 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000a000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1350.250812] bridge0: port 3(team0) entered blocking state [ 1350.280599] bridge0: port 3(team0) entered disabled state [ 1350.311439] device team0 entered promiscuous mode [ 1350.330722] device team_slave_0 entered promiscuous mode [ 1350.359626] NILFS (loop3): couldn't find nilfs on the device [ 1350.397644] device team0 left promiscuous mode [ 1350.403025] device team_slave_0 left promiscuous mode [ 1350.408624] device team_slave_1 left promiscuous mode [ 1350.441327] bridge0: port 3(team0) entered disabled state [ 1350.467165] bond0: team0 is up - this may be due to an out of date ifenslave [ 1350.485270] bridge0: port 3(team0) entered blocking state [ 1350.491118] bridge0: port 3(team0) entered disabled state [ 1350.499426] device team0 entered promiscuous mode [ 1350.506529] device team_slave_0 entered promiscuous mode 20:54:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:36 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000b000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1350.538510] device team_slave_1 entered promiscuous mode [ 1350.549195] bridge0: port 3(team0) entered blocking state [ 1350.555141] bridge0: port 3(team0) entered forwarding state [ 1350.567741] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e10000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1350.597848] bond0: team0 is up - this may be due to an out of date ifenslave [ 1350.617139] device team0 left promiscuous mode [ 1350.622910] device team_slave_0 left promiscuous mode [ 1350.645232] bridge0: port 3(team0) entered disabled state [ 1350.655215] bond0: team0 is up - this may be due to an out of date ifenslave [ 1350.666991] NILFS (loop3): couldn't find nilfs on the device [ 1350.691331] bridge0: port 3(team0) entered blocking state [ 1350.697245] bridge0: port 3(team0) entered disabled state [ 1350.729090] device team0 entered promiscuous mode [ 1350.746286] NILFS (loop3): couldn't find nilfs on the device [ 1350.775313] device team_slave_0 entered promiscuous mode 20:54:36 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000c000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1350.806249] bridge0: port 3(team0) entered blocking state [ 1350.811935] bridge0: port 3(team0) entered forwarding state [ 1350.823228] device team0 left promiscuous mode [ 1350.827965] device team_slave_0 left promiscuous mode [ 1350.859715] device team_slave_1 left promiscuous mode 20:54:36 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000080)={0x81, 0x9, 0x1}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0xf84f, 0x0, 0xfffffff7, 0x80000000, 0x8, "59916be7eefeb5f86e646cbcdc83923590b316"}) r1 = syz_open_pts(r0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) r3 = syz_open_pts(r2, 0x401) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x14) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCXONC(r1, 0x540a, 0x3) ioctl$TCFLSH(r1, 0x804c4700, 0x0) ioctl$TCFLSH(r3, 0x540b, 0x1) syz_open_pts(r0, 0x80) [ 1350.894093] bridge0: port 3(team0) entered disabled state [ 1350.924505] bond0: team0 is up - this may be due to an out of date ifenslave [ 1350.940610] device team0 left promiscuous mode [ 1350.948117] device team_slave_0 left promiscuous mode [ 1350.960677] NILFS (loop3): couldn't find nilfs on the device [ 1351.012227] bridge0: port 3(team0) entered disabled state 20:54:37 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000d000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1351.238753] 8021q: adding VLAN 0 to HW filter on device team0 [ 1351.244778] NILFS (loop3): couldn't find nilfs on the device [ 1351.290098] device team0 entered promiscuous mode [ 1351.297081] device team_slave_0 entered promiscuous mode [ 1351.320247] bond0: Enslaving team0 as an active interface with an up link [ 1351.328273] bridge0: port 3(team0) entered blocking state 20:54:37 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000e000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1351.336982] bridge0: port 3(team0) entered disabled state [ 1351.348800] device team0 entered promiscuous mode [ 1351.353918] device team_slave_0 entered promiscuous mode [ 1351.360216] device team_slave_1 entered promiscuous mode [ 1351.366639] bridge0: port 3(team0) entered blocking state [ 1351.372321] bridge0: port 3(team0) entered forwarding state [ 1351.379897] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e60000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:37 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:37 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000f000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1351.403147] bond0: Releasing backup interface team0 [ 1351.410993] device team0 left promiscuous mode [ 1351.437352] device team_slave_0 left promiscuous mode 20:54:37 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000002000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1351.508806] NILFS (loop3): couldn't find nilfs on the device [ 1351.647375] NILFS (loop3): couldn't find nilfs on the device 20:54:37 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000003000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1351.722644] NILFS (loop3): couldn't find nilfs on the device [ 1351.843194] NILFS (loop3): couldn't find nilfs on the device [ 1351.861591] bridge0: port 3(team0) entered blocking state [ 1351.868561] bridge0: port 3(team0) entered disabled state [ 1351.875504] device team0 entered promiscuous mode [ 1351.885910] device team_slave_0 entered promiscuous mode 20:54:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:38 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000004000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1351.895666] NILFS (loop3): couldn't find nilfs on the device [ 1351.905703] device team0 left promiscuous mode [ 1351.919827] device team_slave_0 left promiscuous mode [ 1351.960812] bridge0: port 3(team0) entered disabled state [ 1351.982780] bond0: team0 is up - this may be due to an out of date ifenslave [ 1351.991658] bridge0: port 3(team0) entered blocking state [ 1351.997328] bridge0: port 3(team0) entered disabled state 20:54:38 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d", 0x20, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1352.008557] device team0 entered promiscuous mode [ 1352.015011] device team_slave_0 entered promiscuous mode [ 1352.023728] bridge0: port 3(team0) entered blocking state [ 1352.029397] bridge0: port 3(team0) entered forwarding state [ 1352.038857] bond0: team0 is up - this may be due to an out of date ifenslave [ 1352.047437] NILFS (loop3): couldn't find nilfs on the device 20:54:38 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00060010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1352.072535] device team0 left promiscuous mode [ 1352.077320] device team_slave_0 left promiscuous mode [ 1352.094155] device team_slave_1 left promiscuous mode [ 1352.109160] bridge0: port 3(team0) entered disabled state [ 1352.136663] bond0: team0 is up - this may be due to an out of date ifenslave [ 1352.150990] NILFS (loop3): couldn't find nilfs on the device [ 1352.163647] bridge0: port 3(team0) entered blocking state [ 1352.170337] bridge0: port 3(team0) entered disabled state [ 1352.179934] device team0 entered promiscuous mode [ 1352.206945] device team_slave_0 entered promiscuous mode [ 1352.216001] device team_slave_1 entered promiscuous mode [ 1352.224909] bridge0: port 3(team0) entered blocking state [ 1352.230576] bridge0: port 3(team0) entered forwarding state [ 1352.247718] device team0 left promiscuous mode [ 1352.258783] device team_slave_0 left promiscuous mode [ 1352.277448] bridge0: port 3(team0) entered disabled state [ 1352.381084] 8021q: adding VLAN 0 to HW filter on device team0 [ 1352.422039] device team0 entered promiscuous mode [ 1352.449275] device team_slave_0 entered promiscuous mode [ 1352.485065] bond0: Enslaving team0 as an active interface with an up link [ 1352.521713] bond0: Releasing backup interface team0 [ 1352.535540] device team0 left promiscuous mode 20:54:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(0xffffffffffffffff, 0x208181) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000100)=""/223, 0xdf}, {&(0x7f0000000040)=""/103, 0x67}, {&(0x7f0000000200)=""/6, 0x6}, {&(0x7f0000000b00)=""/4096, 0x1000}, {&(0x7f0000000280)=""/175, 0xaf}, {&(0x7f0000000340)=""/176, 0xb0}, {&(0x7f0000000400)=""/98, 0x62}], 0x7) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000000)={0x3, 0x8, 0x7fff, 0x5, 0x8, "87c8f8030a0fa3fde28feac0c19d717562d99a", 0xfffffffd, 0x10e}) 20:54:38 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000005000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:38 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1352.563924] device team_slave_0 left promiscuous mode 20:54:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000040)={0x10001, 0x6, 0xffff, 0xfffffffd, 0x17, "ae1e83b1aade2803abcacd186895124f186a6b"}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1352.631728] NILFS (loop3): couldn't find nilfs on the device [ 1352.702309] NILFS (loop3): couldn't find nilfs on the device 20:54:38 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000006000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1352.846746] NILFS (loop3): couldn't find nilfs on the device [ 1352.884795] NILFS (loop3): couldn't find nilfs on the device 20:54:39 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000007000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1352.941169] bridge0: port 3(team0) entered blocking state [ 1352.949653] bridge0: port 3(team0) entered disabled state [ 1352.957080] device team0 entered promiscuous mode [ 1352.962328] device team_slave_0 entered promiscuous mode [ 1352.973436] validate_nla: 22 callbacks suppressed [ 1352.973444] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 20:54:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1352.987160] device team0 left promiscuous mode [ 1352.991770] device team_slave_0 left promiscuous mode [ 1353.007623] NILFS (loop3): couldn't find nilfs on the device [ 1353.012824] bridge0: port 3(team0) entered disabled state [ 1353.042403] bond0: team0 is up - this may be due to an out of date ifenslave [ 1353.052253] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1353.060905] bond0: team0 is up - this may be due to an out of date ifenslave [ 1353.086612] NILFS (loop3): couldn't find nilfs on the device 20:54:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00070010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1353.094696] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1353.106294] bridge0: port 3(team0) entered blocking state [ 1353.112925] bridge0: port 3(team0) entered disabled state 20:54:39 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000008000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1353.135880] device team0 entered promiscuous mode [ 1353.150087] device team_slave_0 entered promiscuous mode [ 1353.171792] bridge0: port 3(team0) entered blocking state [ 1353.177501] bridge0: port 3(team0) entered forwarding state 20:54:39 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d", 0x20, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1353.198964] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1353.206631] device team0 left promiscuous mode [ 1353.233293] NILFS (loop3): couldn't find nilfs on the device [ 1353.243562] device team_slave_0 left promiscuous mode [ 1353.259538] device team_slave_1 left promiscuous mode [ 1353.274247] bridge0: port 3(team0) entered disabled state 20:54:39 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000009000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1353.307620] bond0: team0 is up - this may be due to an out of date ifenslave [ 1353.405687] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1353.425899] bridge0: port 3(team0) entered blocking state [ 1353.445206] bridge0: port 3(team0) entered disabled state [ 1353.457299] NILFS (loop3): couldn't find nilfs on the device [ 1353.465506] device team0 entered promiscuous mode [ 1353.472734] device team_slave_0 entered promiscuous mode [ 1353.479443] device team_slave_1 entered promiscuous mode [ 1353.489091] bridge0: port 3(team0) entered blocking state [ 1353.494835] bridge0: port 3(team0) entered forwarding state 20:54:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:39 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000c000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1353.503114] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1353.525019] NILFS (loop3): couldn't find nilfs on the device [ 1353.531196] device team0 left promiscuous mode [ 1353.545058] device team_slave_0 left promiscuous mode [ 1353.584233] bridge0: port 3(team0) entered disabled state [ 1353.632112] NILFS (loop3): couldn't find nilfs on the device 20:54:39 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000012000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1353.767354] 8021q: adding VLAN 0 to HW filter on device team0 [ 1353.808239] device team0 entered promiscuous mode 20:54:39 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0), r0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f00000001c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x800, 0x70bd27, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x4000094) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000240)={0x1, 0x0, 0x0, 0x0, 0x0, "000000ffffffdcc15176000000000000001d00"}) r3 = syz_open_pts(r2, 0x105000) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCFLSH(r3, 0x540b, 0x2) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000ac0)=0x15) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3000004, 0x110, r3, 0x25c8a000) ioctl$TCXONC(r2, 0x540a, 0x2) r4 = syz_open_pts(r3, 0x420241) ioctl$TCGETS(r4, 0x5401, &(0x7f0000000040)) ioctl$TCFLSH(r3, 0x804c4700, 0x1) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000100)=0xe) ioctl$GIO_UNIMAP(r4, 0x4b66, &(0x7f0000000280)={0x1, &(0x7f0000000200)=[{}]}) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)) [ 1353.836645] NILFS (loop3): couldn't find nilfs on the device [ 1353.840503] device team_slave_0 entered promiscuous mode [ 1353.868163] bond0: Enslaving team0 as an active interface with an up link [ 1353.877883] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 20:54:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1353.890252] NILFS (loop3): couldn't find nilfs on the device [ 1353.896531] bond0: Releasing backup interface team0 [ 1353.912063] device team0 left promiscuous mode [ 1353.919829] device team_slave_0 left promiscuous mode 20:54:40 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000023000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:40 executing program 4: connect$tipc(0xffffffffffffffff, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x2, {0x40, 0x3}}, 0xfffffffffffffe10) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x406981, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1354.019579] NILFS (loop3): couldn't find nilfs on the device [ 1354.076439] NILFS (loop3): couldn't find nilfs on the device 20:54:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e000a0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x1b) ioctl$TIOCGISO7816(r1, 0x80285442, &(0x7f0000000000)) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1354.201207] bridge0: port 3(team0) entered blocking state [ 1354.206941] bridge0: port 3(team0) entered disabled state [ 1354.214230] device team0 entered promiscuous mode [ 1354.219376] device team_slave_0 entered promiscuous mode [ 1354.226025] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1354.235997] bond0: team0 is up - this may be due to an out of date ifenslave [ 1354.278108] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1354.290770] device team0 left promiscuous mode [ 1354.298858] device team_slave_0 left promiscuous mode [ 1354.309917] bridge0: port 3(team0) entered disabled state [ 1354.346142] bond0: team0 is up - this may be due to an out of date ifenslave [ 1354.365630] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1354.380357] bridge0: port 3(team0) entered blocking state [ 1354.391965] bridge0: port 3(team0) entered disabled state [ 1354.404892] device team0 entered promiscuous mode [ 1354.410288] device team_slave_0 entered promiscuous mode [ 1354.418424] bridge0: port 3(team0) entered blocking state [ 1354.424115] bridge0: port 3(team0) entered forwarding state [ 1354.433687] device team0 left promiscuous mode [ 1354.439102] device team_slave_0 left promiscuous mode [ 1354.454569] device team_slave_1 left promiscuous mode 20:54:40 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d", 0x20, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:40 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000048000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1354.477840] bridge0: port 3(team0) entered disabled state [ 1354.505987] bond0: team0 is up - this may be due to an out of date ifenslave [ 1354.515051] bridge0: port 3(team0) entered blocking state [ 1354.535791] bridge0: port 3(team0) entered disabled state [ 1354.546081] NILFS (loop3): couldn't find nilfs on the device [ 1354.561858] device team0 entered promiscuous mode [ 1354.574219] device team_slave_0 entered promiscuous mode [ 1354.581583] device team_slave_1 entered promiscuous mode [ 1354.595259] bridge0: port 3(team0) entered blocking state [ 1354.600936] bridge0: port 3(team0) entered forwarding state [ 1354.616357] NILFS (loop3): couldn't find nilfs on the device [ 1354.625040] device team0 left promiscuous mode 20:54:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0xbf0f61149814fa2c, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1354.632569] device team_slave_0 left promiscuous mode [ 1354.638990] bridge0: port 3(team0) entered disabled state [ 1354.672294] 8021q: adding VLAN 0 to HW filter on device team0 20:54:40 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000004c000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1354.696973] device team0 entered promiscuous mode [ 1354.709286] device team_slave_0 entered promiscuous mode [ 1354.725577] bond0: Enslaving team0 as an active interface with an up link 20:54:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TIOCSSOFTCAR(r1, 0x541a, &(0x7f0000000000)=0x10001) ioctl$TCFLSH(r1, 0x804c4700, 0x0) 20:54:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e000c0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1354.743293] bond0: team0 is up - this may be due to an out of date ifenslave [ 1354.760658] NILFS (loop3): couldn't find nilfs on the device [ 1354.770422] bond0: Releasing backup interface team0 [ 1354.781358] device team0 left promiscuous mode [ 1354.794234] device team_slave_0 left promiscuous mode [ 1354.812919] NILFS (loop3): couldn't find nilfs on the device 20:54:40 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000060000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1354.919622] NILFS (loop3): couldn't find nilfs on the device 20:54:41 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000068000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1354.989567] NILFS (loop3): couldn't find nilfs on the device [ 1355.097892] NILFS (loop3): couldn't find nilfs on the device [ 1355.140486] bridge0: port 3(team0) entered blocking state [ 1355.148707] NILFS (loop3): couldn't find nilfs on the device [ 1355.160587] bridge0: port 3(team0) entered disabled state [ 1355.171250] device team0 entered promiscuous mode [ 1355.179883] device team_slave_0 entered promiscuous mode 20:54:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:41 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000006c000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1355.187996] device team0 left promiscuous mode [ 1355.192933] device team_slave_0 left promiscuous mode [ 1355.238510] bridge0: port 3(team0) entered disabled state [ 1355.292010] NILFS (loop3): couldn't find nilfs on the device [ 1355.306943] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:41 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000074000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1355.345774] bridge0: port 3(team0) entered blocking state [ 1355.354964] bridge0: port 3(team0) entered disabled state [ 1355.377264] device team0 entered promiscuous mode [ 1355.402935] device team_slave_0 entered promiscuous mode [ 1355.423764] bridge0: port 3(team0) entered blocking state [ 1355.429459] bridge0: port 3(team0) entered forwarding state [ 1355.447139] device team0 left promiscuous mode 20:54:41 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129", 0x30, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1355.452626] device team_slave_0 left promiscuous mode [ 1355.463498] NILFS (loop3): couldn't find nilfs on the device [ 1355.476650] device team_slave_1 left promiscuous mode [ 1355.492927] bridge0: port 3(team0) entered disabled state [ 1355.512967] NILFS (loop3): couldn't find nilfs on the device [ 1355.524508] bond0: team0 is up - this may be due to an out of date ifenslave [ 1355.534116] bridge0: port 3(team0) entered blocking state [ 1355.540715] bridge0: port 3(team0) entered disabled state 20:54:41 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000007a000010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1355.569612] device team0 entered promiscuous mode [ 1355.605162] device team_slave_0 entered promiscuous mode [ 1355.624850] device team_slave_1 entered promiscuous mode [ 1355.637892] NILFS (loop3): couldn't find nilfs on the device [ 1355.651329] bridge0: port 3(team0) entered blocking state [ 1355.657058] bridge0: port 3(team0) entered forwarding state [ 1355.672241] bond0: team0 is up - this may be due to an out of date ifenslave [ 1355.689362] device team0 left promiscuous mode 20:54:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x20004, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) r2 = syz_open_pts(r1, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000040)={0xff, 0x0, 0x5, 0x8, 0xf, "f0fa6864b22606da"}) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r2, 0x804c4700, 0x0) 20:54:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1355.704133] NILFS (loop3): couldn't find nilfs on the device [ 1355.704261] device team_slave_0 left promiscuous mode 20:54:41 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000030010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1355.756464] bridge0: port 3(team0) entered disabled state 20:54:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x10100, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000ac0)=0x14) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1355.868978] NILFS (loop3): couldn't find nilfs on the device [ 1355.883921] 8021q: adding VLAN 0 to HW filter on device team0 [ 1355.908332] device team0 entered promiscuous mode [ 1355.921277] device team_slave_0 entered promiscuous mode [ 1355.947685] NILFS (loop3): couldn't find nilfs on the device [ 1355.974171] bond0: Enslaving team0 as an active interface with an up link [ 1355.983734] bond0: Releasing backup interface team0 [ 1355.989629] device team0 left promiscuous mode [ 1355.995022] device team_slave_0 left promiscuous mode [ 1356.243548] bridge0: port 3(team0) entered blocking state [ 1356.253667] bridge0: port 3(team0) entered disabled state [ 1356.270448] device team0 entered promiscuous mode [ 1356.278588] device team_slave_0 entered promiscuous mode [ 1356.292329] device team0 left promiscuous mode [ 1356.303080] device team_slave_0 left promiscuous mode [ 1356.347211] bridge0: port 3(team0) entered disabled state [ 1356.366966] bond0: team0 is up - this may be due to an out of date ifenslave [ 1356.374580] bridge0: port 3(team0) entered blocking state [ 1356.380181] bridge0: port 3(team0) entered disabled state [ 1356.449537] device team0 entered promiscuous mode [ 1356.464783] device team_slave_0 entered promiscuous mode [ 1356.475597] bridge0: port 3(team0) entered blocking state [ 1356.481313] bridge0: port 3(team0) entered forwarding state [ 1356.499670] bond0: team0 is up - this may be due to an out of date ifenslave [ 1356.527452] device team0 left promiscuous mode [ 1356.541544] device team_slave_0 left promiscuous mode [ 1356.566569] device team_slave_1 left promiscuous mode [ 1356.597099] bridge0: port 3(team0) entered disabled state [ 1356.613776] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:42 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e000e0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x2) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) tee(r0, r2, 0xd1, 0x0) dup2(r2, r1) r3 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000040), 0x402400, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000000)='/dev/vsock\x00') 20:54:42 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000050010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:42 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129", 0x30, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1356.639796] bridge0: port 3(team0) entered blocking state [ 1356.646090] bridge0: port 3(team0) entered disabled state [ 1356.662019] device team0 entered promiscuous mode [ 1356.670379] device team_slave_0 entered promiscuous mode [ 1356.694471] device team_slave_1 entered promiscuous mode [ 1356.729740] bridge0: port 3(team0) entered blocking state [ 1356.735387] bridge0: port 3(team0) entered forwarding state [ 1356.758439] NILFS (loop3): couldn't find nilfs on the device [ 1356.761451] device team0 left promiscuous mode [ 1356.815981] device team_slave_0 left promiscuous mode 20:54:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1356.851774] bridge0: port 3(team0) entered disabled state 20:54:43 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000060010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1357.043066] 8021q: adding VLAN 0 to HW filter on device team0 [ 1357.089495] NILFS (loop3): couldn't find nilfs on the device [ 1357.122480] device team0 entered promiscuous mode [ 1357.127620] device team_slave_0 entered promiscuous mode 20:54:43 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e65580010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:43 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000070010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1357.159256] bond0: Enslaving team0 as an active interface with an up link [ 1357.167583] bond0: team0 is up - this may be due to an out of date ifenslave [ 1357.177187] device team0 left promiscuous mode [ 1357.190217] device team_slave_0 left promiscuous mode [ 1357.297815] bridge0: port 3(team0) entered disabled state [ 1357.417716] NILFS (loop3): couldn't find nilfs on the device [ 1357.468774] NILFS (loop3): couldn't find nilfs on the device 20:54:43 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000090010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1357.469614] bond0: team0 is up - this may be due to an out of date ifenslave [ 1357.532746] bond0: Releasing backup interface team0 [ 1357.542646] device team0 left promiscuous mode [ 1357.565663] device team_slave_0 left promiscuous mode [ 1357.635263] NILFS (loop3): couldn't find nilfs on the device 20:54:43 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000c0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1357.859066] NILFS (loop3): couldn't find nilfs on the device [ 1357.948341] NILFS (loop3): couldn't find nilfs on the device 20:54:44 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x400000000) 20:54:44 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000120010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1358.076512] NILFS (loop3): couldn't find nilfs on the device 20:54:44 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000200010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1358.247566] NILFS (loop3): couldn't find nilfs on the device [ 1358.317206] bridge0: port 3(team0) entered blocking state [ 1358.329987] NILFS (loop3): couldn't find nilfs on the device [ 1358.332791] bridge0: port 3(team0) entered disabled state [ 1358.351808] device team0 entered promiscuous mode [ 1358.366378] device team_slave_0 entered promiscuous mode 20:54:44 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000230010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:44 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1358.394148] validate_nla: 21 callbacks suppressed [ 1358.394158] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1358.421353] bridge0: port 3(team0) entered blocking state [ 1358.436751] bridge0: port 3(team0) entered disabled state [ 1358.495436] device team0 entered promiscuous mode [ 1358.513638] NILFS (loop3): couldn't find nilfs on the device [ 1358.530345] device team_slave_0 entered promiscuous mode [ 1358.539296] bridge0: port 3(team0) entered blocking state 20:54:44 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129", 0x30, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1358.544978] bridge0: port 3(team0) entered forwarding state [ 1358.564930] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1358.577282] NILFS (loop3): couldn't find nilfs on the device [ 1358.578286] device team0 left promiscuous mode [ 1358.606745] device team_slave_0 left promiscuous mode [ 1358.632486] device team_slave_1 left promiscuous mode [ 1358.648780] bridge0: port 3(team0) entered disabled state [ 1358.765123] bond0: team0 is up - this may be due to an out of date ifenslave [ 1358.772647] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1358.785505] bridge0: port 3(team0) entered blocking state [ 1358.793540] bridge0: port 3(team0) entered disabled state [ 1358.815564] device team0 entered promiscuous mode [ 1358.823600] device team_slave_0 entered promiscuous mode [ 1358.834107] device team_slave_1 entered promiscuous mode [ 1358.854482] bridge0: port 3(team0) entered blocking state [ 1358.860167] bridge0: port 3(team0) entered forwarding state 20:54:45 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:45 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000034340010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:45 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00600010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(0xffffffffffffffff, 0x804c4700, 0x0) [ 1358.870709] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1358.881480] bond0: team0 is up - this may be due to an out of date ifenslave [ 1358.906270] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1358.941097] device team0 left promiscuous mode [ 1358.961588] device team_slave_0 left promiscuous mode [ 1358.982349] NILFS (loop3): couldn't find nilfs on the device [ 1358.991864] bridge0: port 3(team0) entered disabled state 20:54:45 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000000), 0x1ff, 0x129000) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000040)={0x5, 0x6, 0x6, 0x5, 0x18, "6a023d07d33eb4e370271b07623e30f28f7608"}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1359.068304] NILFS (loop3): couldn't find nilfs on the device 20:54:45 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000003f0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1359.155972] 8021q: adding VLAN 0 to HW filter on device team0 [ 1359.278813] device team0 entered promiscuous mode [ 1359.286746] device team_slave_0 entered promiscuous mode [ 1359.294718] NILFS (loop3): couldn't find nilfs on the device [ 1359.309728] bond0: Enslaving team0 as an active interface with an up link [ 1359.317510] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 20:54:45 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000400010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1359.332554] bond0: Releasing backup interface team0 [ 1359.339387] device team0 left promiscuous mode [ 1359.357778] device team_slave_0 left promiscuous mode 20:54:45 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000480010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1359.548057] NILFS (loop3): couldn't find nilfs on the device [ 1359.590070] NILFS (loop3): couldn't find nilfs on the device 20:54:45 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000004c0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1359.708063] NILFS (loop3): couldn't find nilfs on the device [ 1359.778394] NILFS (loop3): couldn't find nilfs on the device 20:54:46 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000600010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1359.902861] NILFS (loop3): couldn't find nilfs on the device [ 1359.977843] NILFS (loop3): couldn't find nilfs on the device 20:54:46 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1360.054909] bridge0: port 3(team0) entered blocking state [ 1360.061765] bridge0: port 3(team0) entered disabled state [ 1360.071840] device team0 entered promiscuous mode [ 1360.077154] device team_slave_0 entered promiscuous mode [ 1360.085157] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1360.098347] device team0 left promiscuous mode [ 1360.106287] device team_slave_0 left promiscuous mode [ 1360.113050] bridge0: port 3(team0) entered disabled state [ 1360.125287] bond0: team0 is up - this may be due to an out of date ifenslave [ 1360.133262] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1360.144431] bridge0: port 3(team0) entered blocking state [ 1360.168881] bridge0: port 3(team0) entered disabled state [ 1360.176057] device team0 entered promiscuous mode [ 1360.182820] device team_slave_0 entered promiscuous mode [ 1360.192295] bridge0: port 3(team0) entered blocking state [ 1360.197947] bridge0: port 3(team0) entered forwarding state 20:54:46 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c744241", 0x38, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1360.213952] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1360.229914] bond0: team0 is up - this may be due to an out of date ifenslave [ 1360.245574] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1360.263297] device team0 left promiscuous mode [ 1360.267919] device team_slave_0 left promiscuous mode [ 1360.275533] device team_slave_1 left promiscuous mode [ 1360.290999] bridge0: port 3(team0) entered disabled state [ 1360.330198] bond0: team0 is up - this may be due to an out of date ifenslave [ 1360.356987] bridge0: port 3(team0) entered blocking state [ 1360.363338] bridge0: port 3(team0) entered disabled state [ 1360.372019] device team0 entered promiscuous mode 20:54:46 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1360.377054] device team_slave_0 entered promiscuous mode [ 1360.383226] device team_slave_1 entered promiscuous mode [ 1360.390785] bridge0: port 3(team0) entered blocking state [ 1360.396443] bridge0: port 3(team0) entered forwarding state [ 1360.405041] device team0 left promiscuous mode [ 1360.414654] device team_slave_0 left promiscuous mode 20:54:46 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) 20:54:46 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000680010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:46 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e58650010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1360.461405] bridge0: port 3(team0) entered disabled state [ 1360.567643] NILFS (loop3): couldn't find nilfs on the device [ 1360.650976] NILFS (loop3): couldn't find nilfs on the device [ 1360.684024] 8021q: adding VLAN 0 to HW filter on device team0 20:54:46 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000006c0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1360.807728] NILFS (loop3): couldn't find nilfs on the device 20:54:47 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000740010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1360.893700] device team0 entered promiscuous mode [ 1360.908158] device team_slave_0 entered promiscuous mode [ 1360.964083] bond0: Enslaving team0 as an active interface with an up link [ 1360.986767] bond0: Releasing backup interface team0 [ 1360.992665] device team0 left promiscuous mode [ 1361.004969] NILFS (loop3): couldn't find nilfs on the device [ 1361.010888] device team_slave_0 left promiscuous mode 20:54:47 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x2, 0x9, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x2000) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) 20:54:47 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000007a0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1361.228385] NILFS (loop3): couldn't find nilfs on the device 20:54:47 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000ff800010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1361.370882] NILFS (loop3): couldn't find nilfs on the device 20:54:47 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000fff0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1361.668843] NILFS (loop3): couldn't find nilfs on the device [ 1361.921844] bridge0: port 3(team0) entered blocking state [ 1361.999284] bridge0: port 3(team0) entered disabled state [ 1362.053101] device team0 entered promiscuous mode [ 1362.095032] device team_slave_0 entered promiscuous mode [ 1362.144264] device team0 left promiscuous mode [ 1362.153341] device team_slave_0 left promiscuous mode 20:54:48 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1362.202174] bridge0: port 3(team0) entered disabled state [ 1362.246155] bond0: team0 is up - this may be due to an out of date ifenslave [ 1362.332797] bridge0: port 3(team0) entered blocking state [ 1362.338765] bridge0: port 3(team0) entered disabled state [ 1362.387257] device team0 entered promiscuous mode [ 1362.419067] device team_slave_0 entered promiscuous mode [ 1362.445548] bridge0: port 3(team0) entered blocking state [ 1362.451262] bridge0: port 3(team0) entered forwarding state 20:54:48 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c744241", 0x38, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1362.491701] bond0: team0 is up - this may be due to an out of date ifenslave [ 1362.506572] device team0 left promiscuous mode [ 1362.511645] device team_slave_0 left promiscuous mode [ 1362.529331] device team_slave_1 left promiscuous mode [ 1362.544193] bridge0: port 3(team0) entered disabled state [ 1362.565588] bond0: team0 is up - this may be due to an out of date ifenslave [ 1362.591858] bridge0: port 3(team0) entered blocking state [ 1362.598260] bridge0: port 3(team0) entered disabled state [ 1362.645208] device team0 entered promiscuous mode [ 1362.667526] device team_slave_0 entered promiscuous mode [ 1362.673179] device team_slave_1 entered promiscuous mode [ 1362.702368] bridge0: port 3(team0) entered blocking state [ 1362.708052] bridge0: port 3(team0) entered forwarding state [ 1362.747194] device team0 left promiscuous mode [ 1362.752466] device team_slave_0 left promiscuous mode 20:54:49 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00810010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:49 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:49 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000080ff0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x84a00, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x5, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x612f90052de903e5, 0x0) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0x6e1e, 0x90, 0x228, 0x40, 0xa, "4540e0f9f790752919ba84aaa7f15566a755b5"}) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000ac0)=0x15) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5000940a, &(0x7f0000000b00)={{r3}, "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"}) ioctl$TCFLSH(r0, 0x804c4700, 0x2) [ 1362.890949] bridge0: port 3(team0) entered disabled state [ 1363.021654] NILFS (loop3): couldn't find nilfs on the device [ 1363.069299] ieee802154 phy0 wpan0: encryption failed: -22 [ 1363.074954] ieee802154 phy1 wpan1: encryption failed: -22 20:54:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) r2 = openat$ocfs2_control(0xffffffffffffff9c, &(0x7f0000000080), 0x668300, 0x0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000100)={0x4, 0x2, 0x3, 0x7f, 0x13, "f18f5664067a133398afdca2702dbcd18c0a83"}) r3 = ioctl$TIOCGPTPEER(r1, 0x5441, 0xff) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000000)=0x9) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000140)=0x17) ioctl$TCFLSH(r1, 0x804c4700, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000180)=0x1b) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) [ 1363.113720] 8021q: adding VLAN 0 to HW filter on device team0 [ 1363.137048] device team0 entered promiscuous mode [ 1363.142089] device team_slave_0 entered promiscuous mode 20:54:49 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000011000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1363.159014] bond0: Enslaving team0 as an active interface with an up link [ 1363.172282] bond0: Releasing backup interface team0 [ 1363.178173] device team0 left promiscuous mode [ 1363.196147] device team_slave_0 left promiscuous mode [ 1363.303055] NILFS (loop3): couldn't find nilfs on the device 20:54:49 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x20040, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xa) r3 = syz_mount_image$btrfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x1ff, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000140)="51084fd4f16289de02f09d30f09abb7f6916c82877deab55d466d07908a4fcf33d475a5454be941faea6172c6f604b61249d7308e94281e20dc61dfe31c8437ad52adfea067915da9951eabe45", 0x4d, 0x4dbb}, {&(0x7f0000000280)="8860a1ec9ae3780789837ea51fbc6b8960c8c4cb1930fbf868dc86532321e583993cd66321e08cdbddb2835456295d1b9fc4522bb605344c7e761942351f2110b84019331e5b5926697548ebfdf9f1c94f2742d6d18dc178245aab8495baf48584db59ee2e435ed243c4962e7a9ebb8321f9cce3b97cd134c084c0a1e66a9e94d28e98ce3b765b5e40aa0023aef91c45876b430665da2240fbcfe11e0923b19d9f19f2796918a77139ff5e482c64eb21fb22ec90f6f49431ca68c08c3f2620561ef5326319df7b14e859077357c56828a2dad32815ecf72ba97cd332f08892aa1822a7350d32ef219a428bfbaa6a737104d549d62d", 0xf5, 0x9}], 0x1000002, &(0x7f0000000380)={[{@discard}, {@space_cache_v2}, {@usebackuproot}, {@nossd}], [{@fsname={'fsname', 0x3d, '/dev/ptmx\x00'}}, {@appraise_type}, {@subj_type={'subj_type', 0x3d, '/dev/ptmx\x00'}}, {@hash}]}) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000200)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) ioctl$TCFLSH(r1, 0x804c4700, 0x0) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) setsockopt$inet6_int(r5, 0x29, 0x10, &(0x7f0000000500)=0x4, 0x4) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000400)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000440)={&(0x7f0000000b00)={0x12e8, 0x1e, 0x400, 0x70bd26, 0x25dfdbfb, {0x2}, [@generic="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", @typed={0x14, 0x27, 0x0, 0x0, @ipv6=@mcast2}, @generic="77fd7b6a29da31f58749dc57bea9b8673fb1eb1eb1407a66ced98e500f29cdb5fbff047b213f137473cc6af0ccb10e0641d1258565732b43a494bc5ec83c19b8325a3d3819495ac473bfd65780f78d4e64efbf1cff0eca63a771e240434d9ffb87b295c422bcae08badfc2f5cfffd5006aaff7d0e18794886fa0c6af77ffd6d4b4a8968ce03218ed85974ba6288a9ee182534bdedf8720d36644d52e75894466d35411ff44e4a6c9928b", @nested={0x214, 0x69, 0x0, 0x1, [@typed={0x8, 0x1, 0x0, 0x0, @pid}, @generic="293be8fe466c9c64faa973e38f2044aa2db30a8e16e6e1be5a107a400ec67425681b063c4eb7927fbb735e246cd430af63886949eafa3eef767c856b08d51d0c9449606f689681b8316cb0eef7f0f2db0ed714eacdc5aa638ebf29e42434ef7f7785fe4ff30faf8c3a951fd2c1b37f02c090bcf5776848811563d9b3a3783a5446961c1ab99cdba205da5190522c08bef84057d975ac320d3059449625ae18b1c76386788d5f44a003b2007368cc3cae3300114f35f030f0433b5b", @typed={0x8, 0x80, 0x0, 0x0, @fd=r4}, @typed={0x14, 0x6c, 0x0, 0x0, @ipv6=@loopback}, @generic="378fc10cdc78da44f642bacba74118695b24c8577e765f34b0f9fc458a7f01defe87e006b5b300b7a49c168461884bb0e0be1d6ab2063f2f0bf6a520302c3b779a564e74c9bece35b60c42876b86383e9127cac837f703a898c6aa2e972aca", @typed={0x8, 0x9, 0x0, 0x0, @ipv4=@broadcast}, @typed={0x8, 0x85, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @generic="cd304b006b896727486ac5ea20ea339dff6fb355ae70e80a491aebc64383b934a5af0de7d79001382253b0aaa390688c9660eacb61cc67ffd11c082ace7dce52ad3df1e3573e7e7a83e0183ae2a41b885f77c9c6415f10d14d38456bf4391e2b5db30f2d8280a128ba99aff4c9955c3529ab297089868ea96d95cdb8db4488825a6127d5d67ace5183904f30726887eb770502a3261f279c57f852d82f467a164e6f6e0fdddef444046e9451c53af0ce57f25c06913ff17af2157cec6b78c32c6f7d"]}]}, 0x12e8}, 0x1, 0x0, 0x0, 0x44885}, 0x8001) 20:54:49 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000012000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1363.514182] NILFS (loop3): couldn't find nilfs on the device 20:54:49 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000014000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1363.713810] NILFS (loop3): couldn't find nilfs on the device 20:54:50 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000020000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1363.942311] NILFS (loop3): couldn't find nilfs on the device [ 1364.202627] bridge0: port 3(team0) entered blocking state [ 1364.237388] bridge0: port 3(team0) entered disabled state [ 1364.280583] device team0 entered promiscuous mode [ 1364.308492] device team_slave_0 entered promiscuous mode [ 1364.358775] validate_nla: 10 callbacks suppressed [ 1364.358786] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1364.377089] device team0 left promiscuous mode [ 1364.381808] device team_slave_0 left promiscuous mode 20:54:50 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1364.422029] bridge0: port 3(team0) entered disabled state [ 1364.459319] bond0: team0 is up - this may be due to an out of date ifenslave [ 1364.500662] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1364.530497] bridge0: port 3(team0) entered blocking state [ 1364.600898] bridge0: port 3(team0) entered disabled state [ 1364.678814] device team0 entered promiscuous mode [ 1364.731492] device team_slave_0 entered promiscuous mode [ 1364.771964] bridge0: port 3(team0) entered blocking state [ 1364.777680] bridge0: port 3(team0) entered forwarding state [ 1364.872422] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1364.890734] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:51 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c744241", 0x38, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1364.934717] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1364.946471] device team0 left promiscuous mode [ 1364.970875] device team_slave_0 left promiscuous mode 20:54:51 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000002f000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1364.986663] device team_slave_1 left promiscuous mode [ 1365.002556] bridge0: port 3(team0) entered disabled state [ 1365.038289] bond0: team0 is up - this may be due to an out of date ifenslave [ 1365.102456] NILFS (loop3): couldn't find nilfs on the device [ 1365.108479] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1365.124353] bridge0: port 3(team0) entered blocking state [ 1365.169180] bridge0: port 3(team0) entered disabled state [ 1365.212758] device team0 entered promiscuous mode [ 1365.230825] device team_slave_0 entered promiscuous mode [ 1365.258361] device team_slave_1 entered promiscuous mode [ 1365.270162] bridge0: port 3(team0) entered blocking state [ 1365.275859] bridge0: port 3(team0) entered forwarding state [ 1365.349944] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1365.366537] device team0 left promiscuous mode [ 1365.383289] device team_slave_0 left promiscuous mode 20:54:51 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:51 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) r2 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000), 0x244000) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000040)={0xffffffff, 0x400, 0x3, 0x3f, 0x1a, "ca12f2217166f432e26db062686729df03304d"}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) 20:54:51 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e20000150008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:51 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000003f000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1365.397356] bridge0: port 3(team0) entered disabled state [ 1365.476779] 8021q: adding VLAN 0 to HW filter on device team0 [ 1365.499286] NILFS (loop3): couldn't find nilfs on the device [ 1365.526378] device team0 entered promiscuous mode 20:54:51 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000063000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1365.561188] device team_slave_0 entered promiscuous mode [ 1365.593242] bond0: Enslaving team0 as an active interface with an up link [ 1365.629138] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1365.671151] bond0: Releasing backup interface team0 [ 1365.686475] device team0 left promiscuous mode [ 1365.708574] device team_slave_0 left promiscuous mode [ 1365.718542] NILFS (loop3): couldn't find nilfs on the device 20:54:52 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000040000000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1366.008101] NILFS (loop3): couldn't find nilfs on the device 20:54:52 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000080000000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:52 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc48c0, 0x9) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1366.266319] NILFS (loop3): couldn't find nilfs on the device [ 1366.278110] bridge0: port 3(team0) entered blocking state [ 1366.292867] bridge0: port 3(team0) entered disabled state [ 1366.313138] device team0 entered promiscuous mode [ 1366.318967] device team_slave_0 entered promiscuous mode [ 1366.327660] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1366.353991] device team0 left promiscuous mode [ 1366.360184] NILFS (loop3): couldn't find nilfs on the device 20:54:52 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d", 0x20, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1366.365643] device team_slave_0 left promiscuous mode [ 1366.378702] bridge0: port 3(team0) entered disabled state [ 1366.402756] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:52 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000a83200000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1366.428496] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1366.438631] bridge0: port 3(team0) entered blocking state [ 1366.476642] bridge0: port 3(team0) entered disabled state [ 1366.517938] device team0 entered promiscuous mode [ 1366.549433] device team_slave_0 entered promiscuous mode [ 1366.566581] NILFS (loop3): couldn't find nilfs on the device [ 1366.593371] bridge0: port 3(team0) entered blocking state [ 1366.599094] bridge0: port 3(team0) entered forwarding state 20:54:52 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cb", 0x3c, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:52 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000ac3200000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1366.668977] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1366.691477] bond0: team0 is up - this may be due to an out of date ifenslave [ 1366.703330] device team0 left promiscuous mode [ 1366.709820] device team_slave_0 left promiscuous mode [ 1366.719571] device team_slave_1 left promiscuous mode [ 1366.734065] bridge0: port 3(team0) entered disabled state [ 1366.746193] bond0: team0 is up - this may be due to an out of date ifenslave [ 1366.746356] NILFS (loop3): couldn't find nilfs on the device [ 1366.760988] bridge0: port 3(team0) entered blocking state [ 1366.768387] bridge0: port 3(team0) entered disabled state [ 1366.787960] device team0 entered promiscuous mode [ 1366.793441] device team_slave_0 entered promiscuous mode [ 1366.836935] NILFS (loop3): couldn't find nilfs on the device [ 1366.842075] device team_slave_1 entered promiscuous mode [ 1366.896618] bridge0: port 3(team0) entered blocking state [ 1366.902829] bridge0: port 3(team0) entered forwarding state [ 1366.984709] device team0 left promiscuous mode [ 1366.990069] device team_slave_0 left promiscuous mode 20:54:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:53 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000067008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:53 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000b03200000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1367.030569] bridge0: port 3(team0) entered disabled state 20:54:53 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1367.165240] NILFS (loop3): couldn't find nilfs on the device 20:54:53 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000b43200000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1367.307852] 8021q: adding VLAN 0 to HW filter on device team0 [ 1367.370207] device team0 entered promiscuous mode [ 1367.387342] device team_slave_0 entered promiscuous mode [ 1367.411555] NILFS (loop3): couldn't find nilfs on the device [ 1367.442171] bond0: Enslaving team0 as an active interface with an up link 20:54:53 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000bc3200000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1367.494260] bond0: Releasing backup interface team0 [ 1367.501588] device team0 left promiscuous mode [ 1367.529731] device team_slave_0 left promiscuous mode [ 1367.609101] NILFS (loop3): couldn't find nilfs on the device 20:54:53 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000002000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:53 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x80, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) r2 = syz_open_pts(r1, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$TCSETAW(0xffffffffffffffff, 0x5407, &(0x7f0000000080)={0x1f, 0x0, 0x7, 0x9, 0x5, "dab4657ecd808282"}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) r4 = syz_open_dev$audion(&(0x7f0000000000), 0x81, 0x10080) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000ac0)=0x4) ioctl$TCFLSH(r2, 0x804c4700, 0x0) [ 1367.843551] NILFS (loop3): couldn't find nilfs on the device [ 1367.876304] Unknown ioctl -2147199952 [ 1367.889150] Unknown ioctl -2147199952 [ 1367.899924] NILFS (loop3): couldn't find nilfs on the device [ 1368.062112] bridge0: port 3(team0) entered blocking state [ 1368.068024] bridge0: port 3(team0) entered disabled state [ 1368.075250] device team0 entered promiscuous mode [ 1368.089482] device team_slave_0 entered promiscuous mode 20:54:54 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d", 0x20, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:54 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000e80)=0xe8) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000540)='./file1\x00', 0x5, 0x8, &(0x7f0000000c00)=[{&(0x7f00000006c0)="d86a9a21dd02a8f6e8b464fd93a68af7d38bd65dc80f28be4fcce05293bb22eb9ae0dbbdc692eec36fd643258029206bc8781737c62c3add2a70616271de480bf50c8d5130c3b875bb8c81aa01492fdeb624d48ef96229fe6a409d25d9bf6e430a973401a3f7ee64e36240e697b7a510cc18378116ef1e2cd3c8230b9110a00041f62422cda5e8390a4f50c6dda4df5deda59fe08e89113a8fd893819c2158d0536d20a613b91785499a4b1731879cb34427f7f96337a3d25639d53873da86ff1e28cbe1951adf9c69", 0xc9, 0x3}, {&(0x7f0000000600)="0cd5d7d4066c0e5060b80760b3833022b191e389f00e4a1ca71aa3b5179429d5438a32d632f834b05f23dead02a4d6d7546c04ca0d3942363f2e0444bbdf8154d46eca0e114dd176fe51878c15052d3eb8c75246", 0x54, 0x5}, {&(0x7f00000007c0)="cf4fefb79e552468de067bc98a8c8a5ce531740c501d60cc2c4084912742b109446453450eef0d1e11ad0123953187aa4691fc011b803ee833afd36a", 0x3c, 0x5}, {&(0x7f0000000900)="d5f2148492e814981cd8f689f2a1d5d59591211af66b9ad07711c74cd0c7be5b009e99c756af4b7050f0b71f32cb55be6a2d49dcbf23d344e3a509c890b80df0cafdf0dbd6db009232d9d101616ffa3504821afccc41af4bc6497760b9c06511d860a534e2a7050c10e3f0e7e3b0cdb286506a8baefae4d32a6dc79ef9fedb97019d9bb7edc0c38da3b07c64309bfa6a030bfa6b", 0x94, 0x7ff}, {&(0x7f0000000800)="e9d6a290ec73c736fcd55b22bbec337b6db5c9ea9b77d13a2713738f52192fc330274eb17ea961d9b4e365a2d71afc85dfd55de02c3a062f4a877911aab63dfe430bfc10", 0x44, 0x1}, {&(0x7f00000009c0)="b1a42875e3df1d1d78892ffb1455f80c4a96853ded1cf3d5a6569bb043d891ba7bc54d9e57e17f70d3f042597a025c8bae3aae73caf6405e0a3951bd97d5aea28129af41a50667f6ab2618867203e50c7d39ca3415849c21511d6bb885fd434de6a7ee6a787b33d59524dd7ad3eff7153b11e7f927a046d19b517de230ce7899129b6b4bd005111a56ca56b04cee451a3240aec155ad1073f60a6c3c84f50db9455b1f961f3468550abb5d0079db12ec4bc77c6223961d4833f1657256dc73ebde5a280f80cae9f5ca5cce08e216993e0707c570b310c2c29ec1707d3e4878732b97b2ccb3f352d9", 0xe8, 0x3}, {&(0x7f0000000ac0)="8a80458c3290aeb418e713036cfe63fbe69cef58b8e1d51a60691550832ce3c29017b6e9e4556533f28b43984049e6ccf65cd1229b431a5aab9c06000000c8837dfeb7949d8d0e80d5943bcf49d4438de8150a1fe0e7d7475ebed765914129fcf0538b6e1395eb145604c938c5889599179427805c30179f1c5f3a511b8cf0ab2848f142adff4e6e4859280df112efc7ee9f2eb2bdcfbd3168eb91bd17b3a8df3fe6e26229a6d1a3abe1ad79a2209cdefd3a650c037fc0da5a50b52e4081689a1782d6132d86ea325831", 0xca, 0x8}, {&(0x7f0000000bc0)="193844ff3315bd1d26ea4b981b8d20592a8f2aad03d314f2f98926eab8922339612c4d4dbc5450", 0x27, 0x4}], 0x88, &(0x7f0000000ec0)={[{@huge_always}, {@gid}, {@gid}, {@huge_never}], [{@smackfsroot={'smackfsroot', 0x3d, '#-^](+{'}}, {@fowner_lt={'fowner<', r2}}, {@euid_gt={'euid>', 0xee00}}, {@appraise}, {@obj_type={'obj_type', 0x3d, '%\x00'}}, {@obj_role={'obj_role', 0x3d, 'huge=never'}}, {@pcr={'pcr', 0x3d, 0x33}}]}) mount$fuseblk(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x2000, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id', 0x3d, r2}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[{@default_permissions}, {@default_permissions}, {@allow_other}, {@allow_other}, {@blksize={'blksize', 0x3d, 0xe00}}, {@blksize={'blksize', 0x3d, 0x1a00}}, {@allow_other}, {@allow_other}], [{@audit}, {@obj_role}, {@measure}]}}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r3, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r4 = syz_open_pts(r3, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000500)=0x1) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0x1a) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000ac0)=0x15) syz_mount_image$qnx4(&(0x7f0000000140), &(0x7f0000000180)='./file1\x00', 0x2, 0x8, &(0x7f0000000cc0)=[{&(0x7f00000001c0)="cf8a64137b52863f23a8a70273ed9b481dc37294c652059867701ad461cda62d5d5c1ae9951cac9dce10366b9675ff8c5bfdb6c807dafd3b8880ff24f23f9df3b056feaa0490900fcc42200df6cce409d1f556f3a088d44b2be6359d89ff3e8deb9c84c56c7f93af", 0x68, 0xfffffffffffff20f}, {&(0x7f00000003c0)="4d7542d88a1c9f227379e37a959ab1eb607ad61822da25d502b70264db5b0e8bf8c486203a485b16c117f37f804712521b9594929930790807a6576a007f47b47cd86b54285f7270e512fb311151", 0x4e, 0x1000}, {&(0x7f0000000fc0)="9fc2458b839bc3a36b684adbee16d66e66d6ea1f20238402750fd00d73c112c18324663db52128ca4b00c530269bf721791258f2be9cb4e6e8c7403063ce9d9cdd6a650257cff962e83242e0ff9db57cef359c2c239393b2268b853cf5738f1a4b8789c18a4dd4610c9d5e7d8d8d82a19c6a698a536e784816c6f680839bcdd7ce2bc899c3a1bbf75a757f03513a7855baff7f911a9cdf6972f04623ce7c17ba95489ca051050d584def02a1825cd8d80a06d4057e92a3e9f389d54dd35829e50911f8e5a6ad6576dd", 0xc9, 0x5}, {&(0x7f00000010c0)="bbd27cc9e9fa2e82923d7680fabba2d3c41be429bc0d31036fde304d81e057e721d29747658e6690497edc87102c02159820167feebdb4076e7abd3db765322153142a1bf8de8dd6f3e3b896c0ce3f00aad883d5f7f15fe520d49846e31178b4b7617b7cb17d05c442ea4f2ddb40d6524170b21cb22391009425f8730c2f1838d1d1539e12879ec98f0dfccd80382540f16e04a80ad96475e9a5c4304d18c3ff1d1fed338930fdb8872e4b5bc6c2e053853266ea6b8251de9ec3282cd681fe63c449a20901932c1f0ad5c7054274e220582ded1ad9386051fd39424bbc35ed318ef7", 0xe2, 0x2}, {&(0x7f0000000440)="e20cae3e516d0f44a17cd491da905ab1fa63d3885cd82909fc5096d857036320e150b5f949e2e1efb29f61d3bbef847633c54acb26a1d8714e1b23b7a7aab5c9dc", 0x41, 0x5}, {&(0x7f00000011c0)="ce31e14513deb4debec1b5122ccc258911049115896fa068e951d560918a07240b168ff653ed19ceb76ad9d1082956c1c2cb02563e03b100b5682ae0138b81bc5eb8e67c31c4ba411a55a3553ab24637536be42d041ffce75334514e1cf9b7fb175cd73ad62a0a31dae9eae357a78b17dc8e24cc8edcda84b9b238f25fda4723845ca354b2fb49b94d5e71f6bee45965de25248720683aa5def38bfa731edccd2a4cf9d8faf515524db5c6a2f7f0d255f55a10ae6deb86dd827537bf4c5039b918b8a190a1116ec5a05f993bc1f2097aae2bcf", 0xd3, 0x56}, {&(0x7f0000000580)="5533a754d2951438934e5ed89fe5a2f0719e9de16f44bafdb2246275bc5793c7e2e036210dee6d28c400f8a5cb7ee120d522ee4ea8d4b074e9fdd13db40b940d3b12d63682f7ab3e7aff4c608dd3ce76217346daa0d5008925d680564438659474dcee72a6eb880f874273903103", 0x6e, 0x4cc21185}, {&(0x7f00000012c0)="c20e381ea265cf58504b674ed35aa1e20c8e77a591ebb6803d4dcb263254b6c8ad1deeea70a9b9235752649ab185162c73fcaf1d00954a6a1492a89f000e2159763d33087b39b2cc1025ca18fbd8481820fd5f9d5200ba13acf0ad21c95f8077c485224f1a36ffc738e2415a9d64ea13e2d42ba2b2c350824b6d58a64b41d18e59989c11fb265c1b14783ce098975294e8c26949d450696db9f8f1f6db97a764b35933a0a52716d291f6cbce8a1df35d04219cb70814c8b4146e2d3851bb1d89ed42dbb279bc328ee4678fca7c668a0443aecba18794f1e6651bd28718cf0242dd1f2e", 0xe3, 0x1}], 0x8000, &(0x7f00000013c0)={[{'[{'}, {'default_permissions'}, {'/dev/vsock\x00'}], [{@fsmagic={'fsmagic', 0x3d, 0x7}}, {@pcr={'pcr', 0x3d, 0x38}}, {@dont_measure}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@dont_appraise}]}) ioctl$TCFLSH(r4, 0x804c4700, 0x0) [ 1368.108701] device team0 left promiscuous mode [ 1368.113450] device team_slave_0 left promiscuous mode [ 1368.132896] bridge0: port 3(team0) entered disabled state [ 1368.166310] bond0: team0 is up - this may be due to an out of date ifenslave [ 1368.183685] bridge0: port 3(team0) entered blocking state [ 1368.187009] tmpfs: Bad mount option smackfsroot [ 1368.194262] bridge0: port 3(team0) entered disabled state [ 1368.205390] device team0 entered promiscuous mode [ 1368.215068] device team_slave_0 entered promiscuous mode 20:54:54 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cb", 0x3c, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:54 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000004000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1368.241606] bridge0: port 3(team0) entered blocking state [ 1368.247281] bridge0: port 3(team0) entered forwarding state [ 1368.266706] bond0: team0 is up - this may be due to an out of date ifenslave [ 1368.286613] device team0 left promiscuous mode 20:54:54 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00020010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1368.300417] device team_slave_0 left promiscuous mode [ 1368.318902] device team_slave_1 left promiscuous mode [ 1368.337263] bridge0: port 3(team0) entered disabled state [ 1368.363086] NILFS (loop3): couldn't find nilfs on the device 20:54:54 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000008000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1368.413474] bond0: team0 is up - this may be due to an out of date ifenslave [ 1368.428643] bridge0: port 3(team0) entered blocking state [ 1368.440489] bridge0: port 3(team0) entered disabled state [ 1368.457328] device team0 entered promiscuous mode 20:54:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1368.468375] device team_slave_0 entered promiscuous mode [ 1368.487917] device team_slave_1 entered promiscuous mode [ 1368.495093] bridge0: port 3(team0) entered blocking state [ 1368.500791] bridge0: port 3(team0) entered forwarding state [ 1368.508080] device team0 left promiscuous mode [ 1368.525005] device team_slave_0 left promiscuous mode [ 1368.535373] NILFS (loop3): couldn't find nilfs on the device [ 1368.555762] bridge0: port 3(team0) entered disabled state [ 1368.587405] NILFS (loop3): couldn't find nilfs on the device 20:54:54 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000c000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1368.748793] 8021q: adding VLAN 0 to HW filter on device team0 [ 1368.843488] NILFS (loop3): couldn't find nilfs on the device [ 1368.848225] device team0 entered promiscuous mode [ 1368.857312] device team_slave_0 entered promiscuous mode 20:54:55 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000020010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1368.943069] bond0: Enslaving team0 as an active interface with an up link [ 1368.966631] bond0: Releasing backup interface team0 [ 1368.977264] device team0 left promiscuous mode [ 1368.987668] device team_slave_0 left promiscuous mode [ 1369.088569] NILFS (loop3): couldn't find nilfs on the device 20:54:55 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000030010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1369.268472] NILFS (loop3): couldn't find nilfs on the device 20:54:55 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000040010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1369.457241] NILFS (loop3): couldn't find nilfs on the device 20:54:55 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000050010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1369.500663] bridge0: port 3(team0) entered blocking state [ 1369.537765] bridge0: port 3(team0) entered disabled state [ 1369.570513] device team0 entered promiscuous mode [ 1369.594497] device team_slave_0 entered promiscuous mode [ 1369.606546] validate_nla: 11 callbacks suppressed [ 1369.606562] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 20:54:55 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d", 0x20, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1369.640442] NILFS (loop3): couldn't find nilfs on the device [ 1369.649029] device team0 left promiscuous mode [ 1369.666222] device team_slave_0 left promiscuous mode [ 1369.707124] bridge0: port 3(team0) entered disabled state [ 1369.736226] bond0: team0 is up - this may be due to an out of date ifenslave [ 1369.749318] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1369.758802] bond0: team0 is up - this may be due to an out of date ifenslave [ 1369.767537] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1369.776483] bridge0: port 3(team0) entered blocking state [ 1369.788116] bridge0: port 3(team0) entered disabled state [ 1369.796803] device team0 entered promiscuous mode [ 1369.802473] device team_slave_0 entered promiscuous mode [ 1369.811879] bridge0: port 3(team0) entered blocking state [ 1369.818828] bridge0: port 3(team0) entered forwarding state [ 1369.832674] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1369.859003] device team0 left promiscuous mode [ 1369.865185] device team_slave_0 left promiscuous mode [ 1369.871172] device team_slave_1 left promiscuous mode [ 1369.886815] bridge0: port 3(team0) entered disabled state [ 1369.903276] bond0: team0 is up - this may be due to an out of date ifenslave [ 1369.914404] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1369.922781] bridge0: port 3(team0) entered blocking state [ 1369.930486] bridge0: port 3(team0) entered disabled state [ 1369.942551] device team0 entered promiscuous mode [ 1369.954569] device team_slave_0 entered promiscuous mode [ 1369.962463] device team_slave_1 entered promiscuous mode [ 1369.986276] bridge0: port 3(team0) entered blocking state [ 1369.991919] bridge0: port 3(team0) entered forwarding state [ 1370.013458] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1370.040847] device team0 left promiscuous mode [ 1370.051904] device team_slave_0 left promiscuous mode [ 1370.088220] bridge0: port 3(team0) entered disabled state [ 1370.212394] 8021q: adding VLAN 0 to HW filter on device team0 [ 1370.249083] device team0 entered promiscuous mode [ 1370.254262] device team_slave_0 entered promiscuous mode [ 1370.284502] bond0: Enslaving team0 as an active interface with an up link [ 1370.293962] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1370.330939] bond0: Releasing backup interface team0 [ 1370.337088] device team0 left promiscuous mode [ 1370.343738] device team_slave_0 left promiscuous mode [ 1370.755024] bridge0: port 3(team0) entered blocking state [ 1370.774274] bridge0: port 3(team0) entered disabled state [ 1370.811043] device team0 entered promiscuous mode [ 1370.831219] device team_slave_0 entered promiscuous mode 20:54:57 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00040010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:57 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000060010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:57 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cb", 0x3c, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:57 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:57 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)={0x3, 0x0, 0x1, 0x2, 0xb, "33ab9f9c61fd53dba7ceed34d8a63cf9beeabe"}) 20:54:57 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129", 0x30, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1371.325812] NILFS (loop3): couldn't find nilfs on the device [ 1371.331262] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1371.394040] device team0 left promiscuous mode 20:54:57 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000070010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1371.467131] device team_slave_0 left promiscuous mode [ 1371.516128] bridge0: port 3(team0) entered disabled state [ 1371.538569] NILFS (loop3): couldn't find nilfs on the device 20:54:57 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000080010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1371.736982] 8021q: adding VLAN 0 to HW filter on device team0 [ 1371.776843] NILFS (loop3): couldn't find nilfs on the device [ 1371.801962] device team0 entered promiscuous mode [ 1371.828777] device team_slave_0 entered promiscuous mode [ 1371.878463] bond0: Enslaving team0 as an active interface with an up link [ 1371.918174] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 20:54:58 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000090010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1371.955957] bond0: team0 is up - this may be due to an out of date ifenslave 20:54:58 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00060010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1372.000776] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1372.020836] bond0: Releasing backup interface team0 [ 1372.064220] device team0 left promiscuous mode [ 1372.071941] NILFS (loop3): couldn't find nilfs on the device [ 1372.084528] device team_slave_0 left promiscuous mode [ 1372.145025] NILFS (loop3): couldn't find nilfs on the device 20:54:58 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000c0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1372.378924] NILFS (loop3): couldn't find nilfs on the device 20:54:58 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000120010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1372.580306] NILFS (loop3): couldn't find nilfs on the device 20:54:58 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) r2 = bpf$ITER_CREATE(0x21, &(0x7f0000000000), 0x8) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000040)={0x3ff, 0x5, 0x2, 0x7fff, 0x17, "c24c3b28fbc62947eeecdf30c5b883730da123"}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) 20:54:58 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000200010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1372.795053] NILFS (loop3): couldn't find nilfs on the device [ 1372.958794] bridge0: port 3(team0) entered blocking state [ 1372.965064] bridge0: port 3(team0) entered disabled state [ 1372.982400] device team0 entered promiscuous mode [ 1373.005271] device team_slave_0 entered promiscuous mode [ 1373.053271] device team0 left promiscuous mode [ 1373.060368] device team_slave_0 left promiscuous mode [ 1373.066234] bridge0: port 3(team0) entered disabled state [ 1373.125758] bond0: team0 is up - this may be due to an out of date ifenslave [ 1373.159152] device team0 left promiscuous mode [ 1373.163767] device team_slave_0 left promiscuous mode [ 1373.198322] device team_slave_1 left promiscuous mode [ 1373.203834] bridge0: port 3(team0) entered disabled state [ 1373.263057] bond0: team0 is up - this may be due to an out of date ifenslave [ 1373.281117] bridge0: port 3(team0) entered blocking state [ 1373.302946] bridge0: port 3(team0) entered disabled state [ 1373.312792] device team0 entered promiscuous mode [ 1373.317937] device team_slave_0 entered promiscuous mode [ 1373.333218] bridge0: port 3(team0) entered blocking state [ 1373.338962] bridge0: port 3(team0) entered forwarding state 20:54:59 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e", 0x3e, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1373.382339] bridge0: port 3(team0) entered blocking state [ 1373.388392] bridge0: port 3(team0) entered disabled state [ 1373.430055] device team0 entered promiscuous mode [ 1373.435026] device team_slave_0 entered promiscuous mode [ 1373.459985] device team_slave_1 entered promiscuous mode [ 1373.466443] bridge0: port 3(team0) entered blocking state [ 1373.472162] bridge0: port 3(team0) entered forwarding state 20:54:59 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:59 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000230010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:54:59 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129", 0x30, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:54:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00070010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) 20:54:59 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e", 0x3e, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1373.485470] bond0: team0 is up - this may be due to an out of date ifenslave [ 1373.587322] bond0: team0 is up - this may be due to an out of date ifenslave [ 1373.591559] NILFS (loop3): couldn't find nilfs on the device [ 1373.601507] device team0 left promiscuous mode [ 1373.607059] device team_slave_0 left promiscuous mode 20:54:59 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00080010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:54:59 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000040)={0x2, 0x0, 0x2, 0x0, 0x13, "000000fbff1a00000000df0100ddfb6a2300"}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) ioctl$KDGETKEYCODE(r2, 0x4b4c, &(0x7f0000000000)={0x7fffffff, 0x7}) r3 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r3, 0x804c4700, 0x0) [ 1373.687845] bridge0: port 3(team0) entered disabled state [ 1373.747148] NILFS (loop3): couldn't find nilfs on the device 20:54:59 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000480010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1373.816442] 8021q: adding VLAN 0 to HW filter on device team0 20:55:00 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x4a4902, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1373.918210] device team0 entered promiscuous mode [ 1373.924626] device team_slave_0 entered promiscuous mode [ 1373.956475] NILFS (loop3): couldn't find nilfs on the device 20:55:00 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, &(0x7f0000000000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r2, 0x804c4700, 0x0) [ 1373.956537] bond0: Enslaving team0 as an active interface with an up link [ 1373.980673] device team0 left promiscuous mode [ 1373.987274] device team_slave_0 left promiscuous mode [ 1374.006189] bridge0: port 3(team0) entered disabled state [ 1374.033332] bond0: team0 is up - this may be due to an out of date ifenslave [ 1374.052968] NILFS (loop3): couldn't find nilfs on the device [ 1374.062925] bond0: Releasing backup interface team0 [ 1374.069471] device team0 left promiscuous mode [ 1374.079893] device team_slave_0 left promiscuous mode 20:55:00 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000004c0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1374.190570] NILFS (loop3): couldn't find nilfs on the device [ 1374.267486] NILFS (loop3): couldn't find nilfs on the device [ 1374.549914] bridge0: port 3(team0) entered blocking state [ 1374.556698] bridge0: port 3(team0) entered disabled state [ 1374.565316] device team0 entered promiscuous mode [ 1374.572047] device team_slave_0 entered promiscuous mode [ 1374.579834] bridge0: port 3(team0) entered blocking state [ 1374.587378] bridge0: port 3(team0) entered disabled state [ 1374.624847] device team0 entered promiscuous mode [ 1374.652220] device team_slave_0 entered promiscuous mode [ 1374.663143] bridge0: port 3(team0) entered blocking state [ 1374.668890] bridge0: port 3(team0) entered forwarding state [ 1374.679037] validate_nla: 10 callbacks suppressed [ 1374.679046] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1374.707062] device team0 left promiscuous mode [ 1374.727428] device team_slave_0 left promiscuous mode [ 1374.736669] device team_slave_1 left promiscuous mode [ 1374.749244] bridge0: port 3(team0) entered disabled state [ 1374.763843] bond0: team0 is up - this may be due to an out of date ifenslave [ 1374.775189] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1374.789472] bond0: team0 is up - this may be due to an out of date ifenslave [ 1374.798623] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1374.816015] bridge0: port 3(team0) entered blocking state [ 1374.829001] bridge0: port 3(team0) entered disabled state [ 1374.839805] device team0 entered promiscuous mode [ 1374.845459] device team_slave_0 entered promiscuous mode [ 1374.882560] device team_slave_1 entered promiscuous mode [ 1374.890198] bridge0: port 3(team0) entered blocking state [ 1374.895859] bridge0: port 3(team0) entered forwarding state 20:55:01 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:01 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000600010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:01 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129", 0x30, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e000a0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:55:01 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e", 0x3e, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:01 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = syz_open_pts(r0, 0x422040) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TIOCL_PASTESEL(r1, 0x541c, &(0x7f0000000040)) ioctl$TCFLSH(r2, 0x804c4700, 0x0) [ 1375.030039] NILFS (loop3): couldn't find nilfs on the device [ 1375.034691] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1375.131528] bond0: team0 is up - this may be due to an out of date ifenslave [ 1375.150154] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1375.161169] device team0 left promiscuous mode [ 1375.170324] device team_slave_0 left promiscuous mode 20:55:01 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e000c0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:55:01 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000680010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1375.236194] bridge0: port 3(team0) entered disabled state 20:55:01 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000006c0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1375.308284] bond0: team0 is up - this may be due to an out of date ifenslave [ 1375.316366] NILFS (loop3): couldn't find nilfs on the device [ 1375.324995] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1375.344046] device team0 left promiscuous mode 20:55:01 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000740010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1375.400915] device team_slave_0 left promiscuous mode [ 1375.415954] bridge0: port 3(team0) entered disabled state 20:55:01 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000007a0010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1375.624074] 8021q: adding VLAN 0 to HW filter on device team0 [ 1375.635104] NILFS (loop3): couldn't find nilfs on the device [ 1375.711090] device team0 entered promiscuous mode [ 1375.717845] device team_slave_0 entered promiscuous mode [ 1375.733582] NILFS (loop3): couldn't find nilfs on the device [ 1375.783045] bond0: Enslaving team0 as an active interface with an up link [ 1375.814407] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1375.823773] bridge0: port 3(team0) entered blocking state 20:55:02 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000310000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1375.839660] bridge0: port 3(team0) entered disabled state [ 1375.873481] device team0 entered promiscuous mode [ 1375.887427] device team_slave_0 entered promiscuous mode [ 1375.924326] bridge0: port 3(team0) entered blocking state [ 1375.929969] bridge0: port 3(team0) entered forwarding state [ 1375.958013] NILFS (loop3): couldn't find nilfs on the device [ 1376.009189] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1376.028321] NILFS (loop3): couldn't find nilfs on the device [ 1376.035901] bond0: Releasing backup interface team0 [ 1376.074218] device team0 left promiscuous mode [ 1376.113071] device team_slave_0 left promiscuous mode [ 1376.345494] bridge0: port 3(team0) entered blocking state [ 1376.351824] bridge0: port 3(team0) entered disabled state [ 1376.363581] device team0 entered promiscuous mode [ 1376.369364] device team_slave_0 entered promiscuous mode [ 1376.377498] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1376.399011] device team0 left promiscuous mode [ 1376.403636] device team_slave_0 left promiscuous mode [ 1376.413995] device team_slave_1 left promiscuous mode [ 1376.420780] bridge0: port 3(team0) entered disabled state [ 1376.438114] bond0: team0 is up - this may be due to an out of date ifenslave [ 1376.445835] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1376.453566] bridge0: port 3(team0) entered blocking state [ 1376.463924] bridge0: port 3(team0) entered disabled state [ 1376.471005] device team0 entered promiscuous mode [ 1376.480196] device team_slave_0 entered promiscuous mode [ 1376.485937] device team_slave_1 entered promiscuous mode [ 1376.492207] bridge0: port 3(team0) entered blocking state 20:55:02 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:02 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:02 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000510000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:02 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000000)={0x20000000}) 20:55:02 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c744241", 0x38, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:02 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e000e0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1376.497900] bridge0: port 3(team0) entered forwarding state [ 1376.504471] bond0: team0 is up - this may be due to an out of date ifenslave [ 1376.577009] NILFS (loop3): couldn't find nilfs on the device [ 1376.630128] device team0 left promiscuous mode [ 1376.635400] device team_slave_0 left promiscuous mode 20:55:02 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000610000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1376.691485] bridge0: port 3(team0) entered disabled state [ 1376.704978] NILFS (loop3): couldn't find nilfs on the device [ 1376.755788] bond0: team0 is up - this may be due to an out of date ifenslave [ 1376.782510] device team0 left promiscuous mode [ 1376.789553] device team_slave_0 left promiscuous mode [ 1376.806325] NILFS (loop3): couldn't find nilfs on the device [ 1376.822195] bridge0: port 3(team0) entered disabled state [ 1376.864311] NILFS (loop3): couldn't find nilfs on the device 20:55:03 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000710000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1376.984677] 8021q: adding VLAN 0 to HW filter on device team0 [ 1377.025819] NILFS (loop3): couldn't find nilfs on the device [ 1377.029184] device team0 entered promiscuous mode [ 1377.037588] device team_slave_0 entered promiscuous mode 20:55:03 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00100010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1377.066098] bond0: Enslaving team0 as an active interface with an up link [ 1377.074497] bond0: team0 is up - this may be due to an out of date ifenslave [ 1377.084426] bridge0: port 3(team0) entered blocking state [ 1377.091071] bridge0: port 3(team0) entered disabled state [ 1377.098615] device team0 entered promiscuous mode [ 1377.126296] device team_slave_0 entered promiscuous mode [ 1377.140442] NILFS (loop3): couldn't find nilfs on the device [ 1377.164109] bridge0: port 3(team0) entered blocking state [ 1377.169806] bridge0: port 3(team0) entered forwarding state 20:55:03 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000100)={0x0, 0xfffffffd, 0x80000001, 0x31, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0xffffffff, 0xffffff13, 0x88a, 0x9713, 0x16, "8d610075ad4cf627cf8fba9142f17be8b69336"}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000140)=0xf) ioctl$TCFLSH(r1, 0x804c4700, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f0000000080)) 20:55:03 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000910000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1377.188608] device team0 left promiscuous mode [ 1377.195866] device team_slave_0 left promiscuous mode [ 1377.239620] device team_slave_1 left promiscuous mode 20:55:03 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e", 0x3e, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1377.316185] NILFS (loop3): couldn't find nilfs on the device [ 1377.319913] bridge0: port 3(team0) entered disabled state [ 1377.379400] NILFS (loop3): couldn't find nilfs on the device [ 1377.386330] bond0: team0 is up - this may be due to an out of date ifenslave [ 1377.417497] bond0: Releasing backup interface team0 [ 1377.429019] device team0 left promiscuous mode [ 1377.434717] device team_slave_0 left promiscuous mode [ 1377.953745] bridge0: port 3(team0) entered blocking state [ 1377.966746] bridge0: port 3(team0) entered disabled state [ 1377.982154] device team0 entered promiscuous mode [ 1378.001812] device team_slave_0 entered promiscuous mode [ 1378.020072] bridge0: port 3(team0) entered blocking state [ 1378.026913] bridge0: port 3(team0) entered disabled state [ 1378.047867] device team0 entered promiscuous mode [ 1378.057417] device team_slave_0 entered promiscuous mode [ 1378.070216] device team_slave_1 entered promiscuous mode [ 1378.078632] bridge0: port 3(team0) entered blocking state [ 1378.084277] bridge0: port 3(team0) entered forwarding state [ 1378.097133] bond0: team0 is up - this may be due to an out of date ifenslave [ 1378.112823] device team0 left promiscuous mode [ 1378.120339] device team_slave_0 left promiscuous mode 20:55:04 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:04 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) sendfile(r2, r0, &(0x7f0000000000)=0x4, 0x5) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) ioctl$TIOCVHANGUP(r3, 0x5437, 0x0) 20:55:04 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c744241", 0x38, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:04 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000c10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00600010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1378.172999] bridge0: port 3(team0) entered disabled state [ 1378.263387] bond0: team0 is up - this may be due to an out of date ifenslave [ 1378.290113] NILFS (loop3): couldn't find nilfs on the device [ 1378.332918] bridge0: port 3(team0) entered blocking state [ 1378.340628] bridge0: port 3(team0) entered disabled state 20:55:04 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000001210000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1378.392520] device team0 entered promiscuous mode [ 1378.418479] device team_slave_0 entered promiscuous mode [ 1378.434482] bridge0: port 3(team0) entered blocking state [ 1378.440198] bridge0: port 3(team0) entered forwarding state 20:55:04 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000002010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1378.509944] NILFS (loop3): couldn't find nilfs on the device 20:55:04 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000002310000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:04 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000610008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1378.585369] bond0: team0 is up - this may be due to an out of date ifenslave [ 1378.606721] device team0 left promiscuous mode [ 1378.615619] device team_slave_0 left promiscuous mode 20:55:04 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e", 0x3e, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1378.663004] bridge0: port 3(team0) entered disabled state [ 1378.738645] NILFS (loop3): couldn't find nilfs on the device 20:55:04 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000343410000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1378.907100] 8021q: adding VLAN 0 to HW filter on device team0 [ 1378.945719] NILFS (loop3): couldn't find nilfs on the device 20:55:05 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000003f10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1379.048951] device team0 entered promiscuous mode [ 1379.060800] device team_slave_0 entered promiscuous mode [ 1379.119442] bond0: Enslaving team0 as an active interface with an up link [ 1379.184088] device team0 left promiscuous mode [ 1379.188805] device team_slave_0 left promiscuous mode [ 1379.200835] device team_slave_1 left promiscuous mode [ 1379.218597] bridge0: port 3(team0) entered disabled state [ 1379.288086] bond0: team0 is up - this may be due to an out of date ifenslave [ 1379.355332] bond0: Releasing backup interface team0 [ 1379.367955] device team0 left promiscuous mode [ 1379.387043] device team_slave_0 left promiscuous mode [ 1379.733501] bridge0: port 3(team0) entered blocking state [ 1379.754791] bridge0: port 3(team0) entered disabled state [ 1379.781052] device team0 entered promiscuous mode [ 1379.788894] device team_slave_0 entered promiscuous mode [ 1379.795118] validate_nla: 15 callbacks suppressed [ 1379.795126] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1379.892411] bridge0: port 3(team0) entered blocking state [ 1379.919102] bridge0: port 3(team0) entered disabled state [ 1379.928328] device team0 entered promiscuous mode [ 1379.933345] device team_slave_0 entered promiscuous mode [ 1379.942384] device team_slave_1 entered promiscuous mode [ 1379.977306] bridge0: port 3(team0) entered blocking state [ 1379.982987] bridge0: port 3(team0) entered forwarding state [ 1380.055055] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1380.076204] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:06 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500), 0x0, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:06 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000004010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:06 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$KDGKBDIACR(0xffffffffffffffff, 0x4b4a, &(0x7f0000000100)=""/238) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TIOCGPTPEER(r0, 0x5441, 0x2) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f0000000000)={0x5, 0x3, 0x2, 0x4, 0x7}) ioctl$TCFLSH(r1, 0x804c4700, 0x0) 20:55:06 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c744241", 0x38, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:06 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000710008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1380.102884] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1380.138211] device team0 left promiscuous mode [ 1380.159111] device team_slave_0 left promiscuous mode [ 1380.177946] NILFS (loop3): couldn't find nilfs on the device [ 1380.184029] bridge0: port 3(team0) entered disabled state [ 1380.198453] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:06 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000004810000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1380.279812] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1380.317436] bridge0: port 3(team0) entered blocking state [ 1380.359244] NILFS (loop3): couldn't find nilfs on the device [ 1380.383677] bridge0: port 3(team0) entered disabled state [ 1380.428046] device team0 entered promiscuous mode [ 1380.449080] NILFS (loop3): couldn't find nilfs on the device [ 1380.454024] device team_slave_0 entered promiscuous mode 20:55:06 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000004c10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1380.533279] bridge0: port 3(team0) entered blocking state [ 1380.538959] bridge0: port 3(team0) entered forwarding state [ 1380.594223] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 20:55:06 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e", 0x3e, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1380.635850] device team0 left promiscuous mode [ 1380.662683] device team_slave_0 left promiscuous mode [ 1380.702164] NILFS (loop3): couldn't find nilfs on the device [ 1380.744218] bridge0: port 3(team0) entered disabled state 20:55:07 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000006010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1381.002886] 8021q: adding VLAN 0 to HW filter on device team0 [ 1381.022045] device team0 entered promiscuous mode [ 1381.036934] device team_slave_0 entered promiscuous mode [ 1381.051485] bond0: Enslaving team0 as an active interface with an up link [ 1381.071219] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1381.084222] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:07 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000a10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:55:07 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000140)={0xfff, 0x1, 0x1, 0x5, 0x18, "edfe802b1ad992042ea23ee12520b58fb088ab"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x5) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) ioctl$PIO_UNIMAP(r3, 0x4b67, &(0x7f0000000100)={0x1, &(0x7f0000000080)=[{0xfff9, 0x2}]}) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1381.098877] NILFS (loop3): couldn't find nilfs on the device [ 1381.105338] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1381.162895] bond0: Releasing backup interface team0 20:55:07 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000006810000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1381.198175] device team0 left promiscuous mode [ 1381.224869] device team_slave_0 left promiscuous mode [ 1381.323982] NILFS (loop3): couldn't find nilfs on the device [ 1382.006642] bridge0: port 3(team0) entered blocking state [ 1382.044629] bridge0: port 3(team0) entered disabled state [ 1382.075286] device team0 entered promiscuous mode [ 1382.095433] device team_slave_0 entered promiscuous mode [ 1382.145656] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1382.166152] device team0 left promiscuous mode [ 1382.198821] device team_slave_0 left promiscuous mode [ 1382.218683] device team_slave_1 left promiscuous mode [ 1382.227903] bridge0: port 3(team0) entered disabled state [ 1382.242246] bond0: team0 is up - this may be due to an out of date ifenslave [ 1382.271138] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1382.289148] bridge0: port 3(team0) entered blocking state [ 1382.326467] bridge0: port 3(team0) entered disabled state [ 1382.372250] device team0 entered promiscuous mode [ 1382.393046] device team_slave_0 entered promiscuous mode [ 1382.413270] device team_slave_1 entered promiscuous mode [ 1382.436825] bridge0: port 3(team0) entered blocking state [ 1382.442491] bridge0: port 3(team0) entered forwarding state [ 1382.472037] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1382.502335] device team0 left promiscuous mode 20:55:08 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d", 0x20, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:08 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000006c10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:08 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cb", 0x3c, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1382.526604] device team_slave_0 left promiscuous mode [ 1382.543720] bridge0: port 3(team0) entered disabled state [ 1382.575168] bond0: team0 is up - this may be due to an out of date ifenslave [ 1382.589632] bridge0: port 3(team0) entered blocking state [ 1382.609571] bridge0: port 3(team0) entered disabled state [ 1382.631269] NILFS (loop3): couldn't find nilfs on the device [ 1382.636936] device team0 entered promiscuous mode [ 1382.642572] device team_slave_0 entered promiscuous mode [ 1382.661878] bridge0: port 3(team0) entered blocking state [ 1382.667607] bridge0: port 3(team0) entered forwarding state 20:55:08 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1382.690513] bond0: team0 is up - this may be due to an out of date ifenslave [ 1382.715213] mkiss: ax0: crc mode is auto. [ 1382.717990] device team0 left promiscuous mode [ 1382.737346] device team_slave_0 left promiscuous mode 20:55:08 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:08 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000007410000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1382.784970] bridge0: port 3(team0) entered disabled state [ 1382.863592] NILFS (loop3): couldn't find nilfs on the device 20:55:09 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:09 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000007a10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1382.982530] 8021q: adding VLAN 0 to HW filter on device team0 [ 1383.047420] device team0 entered promiscuous mode [ 1383.055350] device team_slave_0 entered promiscuous mode [ 1383.076183] NILFS (loop3): couldn't find nilfs on the device [ 1383.093336] bond0: Enslaving team0 as an active interface with an up link [ 1383.107314] bond0: Releasing backup interface team0 [ 1383.118077] device team0 left promiscuous mode [ 1383.123450] device team_slave_0 left promiscuous mode 20:55:09 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000ff8010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1383.265904] NILFS (loop3): couldn't find nilfs on the device 20:55:09 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000fff10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1383.404242] NILFS (loop3): couldn't find nilfs on the device [ 1383.646417] bridge0: port 3(team0) entered blocking state [ 1383.660982] bridge0: port 3(team0) entered disabled state [ 1383.672116] device team0 entered promiscuous mode [ 1383.685849] device team_slave_0 entered promiscuous mode [ 1383.700495] device team0 left promiscuous mode [ 1383.705614] device team_slave_0 left promiscuous mode [ 1383.718785] device team_slave_1 left promiscuous mode [ 1383.740910] bridge0: port 3(team0) entered disabled state [ 1383.761165] bond0: team0 is up - this may be due to an out of date ifenslave [ 1383.770269] bridge0: port 3(team0) entered blocking state [ 1383.776582] bridge0: port 3(team0) entered disabled state [ 1383.783084] device team0 entered promiscuous mode [ 1383.834099] device team_slave_0 entered promiscuous mode [ 1383.865677] device team_slave_1 entered promiscuous mode [ 1383.876464] bridge0: port 3(team0) entered blocking state [ 1383.882086] bridge0: port 3(team0) entered forwarding state [ 1383.892460] bond0: team0 is up - this may be due to an out of date ifenslave [ 1383.914770] device team0 left promiscuous mode [ 1383.919400] device team_slave_0 left promiscuous mode [ 1383.938068] bridge0: port 3(team0) entered disabled state [ 1383.968301] bond0: team0 is up - this may be due to an out of date ifenslave [ 1383.981326] bridge0: port 3(team0) entered blocking state [ 1384.017466] bridge0: port 3(team0) entered disabled state [ 1384.094487] device team0 entered promiscuous mode [ 1384.116639] device team_slave_0 entered promiscuous mode [ 1384.136631] bridge0: port 3(team0) entered blocking state [ 1384.142287] bridge0: port 3(team0) entered forwarding state 20:55:10 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$TCSETA(r1, 0x5406, &(0x7f0000000000)={0x0, 0x7f, 0x2, 0x20, 0x19, "ae4e7f8d4d864661"}) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r2, 0x804c4700, 0x0) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7fff) 20:55:10 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cb", 0x3c, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:10 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000080ff10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:10 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000e10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:55:10 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d", 0x20, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:10 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1384.266289] NILFS (loop3): couldn't find nilfs on the device [ 1384.295455] device team0 left promiscuous mode [ 1384.306491] device team_slave_0 left promiscuous mode [ 1384.353244] NILFS (loop3): couldn't find nilfs on the device [ 1384.394495] bridge0: port 3(team0) entered disabled state 20:55:10 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000000070000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1384.641809] 8021q: adding VLAN 0 to HW filter on device team0 [ 1384.655535] NILFS (loop3): couldn't find nilfs on the device 20:55:10 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000000080000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1384.786256] device team0 entered promiscuous mode [ 1384.811845] device team_slave_0 entered promiscuous mode [ 1384.890695] bond0: Enslaving team0 as an active interface with an up link [ 1384.910194] NILFS (loop3): couldn't find nilfs on the device [ 1384.977710] validate_nla: 10 callbacks suppressed [ 1384.977719] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 20:55:11 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000000000b0000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1385.079765] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:11 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00655810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1385.137587] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1385.149230] device team0 left promiscuous mode [ 1385.164847] NILFS (loop3): couldn't find nilfs on the device [ 1385.188124] device team_slave_0 left promiscuous mode [ 1385.211036] device team_slave_1 left promiscuous mode [ 1385.217921] bridge0: port 3(team0) entered disabled state [ 1385.238451] bond0: team0 is up - this may be due to an out of date ifenslave [ 1385.249820] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 20:55:11 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000fff0000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1385.266908] bond0: Releasing backup interface team0 [ 1385.289506] device team0 left promiscuous mode [ 1385.298968] device team_slave_0 left promiscuous mode [ 1385.368028] NILFS (loop3): couldn't find nilfs on the device 20:55:11 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000003ffff0000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:11 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000000)) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1385.570687] NILFS (loop3): couldn't find nilfs on the device [ 1385.789871] bridge0: port 3(team0) entered blocking state [ 1385.795957] bridge0: port 3(team0) entered disabled state [ 1385.809990] device team0 entered promiscuous mode [ 1385.823346] device team_slave_0 entered promiscuous mode 20:55:11 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cb", 0x3c, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:11 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000700000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1385.852256] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1385.864942] bridge0: port 3(team0) entered blocking state [ 1385.887150] bridge0: port 3(team0) entered disabled state [ 1385.939270] device team0 entered promiscuous mode [ 1385.965980] NILFS (loop3): couldn't find nilfs on the device [ 1385.966670] device team_slave_0 entered promiscuous mode [ 1385.993493] device team_slave_1 entered promiscuous mode [ 1386.019176] NILFS (loop3): couldn't find nilfs on the device [ 1386.020686] bridge0: port 3(team0) entered blocking state [ 1386.030708] bridge0: port 3(team0) entered forwarding state 20:55:12 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000800000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1386.115847] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1386.145317] device team0 left promiscuous mode 20:55:12 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d", 0x20, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1386.186075] device team_slave_0 left promiscuous mode [ 1386.222753] NILFS (loop3): couldn't find nilfs on the device [ 1386.231383] bridge0: port 3(team0) entered disabled state [ 1386.269658] bond0: team0 is up - this may be due to an out of date ifenslave [ 1386.310754] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1386.327929] bridge0: port 3(team0) entered blocking state [ 1386.337420] bridge0: port 3(team0) entered disabled state [ 1386.355065] device team0 entered promiscuous mode [ 1386.365384] device team_slave_0 entered promiscuous mode [ 1386.373060] bridge0: port 3(team0) entered blocking state [ 1386.378772] bridge0: port 3(team0) entered forwarding state [ 1386.392404] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1386.410508] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:12 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:12 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000b00000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:12 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00006010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1386.445833] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1386.485027] device team0 left promiscuous mode [ 1386.509513] device team_slave_0 left promiscuous mode [ 1386.534873] NILFS (loop3): couldn't find nilfs on the device [ 1386.537479] bridge0: port 3(team0) entered disabled state 20:55:12 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000001000000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1386.594527] NILFS (loop3): couldn't find nilfs on the device 20:55:12 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000003000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1386.755843] 8021q: adding VLAN 0 to HW filter on device team0 [ 1386.767881] device team0 entered promiscuous mode [ 1386.820050] NILFS (loop3): couldn't find nilfs on the device 20:55:12 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2000, 0x10) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) r2 = syz_open_pts(r1, 0x600) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000140)=0x7) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/am_droprate\x00', 0x2, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000100)={0x5, 0x7, 0xaa3, 0x6, 0x15, "1d80e09b8cf43062"}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x19) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$TCFLSH(r1, 0x804c4700, 0x0) 20:55:13 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000005000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1386.871092] device team_slave_0 entered promiscuous mode [ 1386.917560] bond0: Enslaving team0 as an active interface with an up link [ 1386.944667] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1386.999546] bond0: Releasing backup interface team0 [ 1387.052698] NILFS (loop3): couldn't find nilfs on the device [ 1387.060330] device team0 left promiscuous mode [ 1387.090478] device team_slave_0 left promiscuous mode 20:55:13 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000006000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1387.243989] NILFS (loop3): couldn't find nilfs on the device [ 1387.427011] bridge0: port 3(team0) entered blocking state [ 1387.438478] bridge0: port 3(team0) entered disabled state [ 1387.451429] device team0 entered promiscuous mode [ 1387.462823] device team_slave_0 entered promiscuous mode [ 1387.474600] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1387.491274] device team0 left promiscuous mode [ 1387.518160] device team_slave_0 left promiscuous mode 20:55:13 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e", 0x3e, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:13 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x78b, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0xa87, 0x8, 0x200, 0x40, 0x11, "f5eab417f349c0cb1c00e16ad7161c82f7e53d"}) ioctl$TCFLSH(r1, 0x804c4700, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000012c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000002c0)={r2}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000040)={{r2, 0xb, 0x3, 0x101, 0x1f, 0x7, 0x9, 0x2d9f, 0x6, 0x2, 0xfffffff9, 0x400, 0x5, 0x5, 0x8001}, 0x8, [0x0]}) 20:55:13 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000007000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1387.552606] device team_slave_1 left promiscuous mode [ 1387.572436] bridge0: port 3(team0) entered disabled state [ 1387.588378] bond0: team0 is up - this may be due to an out of date ifenslave [ 1387.624614] bridge0: port 3(team0) entered blocking state [ 1387.631688] bridge0: port 3(team0) entered disabled state [ 1387.640212] NILFS (loop3): couldn't find nilfs on the device [ 1387.649904] device team0 entered promiscuous mode [ 1387.656036] device team_slave_0 entered promiscuous mode [ 1387.662755] device team_slave_1 entered promiscuous mode [ 1387.671055] bridge0: port 3(team0) entered blocking state [ 1387.676710] bridge0: port 3(team0) entered forwarding state [ 1387.685274] bond0: team0 is up - this may be due to an out of date ifenslave [ 1387.694798] device team0 left promiscuous mode [ 1387.701646] device team_slave_0 left promiscuous mode 20:55:13 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129", 0x30, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1387.728574] bridge0: port 3(team0) entered disabled state [ 1387.782769] bond0: team0 is up - this may be due to an out of date ifenslave [ 1387.805492] bridge0: port 3(team0) entered blocking state [ 1387.812814] bridge0: port 3(team0) entered disabled state [ 1387.820825] device team0 entered promiscuous mode [ 1387.827826] device team_slave_0 entered promiscuous mode [ 1387.834912] bridge0: port 3(team0) entered blocking state [ 1387.840631] bridge0: port 3(team0) entered forwarding state [ 1387.850580] device team0 left promiscuous mode [ 1387.858268] device team_slave_0 left promiscuous mode 20:55:14 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:14 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000000)={0x43f0, 0x9, 0x0, 0x5, 0xf, "4db2d6a67ace5a92ba71bc09f93d19f40c7f88"}) write$binfmt_aout(r0, &(0x7f0000000b00)={{0x108, 0x5, 0xf7, 0x1a8, 0x14d, 0x8, 0x3c7, 0x98}, "162723be7e33fc886942501c5955c8a3c3668237988f73494495bf2f1cf805d40a5611a41925ecc3d2552a344ef1653589fad3864ec232ae50825f2492c5710c4156825657456a5fb9a3a451df41e7fe63028202d5a513", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x877) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r2, 0x804c4700, 0x0) 20:55:14 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00586510008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:55:14 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000009000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1387.888337] bridge0: port 3(team0) entered disabled state [ 1387.998005] NILFS (loop3): couldn't find nilfs on the device [ 1388.048817] 8021q: adding VLAN 0 to HW filter on device team0 20:55:14 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1388.090082] NILFS (loop3): couldn't find nilfs on the device [ 1388.095182] device team0 entered promiscuous mode [ 1388.101578] device team_slave_0 entered promiscuous mode 20:55:14 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000a000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1388.156716] bond0: Enslaving team0 as an active interface with an up link [ 1388.174190] bond0: Releasing backup interface team0 [ 1388.186921] device team0 left promiscuous mode [ 1388.201186] device team_slave_0 left promiscuous mode [ 1388.229172] NILFS (loop3): couldn't find nilfs on the device [ 1388.304080] NILFS (loop3): couldn't find nilfs on the device 20:55:14 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000b000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1388.445291] bridge0: port 3(team0) entered blocking state [ 1388.460451] bridge0: port 3(team0) entered disabled state [ 1388.483962] device team0 entered promiscuous mode [ 1388.492537] NILFS (loop3): couldn't find nilfs on the device [ 1388.513454] device team_slave_0 entered promiscuous mode [ 1388.533487] NILFS (loop3): couldn't find nilfs on the device [ 1388.541222] device team0 left promiscuous mode 20:55:14 executing program 4: ioctl$KVM_TPR_ACCESS_REPORTING(0xffffffffffffffff, 0xc028ae92, &(0x7f0000000140)={0x3, 0x401}) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe6000/0x18000)=nil, &(0x7f00000001c0)=[@textreal={0x8, &(0x7f0000000180)="f30f2b840b00b80c008ed0660f38813e9c032e0f01d10f01c20f0133660f38cfab0000baf80c66b848e4298366efbafc0ced0fc7286564f30fc732", 0x3b}], 0x1, 0x20, &(0x7f0000000200), 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000080)={&(0x7f0000000040)=[0x1ff, 0x1ff, 0x7, 0x400, 0x800, 0x8001], 0x6, 0x0, 0x0, 0xffffffffffffffff}) ioctl$TIOCMBIS(r1, 0x5416, &(0x7f0000000100)=0x1) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r2 = syz_open_pts(r0, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) ftruncate(r3, 0xffffffffffff8000) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) ioctl$KVM_SET_CPUID(r4, 0x4008ae8a, &(0x7f0000000200)={0x4, 0x0, [{0x40000000, 0x400, 0x4, 0x10000, 0x9}, {0xc0000001, 0x6, 0x2, 0x3f, 0x6}, {0xb, 0x80000001, 0x79c6, 0x40, 0xfffffff9}, {0x80000000, 0x0, 0x4, 0x9}]}) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000ac0)=0x15) [ 1388.557778] device team_slave_0 left promiscuous mode 20:55:14 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e", 0x3e, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1388.583529] device team_slave_1 left promiscuous mode [ 1388.598352] bridge0: port 3(team0) entered disabled state 20:55:14 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000c000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1388.630960] bond0: team0 is up - this may be due to an out of date ifenslave [ 1388.648483] bridge0: port 3(team0) entered blocking state [ 1388.668115] bridge0: port 3(team0) entered disabled state [ 1388.694638] device team0 entered promiscuous mode [ 1388.713820] device team_slave_0 entered promiscuous mode [ 1388.732296] NILFS (loop3): couldn't find nilfs on the device [ 1388.740181] device team_slave_1 entered promiscuous mode [ 1388.755924] bridge0: port 3(team0) entered blocking state [ 1388.761683] bridge0: port 3(team0) entered forwarding state [ 1388.839201] NILFS (loop3): couldn't find nilfs on the device 20:55:15 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00008110008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1388.906063] bond0: team0 is up - this may be due to an out of date ifenslave [ 1388.933784] device team0 left promiscuous mode [ 1388.955315] device team_slave_0 left promiscuous mode 20:55:15 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129", 0x30, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:15 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000d000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1389.023552] bridge0: port 3(team0) entered disabled state [ 1389.114396] bond0: team0 is up - this may be due to an out of date ifenslave [ 1389.157402] NILFS (loop3): couldn't find nilfs on the device [ 1389.186312] bridge0: port 3(team0) entered blocking state [ 1389.192024] bridge0: port 3(team0) entered disabled state [ 1389.240248] device team0 entered promiscuous mode 20:55:15 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000e000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1389.293561] device team_slave_0 entered promiscuous mode [ 1389.345281] bridge0: port 3(team0) entered blocking state [ 1389.350987] bridge0: port 3(team0) entered forwarding state [ 1389.379033] device team0 left promiscuous mode [ 1389.388156] device team_slave_0 left promiscuous mode 20:55:15 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1389.389505] NILFS (loop3): couldn't find nilfs on the device [ 1389.436891] bridge0: port 3(team0) entered disabled state [ 1389.469528] NILFS (loop3): couldn't find nilfs on the device [ 1389.502447] 8021q: adding VLAN 0 to HW filter on device team0 20:55:15 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000f000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1389.556475] device team0 entered promiscuous mode [ 1389.595664] device team_slave_0 entered promiscuous mode [ 1389.630464] bond0: Enslaving team0 as an active interface with an up link [ 1389.666124] bond0: Releasing backup interface team0 [ 1389.681048] device team0 left promiscuous mode [ 1389.687347] device team_slave_0 left promiscuous mode [ 1389.696464] NILFS (loop3): couldn't find nilfs on the device 20:55:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000000)={0x80, 0x8, 0x9, 0xc00d, 0xb, "5a7d3a73ef02e99225b5f9fbba86b2a351de41"}) ioctl$TCFLSH(r1, 0x804c4700, 0x0) ioctl$TCSETSF2(r1, 0x402c542d, &(0x7f0000000040)={0xe86, 0x1000, 0x0, 0x2, 0x7e, "61e369d2cc3f6dc9edccb0a9a5f97a7379e318", 0x4, 0x4}) 20:55:16 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000210000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1389.918277] NILFS (loop3): couldn't find nilfs on the device [ 1390.016414] NILFS (loop3): couldn't find nilfs on the device 20:55:16 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000310000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1390.098186] bridge0: port 3(team0) entered blocking state [ 1390.115570] bridge0: port 3(team0) entered disabled state [ 1390.139739] device team0 entered promiscuous mode 20:55:16 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000410000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1390.160408] device team_slave_0 entered promiscuous mode [ 1390.184223] validate_nla: 13 callbacks suppressed [ 1390.184232] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 20:55:16 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e", 0x3e, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1390.216719] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e0000000f008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1390.260650] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1390.283967] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1390.301451] NILFS (loop3): couldn't find nilfs on the device [ 1390.304561] device team0 left promiscuous mode 20:55:16 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129", 0x30, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1390.351622] device team_slave_0 left promiscuous mode [ 1390.362678] bridge0: port 3(team0) entered disabled state [ 1390.384206] NILFS (loop3): couldn't find nilfs on the device [ 1390.395281] bond0: team0 is up - this may be due to an out of date ifenslave [ 1390.428143] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1390.454335] bridge0: port 3(team0) entered blocking state 20:55:16 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000510000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1390.474271] bridge0: port 3(team0) entered disabled state [ 1390.513083] device team0 entered promiscuous mode [ 1390.533251] device team_slave_0 entered promiscuous mode [ 1390.546510] NILFS (loop3): couldn't find nilfs on the device [ 1390.557497] bridge0: port 3(team0) entered blocking state [ 1390.563205] bridge0: port 3(team0) entered forwarding state [ 1390.583139] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1390.624961] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:16 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:16 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000210008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:55:16 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000610000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1390.667091] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1390.693368] device team0 left promiscuous mode [ 1390.736286] device team_slave_0 left promiscuous mode 20:55:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x4, 0x1, 0x3, 0x0, 0x0, {0x0, 0x0, 0xa}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x4004001) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) r3 = syz_open_pts(r2, 0x28f42) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r3, 0x804c4700, 0x0) ioctl$TIOCMSET(r3, 0x5418, &(0x7f0000000080)=0x7f) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f0000000040)={&(0x7f0000000000)=[0x3ff, 0x2, 0xfffffffe, 0x1, 0x800], 0x5, 0x80800, 0x0, 0xffffffffffffffff}) r5 = signalfd4(r3, &(0x7f0000000100)={[0x4]}, 0x8, 0x0) ioctl$PPPIOCGUNIT(r5, 0x80047456, &(0x7f0000000140)) read(r3, &(0x7f0000000b00)=""/4096, 0x1000) ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) [ 1390.765283] bridge0: port 3(team0) entered disabled state [ 1390.821121] NILFS (loop3): couldn't find nilfs on the device [ 1390.972768] NILFS (loop3): couldn't find nilfs on the device 20:55:17 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$DRM_IOCTL_GET_CLIENT(0xffffffffffffffff, 0xc0286405, &(0x7f0000000000)={0x1, 0xfffff33c, {0xffffffffffffffff}, {}, 0x2, 0x80000001}) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}}, r1, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) perf_event_open(&(0x7f0000000700)={0x4, 0x80, 0x66, 0x2, 0x2, 0x7, 0x0, 0xb998, 0x2211c, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_config_ext={0x7, 0x101}, 0x40, 0xb95c, 0x5, 0x2, 0x1ff, 0x4, 0x8c, 0x0, 0x1ff, 0x0, 0x8}, 0x0, 0x4, r2, 0x2) ioctl$TIOCGICOUNT(r0, 0x545d, 0x0) exit_group(0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000400000084) bind$inet6(r3, &(0x7f0000ed3fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) shutdown(0xffffffffffffffff, 0x0) sendto$inet6(r3, &(0x7f0000000380)="bc", 0x1, 0x0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r4, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r5 = syz_open_pts(r4, 0x0) r6 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x280200, 0x0) recvmsg$kcm(r6, &(0x7f0000000080)={&(0x7f00000001c0)=@caif=@rfm, 0x80, &(0x7f0000000680)=[{&(0x7f0000000280)=""/144, 0x90}, {&(0x7f00000003c0)=""/150, 0x96}, {&(0x7f0000000480)=""/200, 0xc8}, {&(0x7f0000000580)=""/123, 0x7b}, {&(0x7f0000000600)=""/116, 0x74}], 0x5}, 0x10000) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r5, 0x804c4700, 0x0) [ 1391.059179] 8021q: adding VLAN 0 to HW filter on device team0 20:55:17 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000710000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1391.110292] device team0 entered promiscuous mode [ 1391.123984] device team_slave_0 entered promiscuous mode [ 1391.130363] bond0: Enslaving team0 as an active interface with an up link [ 1391.139222] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1391.156437] bond0: Releasing backup interface team0 [ 1391.164274] device team0 left promiscuous mode [ 1391.169050] device team_slave_0 left promiscuous mode [ 1391.243270] NILFS (loop3): couldn't find nilfs on the device [ 1391.299863] NILFS (loop3): couldn't find nilfs on the device 20:55:17 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000810000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1391.411108] NILFS (loop3): couldn't find nilfs on the device [ 1391.490548] NILFS (loop3): couldn't find nilfs on the device 20:55:17 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000910000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1391.536178] bridge0: port 3(team0) entered blocking state [ 1391.542321] bridge0: port 3(team0) entered disabled state [ 1391.550071] device team0 entered promiscuous mode [ 1391.554971] device team_slave_0 entered promiscuous mode [ 1391.567714] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 20:55:17 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1391.588644] device team0 left promiscuous mode [ 1391.593260] device team_slave_0 left promiscuous mode [ 1391.606268] NILFS (loop3): couldn't find nilfs on the device [ 1391.623887] device team_slave_1 left promiscuous mode [ 1391.631376] bridge0: port 3(team0) entered disabled state 20:55:17 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000c10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1391.641421] bond0: team0 is up - this may be due to an out of date ifenslave [ 1391.685092] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1391.696648] bridge0: port 3(team0) entered blocking state [ 1391.719709] bridge0: port 3(team0) entered disabled state [ 1391.736175] device team0 entered promiscuous mode [ 1391.752175] device team_slave_0 entered promiscuous mode [ 1391.763519] device team_slave_1 entered promiscuous mode [ 1391.770977] bridge0: port 3(team0) entered blocking state [ 1391.776700] bridge0: port 3(team0) entered forwarding state [ 1391.784726] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1391.805575] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:18 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c744241", 0x38, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:18 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000001210000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1391.833786] device team0 left promiscuous mode [ 1391.844790] device team_slave_0 left promiscuous mode [ 1391.883015] bridge0: port 3(team0) entered disabled state [ 1391.904906] bond0: team0 is up - this may be due to an out of date ifenslave [ 1391.919604] NILFS (loop3): couldn't find nilfs on the device [ 1391.989686] bridge0: port 3(team0) entered blocking state [ 1391.996966] bridge0: port 3(team0) entered disabled state [ 1392.041028] device team0 entered promiscuous mode [ 1392.070604] device team_slave_0 entered promiscuous mode [ 1392.119677] bridge0: port 3(team0) entered blocking state [ 1392.125381] bridge0: port 3(team0) entered forwarding state [ 1392.188868] device team0 left promiscuous mode [ 1392.211354] device team_slave_0 left promiscuous mode 20:55:18 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:18 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000410008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:55:18 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000002310000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:18 executing program 4: sendmmsg(0xffffffffffffffff, &(0x7f00000001c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="3bdbf0828a55a8da92e98d1752c6c77747934c6baacabe4a7b8f13156a53e4c4b078f3f89943936855c6c0f2fa931ac42644990e566a487db7138470a989a33b159c3ea10645e5e2d7fc95d46a648fff7c674d30011b14748c7b27dad3a8dd09c9687dd1e4989340dc98894667d8025b12f3be709f4af5288c46f80e10e7591399a1149865c0e6e42761fbb110a9f1580a3a349fb94ebaa127fb334f99adf8f05468104f50687316e43d", 0xaa}, {&(0x7f0000000100)="11ad1791da37225de452d860cf2457f9945613e8d48318aecf822f913e981cb70f22cbab4f387edf8a3b0aaa0248ef18a6111670ed2900f9246abd1c41edd6daf3143463586c895e0634207012eeb0a190cc59", 0x53}, {&(0x7f0000000280)="60366a39b7e35089e6188b5aa6391ef7c234bb514a0e7e71eeed4683654f5228cbda8d91895cff9865073bca22e41e9efbe395e25ea082cd151d75909cc2e31f6700a3065b0da52776a31a373b041c73855dac44e96d68ab9b8cf2f8a8e0092bb2a47f5e005589f13f1e656b2cc7a7d19da15d7814104fb8654cf0546489e27ed4cdbefb6627f114ebf847e8cdcf31cbef31ebd3266a43264b899872", 0x9c}], 0x3, &(0x7f0000000340)=[{0xc0, 0x101, 0x35, "ee8035f18f1e7071691d3bf9a498c2d26a7fd7e1fd4ec13476eb610953839e62cdc63b72f73fa96474d132330365f17f66d6283ad06bdffd03a99603181ffa438310d2ff9b9743d2819eb0540ad52916e5c8a4a4eea60275c55074772bef090e83722e58d1578ff1220cdd3738d46dc48e8c5bedbb030be05eb3df6f9eab557e0e7df64ab4eebe2379b0120b81ba2456999158237b2aa0d2a1325984a6afb495d52509e508f6a4f08304674565"}], 0xc0}}], 0x1, 0x44000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x12) ioctl$TCFLSH(r1, 0x804c4700, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) ioctl$TIOCSTI(r2, 0x5412, &(0x7f0000000200)=0x2) [ 1392.251955] bridge0: port 3(team0) entered disabled state 20:55:18 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1392.375276] NILFS (loop3): couldn't find nilfs on the device 20:55:18 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000004810000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:18 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000000)={0x5f50, 0x1000, 0x5, 0x6, 0x2, "3de769fa7953e70492823997f5c396592166ca"}) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1392.482894] 8021q: adding VLAN 0 to HW filter on device team0 [ 1392.503277] device team0 entered promiscuous mode [ 1392.508474] device team_slave_0 entered promiscuous mode [ 1392.516641] bond0: Enslaving team0 as an active interface with an up link [ 1392.573811] bond0: Releasing backup interface team0 [ 1392.579943] device team0 left promiscuous mode [ 1392.591463] NILFS (loop3): couldn't find nilfs on the device 20:55:18 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000004c10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1392.619236] device team_slave_0 left promiscuous mode [ 1392.721177] NILFS (loop3): couldn't find nilfs on the device [ 1393.056835] bridge0: port 3(team0) entered blocking state [ 1393.073389] bridge0: port 3(team0) entered disabled state [ 1393.084762] device team0 entered promiscuous mode [ 1393.095942] device team_slave_0 entered promiscuous mode 20:55:19 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:19 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000006010000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1393.104867] device team0 left promiscuous mode [ 1393.110930] device team_slave_0 left promiscuous mode [ 1393.124970] device team_slave_1 left promiscuous mode [ 1393.139203] bridge0: port 3(team0) entered disabled state [ 1393.178850] bond0: team0 is up - this may be due to an out of date ifenslave [ 1393.183154] NILFS (loop3): couldn't find nilfs on the device [ 1393.221096] bridge0: port 3(team0) entered blocking state [ 1393.227004] bridge0: port 3(team0) entered disabled state [ 1393.307858] device team0 entered promiscuous mode [ 1393.374126] device team_slave_0 entered promiscuous mode [ 1393.416813] device team_slave_1 entered promiscuous mode [ 1393.467466] bridge0: port 3(team0) entered blocking state [ 1393.473193] bridge0: port 3(team0) entered forwarding state [ 1393.495855] bond0: team0 is up - this may be due to an out of date ifenslave [ 1393.508113] device team0 left promiscuous mode 20:55:19 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c744241", 0x38, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:19 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000006810000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:19 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x140, 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r2 = syz_open_pts(r1, 0x0) r3 = syz_open_pts(r1, 0x400000) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r2, 0x804c4700, 0x0) 20:55:19 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000610008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1393.512943] device team_slave_0 left promiscuous mode [ 1393.556245] bridge0: port 3(team0) entered disabled state [ 1393.581363] NILFS (loop3): couldn't find nilfs on the device [ 1393.594494] bond0: team0 is up - this may be due to an out of date ifenslave [ 1393.612323] bridge0: port 3(team0) entered blocking state [ 1393.628367] bridge0: port 3(team0) entered disabled state 20:55:19 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000fe7000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000000)="b8a7000f00d80f01ca66b9e00b000066b8e451000066ba000000000f3066b82f4d8af50f23d80f21f86635800000f00f23f8b817008ed00fc71f0f20c06635000004000f22c062ba0000d1b28600b826010f00d0", 0x54}], 0x1, 0x2c, &(0x7f0000000100)=[@cr0={0x0, 0x10000}, @cstype0={0x4, 0xf}], 0x2) ioctl$KVM_PPC_GET_PVINFO(0xffffffffffffffff, 0x4080aea1, &(0x7f0000000140)=""/209) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x10000, 0x1, 0x3000, 0x1000, &(0x7f0000ff9000/0x1000)=nil}) r2 = dup(r0) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000280)={0x0, 0xfffffffe, 0x5, 0x44, 0x8, "f4bca9224bca1fca447deda954795331cc017d"}) r3 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) ioctl$TCFLSH(r3, 0x804c4700, 0x0) [ 1393.670475] NILFS (loop3): couldn't find nilfs on the device [ 1393.704770] device team0 entered promiscuous mode 20:55:19 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000006c10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1393.716731] device team_slave_0 entered promiscuous mode [ 1393.723711] bridge0: port 3(team0) entered blocking state [ 1393.729439] bridge0: port 3(team0) entered forwarding state [ 1393.739310] device team0 left promiscuous mode [ 1393.744395] device team_slave_0 left promiscuous mode 20:55:20 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1393.808155] bridge0: port 3(team0) entered disabled state [ 1393.849307] NILFS (loop3): couldn't find nilfs on the device [ 1393.942082] NILFS (loop3): couldn't find nilfs on the device [ 1393.987481] 8021q: adding VLAN 0 to HW filter on device team0 20:55:20 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000007410000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1394.111989] device team0 entered promiscuous mode [ 1394.128767] device team_slave_0 entered promiscuous mode [ 1394.151585] NILFS (loop3): couldn't find nilfs on the device [ 1394.154557] bond0: Enslaving team0 as an active interface with an up link [ 1394.172566] bond0: Releasing backup interface team0 [ 1394.185158] device team0 left promiscuous mode [ 1394.195863] NILFS (loop3): couldn't find nilfs on the device [ 1394.207248] device team_slave_0 left promiscuous mode 20:55:20 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000007a10000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:20 executing program 4: setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(0xffffffffffffffff, 0x84, 0x6e, &(0x7f0000000100)=[@in={0x2, 0x4e20, @rand_addr=0x64010100}, @in={0x2, 0x4e22, @private=0xa010101}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e20, 0x2, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x80}, @in6={0xa, 0x4e24, 0x9, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x1000}, @in6={0xa, 0x4e21, 0x3, @dev={0xfe, 0x80, '\x00', 0x2d}, 0x7}, @in6={0xa, 0x4e22, 0x3, @loopback, 0x8}, @in6={0xa, 0x4e22, 0x91, @dev={0xfe, 0x80, '\x00', 0x3b}, 0x40}, @in6={0xa, 0x4e22, 0x1ff, @dev={0xfe, 0x80, '\x00', 0x32}}], 0xd8) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x600040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000200), 0x200a00, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000280)={0x2, 0x5, 0x10001, 0x1f, 0xa, "32b0e4a32353437f86810b4607480fdfa21016"}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) write$vga_arbiter(r3, &(0x7f00000002c0)=@other={'trylock', ' ', 'io'}, 0xb) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000000)={'nat\x00', 0x0, [0x4c, 0xfffffe00, 0x4, 0x1ff, 0xffff0000]}, &(0x7f0000000080)=0x54) r4 = syz_open_pts(r0, 0x50400) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r4, 0x804c4700, 0x0) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r5) ioctl$SOUND_MIXER_READ_CAPS(r5, 0x80044dfc, &(0x7f0000000300)) dup3(r3, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(0xffffffffffffffff, 0x8010661b, &(0x7f0000000340)) [ 1394.324306] NILFS (loop3): couldn't find nilfs on the device [ 1394.551681] bridge0: port 3(team0) entered blocking state [ 1394.568297] bridge0: port 3(team0) entered disabled state [ 1394.588683] device team0 entered promiscuous mode 20:55:20 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:20 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000011000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1394.607925] device team_slave_0 entered promiscuous mode [ 1394.621068] bond0: team0 is up - this may be due to an out of date ifenslave [ 1394.640459] device team0 left promiscuous mode [ 1394.645759] device team_slave_0 left promiscuous mode [ 1394.651134] device team_slave_1 left promiscuous mode [ 1394.686438] bridge0: port 3(team0) entered disabled state [ 1394.705669] NILFS (loop3): couldn't find nilfs on the device [ 1394.730471] bond0: team0 is up - this may be due to an out of date ifenslave [ 1394.774978] bridge0: port 3(team0) entered blocking state [ 1394.780769] bridge0: port 3(team0) entered disabled state [ 1394.820126] device team0 entered promiscuous mode [ 1394.842230] device team_slave_0 entered promiscuous mode [ 1394.859305] device team_slave_1 entered promiscuous mode [ 1394.879567] bridge0: port 3(team0) entered blocking state [ 1394.885278] bridge0: port 3(team0) entered forwarding state [ 1394.907383] device team0 left promiscuous mode [ 1394.917989] device team_slave_0 left promiscuous mode [ 1394.945840] bridge0: port 3(team0) entered disabled state 20:55:21 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c744241", 0x38, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:21 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000000)={0xaf, 0xfffffff7, 0x6, 0x101, 0x13, "20a8d57089ff953d3b2a7780d3673064e7cc95"}) ioctl$TCXONC(r0, 0x540a, 0x0) 20:55:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000710008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:55:21 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:21 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000012000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1394.978835] bond0: team0 is up - this may be due to an out of date ifenslave [ 1395.045058] bridge0: port 3(team0) entered blocking state [ 1395.061802] bridge0: port 3(team0) entered disabled state [ 1395.080940] NILFS (loop3): couldn't find nilfs on the device [ 1395.158968] device team0 entered promiscuous mode 20:55:21 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000014000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1395.258766] device team_slave_0 entered promiscuous mode [ 1395.288591] bridge0: port 3(team0) entered blocking state [ 1395.294322] bridge0: port 3(team0) entered forwarding state [ 1395.320899] NILFS (loop3): couldn't find nilfs on the device [ 1395.369433] validate_nla: 16 callbacks suppressed [ 1395.369443] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 20:55:21 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:21 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000020000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1395.430450] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:21 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1395.475935] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1395.497106] device team0 left promiscuous mode [ 1395.528178] device team_slave_0 left promiscuous mode [ 1395.537133] NILFS (loop3): couldn't find nilfs on the device [ 1395.566035] bridge0: port 3(team0) entered disabled state 20:55:21 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000002f000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1395.718529] 8021q: adding VLAN 0 to HW filter on device team0 [ 1395.784070] device team0 entered promiscuous mode [ 1395.795373] device team_slave_0 entered promiscuous mode [ 1395.810858] NILFS (loop3): couldn't find nilfs on the device [ 1395.825594] bond0: Enslaving team0 as an active interface with an up link 20:55:22 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) open(&(0x7f0000000000)='./file0\x00', 0x4000, 0x50) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1395.886858] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1395.888580] NILFS (loop3): couldn't find nilfs on the device [ 1395.908816] syz-executor.5 (23457) used greatest stack depth: 22224 bytes left [ 1395.918679] device team0 left promiscuous mode [ 1395.924745] device team_slave_0 left promiscuous mode [ 1395.931166] device team_slave_1 left promiscuous mode 20:55:22 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000003f000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1395.936952] bridge0: port 3(team0) entered disabled state [ 1395.975151] bond0: team0 is up - this may be due to an out of date ifenslave [ 1396.015051] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1396.034807] bond0: Releasing backup interface team0 [ 1396.061880] NILFS (loop3): couldn't find nilfs on the device [ 1396.073994] device team0 left promiscuous mode [ 1396.087464] device team_slave_0 left promiscuous mode [ 1396.508413] bridge0: port 3(team0) entered blocking state [ 1396.554958] bridge0: port 3(team0) entered disabled state [ 1396.570150] device team0 entered promiscuous mode [ 1396.575472] device team_slave_0 entered promiscuous mode [ 1396.600665] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1396.672109] bridge0: port 3(team0) entered blocking state [ 1396.684708] bridge0: port 3(team0) entered disabled state [ 1396.707221] device team0 entered promiscuous mode [ 1396.715583] device team_slave_0 entered promiscuous mode [ 1396.723974] device team_slave_1 entered promiscuous mode [ 1396.731905] bridge0: port 3(team0) entered blocking state [ 1396.737552] bridge0: port 3(team0) entered forwarding state [ 1396.748280] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1396.770084] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:22 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cb", 0x3c, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:22 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000063000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:22 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1396.796574] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1396.822169] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000a10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1396.858657] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1396.879353] device team0 left promiscuous mode [ 1396.923138] device team_slave_0 left promiscuous mode [ 1396.943424] NILFS (loop3): couldn't find nilfs on the device [ 1396.997458] bridge0: port 3(team0) entered disabled state [ 1397.020566] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:23 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000ffff030000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1397.043098] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1397.062443] bridge0: port 3(team0) entered blocking state [ 1397.095433] bridge0: port 3(team0) entered disabled state [ 1397.133989] device team0 entered promiscuous mode 20:55:23 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) syz_open_pts(r2, 0xd002) ioctl$PIO_UNISCRNMAP(r2, 0x4b6a, &(0x7f0000000000)="48100d47e10d0482a78380b392286d6c026981c6c04b136ff22e6c2202a96624eeed9bfcdb1f6068d2056b5e0c8e0ba0fc5556ebcc2176052d47148061dc7695af4eea8c81093a4873c5c6555e4f63dee134ca7cc7d07173d2ccc0e44fdea2bf550865735e0e89b44a2cf71835fb7749c3fa3b735af92e0e7d8a0be8825609b48192271fe25e68b63120131c15773ee7e9c9c59cd71518969bb86602a2") ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1397.144501] device team_slave_0 entered promiscuous mode [ 1397.160464] bridge0: port 3(team0) entered blocking state [ 1397.166148] bridge0: port 3(team0) entered forwarding state [ 1397.168414] NILFS (loop3): couldn't find nilfs on the device 20:55:23 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1397.190801] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1397.208358] device team0 left promiscuous mode [ 1397.261333] NILFS (loop3): couldn't find nilfs on the device [ 1397.275999] device team_slave_0 left promiscuous mode [ 1397.355274] bridge0: port 3(team0) entered disabled state 20:55:23 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000000000400000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1397.522037] NILFS (loop3): couldn't find nilfs on the device 20:55:23 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000000000800000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1397.690928] 8021q: adding VLAN 0 to HW filter on device team0 [ 1397.737518] device team0 entered promiscuous mode [ 1397.790159] device team_slave_0 entered promiscuous mode [ 1397.815818] NILFS (loop3): couldn't find nilfs on the device [ 1397.869449] bond0: Enslaving team0 as an active interface with an up link 20:55:24 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010002000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:24 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000c10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1397.967465] bond0: team0 is up - this may be due to an out of date ifenslave [ 1397.980233] device team0 left promiscuous mode [ 1397.985886] device team_slave_0 left promiscuous mode [ 1398.034367] device team_slave_1 left promiscuous mode [ 1398.097464] NILFS (loop3): couldn't find nilfs on the device [ 1398.115153] bridge0: port 3(team0) entered disabled state [ 1398.205775] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:24 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000032a800000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1398.317377] bond0: Releasing backup interface team0 [ 1398.323788] device team0 left promiscuous mode [ 1398.355666] device team_slave_0 left promiscuous mode [ 1398.572649] NILFS (loop3): couldn't find nilfs on the device [ 1399.092228] bridge0: port 3(team0) entered blocking state [ 1399.115472] bridge0: port 3(team0) entered disabled state [ 1399.156032] device team0 entered promiscuous mode [ 1399.162078] device team_slave_0 entered promiscuous mode [ 1399.168476] bridge0: port 3(team0) entered blocking state [ 1399.178509] bridge0: port 3(team0) entered disabled state [ 1399.195519] device team0 entered promiscuous mode 20:55:25 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cb", 0x3c, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:25 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:25 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x80600, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000040)=0x1b) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x80400) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0x14) 20:55:25 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000032ac00000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:25 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000e10008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1399.203745] device team_slave_0 entered promiscuous mode [ 1399.216049] device team_slave_1 entered promiscuous mode [ 1399.223214] bridge0: port 3(team0) entered blocking state [ 1399.228854] bridge0: port 3(team0) entered forwarding state [ 1399.236612] bond0: team0 is up - this may be due to an out of date ifenslave [ 1399.334376] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:25 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00001010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1399.386521] NILFS (loop3): couldn't find nilfs on the device [ 1399.399310] device team0 left promiscuous mode [ 1399.409528] device team_slave_0 left promiscuous mode [ 1399.463025] bridge0: port 3(team0) entered disabled state [ 1399.489237] NILFS (loop3): couldn't find nilfs on the device 20:55:25 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000032b000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1399.792523] 8021q: adding VLAN 0 to HW filter on device team0 [ 1399.854036] device team0 entered promiscuous mode [ 1399.861210] NILFS (loop3): couldn't find nilfs on the device [ 1399.865100] device team_slave_0 entered promiscuous mode [ 1399.951070] bond0: Enslaving team0 as an active interface with an up link 20:55:26 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1400.001510] NILFS (loop3): couldn't find nilfs on the device [ 1400.025717] device team0 left promiscuous mode [ 1400.045705] device team_slave_0 left promiscuous mode [ 1400.079115] device team_slave_1 left promiscuous mode 20:55:26 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000032b400000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1400.138853] bridge0: port 3(team0) entered disabled state [ 1400.172709] bond0: team0 is up - this may be due to an out of date ifenslave [ 1400.212737] bond0: Releasing backup interface team0 [ 1400.224931] device team0 left promiscuous mode [ 1400.228629] NILFS (loop3): couldn't find nilfs on the device [ 1400.241322] device team_slave_0 left promiscuous mode [ 1400.324545] NILFS (loop3): couldn't find nilfs on the device 20:55:26 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000032bc00000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:26 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000040)={0x9, 0x2, 0x4, 0x0, 0x13, "b2cab0a2d3a958009ee93ad7240b63897ffe82"}) [ 1400.571879] NILFS (loop3): couldn't find nilfs on the device [ 1400.659207] NILFS (loop3): couldn't find nilfs on the device [ 1400.742591] bridge0: port 3(team0) entered blocking state [ 1400.760821] bridge0: port 3(team0) entered disabled state [ 1400.776414] device team0 entered promiscuous mode [ 1400.784363] device team_slave_0 entered promiscuous mode [ 1400.811344] validate_nla: 9 callbacks suppressed [ 1400.811354] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1400.870010] bridge0: port 3(team0) entered blocking state [ 1400.889199] bridge0: port 3(team0) entered disabled state [ 1400.908552] device team0 entered promiscuous mode [ 1400.913617] device team_slave_0 entered promiscuous mode [ 1400.960306] device team_slave_1 entered promiscuous mode [ 1400.980198] bridge0: port 3(team0) entered blocking state [ 1400.985890] bridge0: port 3(team0) entered forwarding state 20:55:27 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cb", 0x3c, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:27 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:27 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000002000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:27 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1401.021302] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1401.056574] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00006010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1401.167092] NILFS (loop3): couldn't find nilfs on the device [ 1401.196760] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1401.205382] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:27 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000003000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1401.237989] NILFS (loop3): couldn't find nilfs on the device [ 1401.275212] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 20:55:27 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000067008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1401.328081] device team0 left promiscuous mode [ 1401.349739] device team_slave_0 left promiscuous mode [ 1401.365471] NILFS (loop3): couldn't find nilfs on the device [ 1401.392536] bridge0: port 3(team0) entered disabled state [ 1401.417170] NILFS (loop3): couldn't find nilfs on the device 20:55:27 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000004000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1401.556074] 8021q: adding VLAN 0 to HW filter on device team0 [ 1401.602661] NILFS (loop3): couldn't find nilfs on the device [ 1401.604972] device team0 entered promiscuous mode [ 1401.614673] device team_slave_0 entered promiscuous mode 20:55:27 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) r2 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x8241, 0x0) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000040)={0xb69, 0xffffffff, 0x8, 0xa3, 0xc, "f441e4d1c7e5020a806e65a713f4261fd317f3"}) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1401.652774] bond0: Enslaving team0 as an active interface with an up link [ 1401.661724] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1401.680765] device team0 left promiscuous mode [ 1401.699757] NILFS (loop3): couldn't find nilfs on the device [ 1401.709660] device team_slave_0 left promiscuous mode [ 1401.725811] bridge0: port 3(team0) entered disabled state 20:55:27 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000005000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1401.782434] bond0: team0 is up - this may be due to an out of date ifenslave [ 1401.797509] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1401.813793] device team0 left promiscuous mode [ 1401.828403] device team_slave_0 left promiscuous mode [ 1401.848696] device team_slave_1 left promiscuous mode [ 1401.855123] NILFS (loop3): couldn't find nilfs on the device 20:55:28 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000006000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1401.891287] bridge0: port 3(team0) entered disabled state [ 1401.927546] NILFS (loop3): couldn't find nilfs on the device 20:55:28 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000007000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1401.977033] bond0: team0 is up - this may be due to an out of date ifenslave [ 1402.070869] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1402.088391] bond0: Releasing backup interface team0 [ 1402.112364] device team0 left promiscuous mode [ 1402.135152] device team_slave_0 left promiscuous mode [ 1402.149555] NILFS (loop3): couldn't find nilfs on the device [ 1402.701257] bridge0: port 3(team0) entered blocking state [ 1402.721170] bridge0: port 3(team0) entered disabled state [ 1402.747800] device team0 entered promiscuous mode [ 1402.766634] device team_slave_0 entered promiscuous mode [ 1402.787628] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1402.807438] bridge0: port 3(team0) entered blocking state [ 1402.828482] bridge0: port 3(team0) entered disabled state [ 1402.845116] device team0 entered promiscuous mode [ 1402.850571] device team_slave_0 entered promiscuous mode [ 1402.862986] bridge0: port 3(team0) entered blocking state [ 1402.868634] bridge0: port 3(team0) entered forwarding state [ 1402.880882] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1402.896475] bridge0: port 3(team0) entered blocking state [ 1402.918331] bridge0: port 3(team0) entered disabled state [ 1402.943865] device team0 entered promiscuous mode [ 1402.958115] device team_slave_0 entered promiscuous mode [ 1402.967234] device team_slave_1 entered promiscuous mode [ 1402.981979] bridge0: port 3(team0) entered blocking state [ 1402.987679] bridge0: port 3(team0) entered forwarding state [ 1403.005129] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 20:55:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x4) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDADDIO(r2, 0x4b34, 0x5) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r3 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r3, 0x804c4700, 0x0) 20:55:29 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000008000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:29 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:29 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:29 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e", 0x3e, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1403.018578] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:29 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e0000000f008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1403.126104] NILFS (loop3): couldn't find nilfs on the device [ 1403.154497] device team0 left promiscuous mode [ 1403.165348] device team_slave_0 left promiscuous mode 20:55:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x88000, 0x0) ioctl$KDSETMODE(r1, 0x4b3a, 0x0) r2 = syz_open_pts(r0, 0x220000) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100), 0x301000, 0x0) ioctl$TCSETA(r3, 0x5406, &(0x7f0000000140)={0x0, 0x5, 0x8, 0xfffb, 0x19, "b2d1728e62c69fad"}) r4 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000001c0)={0x101, 0x55fd, 0x0, 0x1f, 0x9, "9fe4d426a7277dd57cce5126dba9c905ecd609"}) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r4) r5 = socket(0x1e, 0x5, 0x0) io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r6, 0x1, &(0x7f0000000540)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x1, 0x0, r5, 0x0, 0x1000000}]) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000000)=0xe) openat$vsock(0xffffffffffffff9c, &(0x7f0000000200), 0x80500, 0x0) ioctl$TCFLSH(r2, 0x804c4700, 0x0) r7 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r7) ioctl$TIOCMGET(r7, 0x5415, &(0x7f0000000080)) [ 1403.216330] bridge0: port 3(team0) entered disabled state [ 1403.261396] NILFS (loop3): couldn't find nilfs on the device 20:55:29 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000009000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00fd01b87fad4cc8be5cf8ff0000004c00"}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0xdc}}, 0x40) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r2, 0x804c4700, 0x0) [ 1403.338214] 8021q: adding VLAN 0 to HW filter on device team0 [ 1403.442926] device team0 entered promiscuous mode [ 1403.448806] device team_slave_0 entered promiscuous mode [ 1403.479802] bond0: Enslaving team0 as an active interface with an up link [ 1403.491171] NILFS (loop3): couldn't find nilfs on the device [ 1403.498579] device team0 left promiscuous mode [ 1403.503345] device team_slave_0 left promiscuous mode 20:55:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0xf2c, 0x0, 0x800, 0x0, "00000000e6ffffffffff4ea43375243a28de00"}) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000ac0)=0x15) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r3) connect$can_bcm(r3, &(0x7f0000000000), 0x10) ioctl$TCFLSH(r2, 0x804c4700, 0x0) [ 1403.544224] bridge0: port 3(team0) entered disabled state [ 1403.568526] NILFS (loop3): couldn't find nilfs on the device 20:55:29 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000a000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:29 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000000)=0x1b) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1403.665378] bond0: team0 is up - this may be due to an out of date ifenslave [ 1403.687394] device team0 left promiscuous mode [ 1403.692194] device team_slave_0 left promiscuous mode [ 1403.715337] NILFS (loop3): couldn't find nilfs on the device [ 1403.715377] device team_slave_1 left promiscuous mode [ 1403.751451] bridge0: port 3(team0) entered disabled state [ 1403.785299] NILFS (loop3): couldn't find nilfs on the device [ 1403.810388] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:30 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000b000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000067008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1403.840442] bond0: team0 is up - this may be due to an out of date ifenslave [ 1403.853777] bond0: Releasing backup interface team0 [ 1403.861406] device team0 left promiscuous mode [ 1403.883219] device team_slave_0 left promiscuous mode [ 1403.920917] NILFS (loop3): couldn't find nilfs on the device [ 1404.002395] NILFS (loop3): couldn't find nilfs on the device [ 1404.257434] bridge0: port 3(team0) entered blocking state [ 1404.275673] bridge0: port 3(team0) entered disabled state [ 1404.296203] device team0 entered promiscuous mode 20:55:30 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1404.319045] device team_slave_0 entered promiscuous mode [ 1404.330978] bridge0: port 3(team0) entered blocking state [ 1404.336999] bridge0: port 3(team0) entered disabled state [ 1404.378690] device team0 entered promiscuous mode [ 1404.399934] device team_slave_0 entered promiscuous mode [ 1404.419615] bridge0: port 3(team0) entered blocking state [ 1404.425317] bridge0: port 3(team0) entered forwarding state [ 1404.467478] bridge0: port 3(team0) entered blocking state [ 1404.484339] bridge0: port 3(team0) entered disabled state 20:55:30 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1404.541125] device team0 entered promiscuous mode [ 1404.571885] device team_slave_0 entered promiscuous mode [ 1404.577531] device team_slave_1 entered promiscuous mode [ 1404.618896] bridge0: port 3(team0) entered blocking state [ 1404.624566] bridge0: port 3(team0) entered forwarding state [ 1404.654969] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:30 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e", 0x3e, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:30 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000c000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:30 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$TCSETS(r1, 0x5402, &(0x7f0000000040)={0xd9a, 0x5, 0x5, 0x10001, 0x1b, "bf53d383ea73649f58d45a0bea0a657e5a59ec"}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r2 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r2, 0x804c4700, 0x0) r3 = signalfd4(r2, &(0x7f0000000080)={[0xfffffffffffffffa]}, 0x8, 0x800) ioctl$VT_DISALLOCATE(r3, 0x5608) 20:55:30 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010028188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1404.675243] device team0 left promiscuous mode [ 1404.679981] device team_slave_0 left promiscuous mode [ 1404.710965] bridge0: port 3(team0) entered disabled state [ 1404.915574] NILFS (loop3): couldn't find nilfs on the device [ 1404.958092] 8021q: adding VLAN 0 to HW filter on device team0 20:55:31 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000d000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1405.109949] device team0 entered promiscuous mode [ 1405.119781] device team_slave_0 entered promiscuous mode [ 1405.148027] bond0: Enslaving team0 as an active interface with an up link [ 1405.164904] bond0: Releasing backup interface team0 [ 1405.170592] device team0 left promiscuous mode [ 1405.190573] NILFS (loop3): couldn't find nilfs on the device [ 1405.212665] device team_slave_0 left promiscuous mode 20:55:31 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000e000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1405.423780] NILFS (loop3): couldn't find nilfs on the device 20:55:31 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000f000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1405.640397] NILFS (loop3): couldn't find nilfs on the device [ 1405.653088] bridge0: port 3(team0) entered blocking state [ 1405.662539] bridge0: port 3(team0) entered disabled state [ 1405.673656] device team0 entered promiscuous mode [ 1405.685119] device team_slave_0 entered promiscuous mode 20:55:31 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:31 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000011000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1405.694259] NILFS (loop3): couldn't find nilfs on the device [ 1405.701828] device team0 left promiscuous mode [ 1405.707502] device team_slave_0 left promiscuous mode [ 1405.722035] bridge0: port 3(team0) entered disabled state [ 1405.784218] bond0: team0 is up - this may be due to an out of date ifenslave [ 1405.799217] bridge0: port 3(team0) entered blocking state [ 1405.805050] bridge0: port 3(team0) entered disabled state 20:55:32 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1405.839274] validate_nla: 12 callbacks suppressed [ 1405.839283] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1405.856843] NILFS (loop3): couldn't find nilfs on the device [ 1405.872160] device team0 left promiscuous mode [ 1405.883155] device team_slave_0 left promiscuous mode 20:55:32 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x8, 0x3, 0x1ff, 0xc, "0a53a364bed620949a4c0d7e207fa8d160f29f"}) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x4, 0x0, 0x8e0, 0x0, "0000e4ffff191100000000000067c200"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) syz_open_pts(r1, 0x30000) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1405.893944] device team_slave_1 left promiscuous mode [ 1405.903542] bridge0: port 3(team0) entered disabled state [ 1405.933179] NILFS (loop3): couldn't find nilfs on the device 20:55:32 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000012000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1405.947196] bond0: team0 is up - this may be due to an out of date ifenslave [ 1405.961537] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1405.970855] bond0: team0 is up - this may be due to an out of date ifenslave [ 1406.027411] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1406.048480] bridge0: port 3(team0) entered blocking state [ 1406.066875] bridge0: port 3(team0) entered disabled state [ 1406.100054] device team0 entered promiscuous mode [ 1406.113638] NILFS (loop3): couldn't find nilfs on the device [ 1406.124528] device team_slave_0 entered promiscuous mode [ 1406.139557] device team_slave_1 entered promiscuous mode 20:55:32 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e", 0x3e, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:32 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010048188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1406.153260] bridge0: port 3(team0) entered blocking state [ 1406.158947] bridge0: port 3(team0) entered forwarding state [ 1406.173402] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1406.189944] NILFS (loop3): couldn't find nilfs on the device [ 1406.217312] device team0 left promiscuous mode [ 1406.252914] device team_slave_0 left promiscuous mode 20:55:32 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000014000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1406.333353] bridge0: port 3(team0) entered disabled state [ 1406.394938] NILFS (loop3): couldn't find nilfs on the device [ 1406.473776] NILFS (loop3): couldn't find nilfs on the device [ 1406.474320] 8021q: adding VLAN 0 to HW filter on device team0 20:55:32 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000002f000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1406.573862] device team0 entered promiscuous mode [ 1406.607528] device team_slave_0 entered promiscuous mode [ 1406.633043] bond0: Enslaving team0 as an active interface with an up link [ 1406.634413] NILFS (loop3): couldn't find nilfs on the device [ 1406.641470] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1406.667840] bond0: Releasing backup interface team0 [ 1406.677397] device team0 left promiscuous mode [ 1406.706910] NILFS (loop3): couldn't find nilfs on the device [ 1406.713580] device team_slave_0 left promiscuous mode 20:55:32 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000063000000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1406.904362] NILFS (loop3): couldn't find nilfs on the device 20:55:33 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000000070000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:33 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000000000b0000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1407.131861] NILFS (loop3): couldn't find nilfs on the device [ 1407.172265] NILFS (loop3): couldn't find nilfs on the device 20:55:33 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:33 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$FS_IOC_GETFSLABEL(r1, 0x81009431, &(0x7f0000000100)) ioctl$TCFLSH(r1, 0x804c4700, 0x0) r2 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) dup2(r2, r0) [ 1407.258812] bridge0: port 3(team0) entered blocking state [ 1407.265076] bridge0: port 3(team0) entered disabled state [ 1407.272269] device team0 entered promiscuous mode [ 1407.279637] device team_slave_0 entered promiscuous mode [ 1407.292146] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1407.327493] bond0: team0 is up - this may be due to an out of date ifenslave [ 1407.352108] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1407.377380] bridge0: port 3(team0) entered blocking state [ 1407.382996] bridge0: port 3(team0) entered disabled state [ 1407.437100] device team0 entered promiscuous mode [ 1407.490313] device team_slave_0 entered promiscuous mode [ 1407.518459] bridge0: port 3(team0) entered blocking state [ 1407.524103] bridge0: port 3(team0) entered forwarding state [ 1407.577153] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1407.584670] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:33 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:33 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000000fff0000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:33 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010068188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1407.641854] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1407.674263] device team0 left promiscuous mode [ 1407.698225] device team_slave_0 left promiscuous mode [ 1407.724740] device team_slave_1 left promiscuous mode [ 1407.740570] NILFS (loop3): couldn't find nilfs on the device [ 1407.750546] bridge0: port 3(team0) entered disabled state [ 1407.774487] bond0: team0 is up - this may be due to an out of date ifenslave [ 1407.783826] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1407.783920] bridge0: port 3(team0) entered blocking state [ 1407.799950] bridge0: port 3(team0) entered disabled state [ 1407.807348] device team0 entered promiscuous mode [ 1407.812619] device team_slave_0 entered promiscuous mode [ 1407.819035] device team_slave_1 entered promiscuous mode [ 1407.825429] bridge0: port 3(team0) entered blocking state [ 1407.831118] bridge0: port 3(team0) entered forwarding state [ 1407.838974] device team0 left promiscuous mode [ 1407.844096] device team_slave_0 left promiscuous mode [ 1407.854394] NILFS (loop3): couldn't find nilfs on the device [ 1407.868519] bridge0: port 3(team0) entered disabled state 20:55:34 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:34 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x6, 0x8010, r0, 0x7b79c000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r2 = syz_open_pts(r1, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r2, 0x804c4700, 0x0) r3 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x8a402, 0x0) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000040)={0x2, {0x2, 0x401, 0xf0f, 0x3, 0x28, 0x1}}) syz_open_pts(r3, 0x121000) 20:55:34 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010020000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1408.024196] 8021q: adding VLAN 0 to HW filter on device team0 [ 1408.075958] device team0 entered promiscuous mode [ 1408.082701] device team_slave_0 entered promiscuous mode [ 1408.107701] NILFS (loop3): couldn't find nilfs on the device [ 1408.108439] bond0: Enslaving team0 as an active interface with an up link [ 1408.125694] bond0: Releasing backup interface team0 [ 1408.138125] device team0 left promiscuous mode [ 1408.143318] device team_slave_0 left promiscuous mode 20:55:34 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010030000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1408.177843] NILFS (loop3): couldn't find nilfs on the device [ 1408.277616] NILFS (loop3): couldn't find nilfs on the device [ 1408.334495] NILFS (loop3): couldn't find nilfs on the device 20:55:34 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010040000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1408.439629] NILFS (loop3): couldn't find nilfs on the device [ 1408.480295] NILFS (loop3): couldn't find nilfs on the device [ 1408.497239] bridge0: port 3(team0) entered blocking state [ 1408.498410] ttyprintk ttyprintk: tty_port_close_start: tty->count = 1 port count = 3 [ 1408.503951] bridge0: port 3(team0) entered disabled state [ 1408.510820] [ 1408.510824] ====================================================== [ 1408.510828] WARNING: possible circular locking dependency detected [ 1408.510831] 4.19.189-syzkaller #0 Not tainted [ 1408.510835] ------------------------------------------------------ [ 1408.510839] syz-executor.4/26403 is trying to acquire lock: [ 1408.510842] 0000000075c6487a (console_owner){-...}, at: vprintk_emit+0x3fe/0x740 [ 1408.510855] [ 1408.510857] but task is already holding lock: [ 1408.510860] 0000000040c7cc24 (&(&port->lock)->rlock){-.-.}, at: tty_port_close_start.part.0+0x28/0x540 [ 1408.510879] [ 1408.510882] which lock already depends on the new lock. [ 1408.510883] [ 1408.510885] [ 1408.510889] the existing dependency chain (in reverse order) is: [ 1408.510891] [ 1408.510892] -> #2 (&(&port->lock)->rlock){-.-.}: [ 1408.510903] tty_port_tty_get+0x1d/0x80 [ 1408.510907] tty_port_default_wakeup+0x11/0x40 [ 1408.510910] serial8250_tx_chars+0x490/0xaf0 [ 1408.510914] serial8250_handle_irq.part.0+0x31f/0x3d0 [ 1408.510918] serial8250_default_handle_irq+0xae/0x220 [ 1408.510921] serial8250_interrupt+0x101/0x240 [ 1408.510925] __handle_irq_event_percpu+0x27e/0x8e0 [ 1408.510928] handle_irq_event+0x102/0x290 [ 1408.510931] handle_edge_irq+0x260/0xcf0 [ 1408.510934] handle_irq+0x35/0x50 [ 1408.510937] do_IRQ+0x93/0x1c0 [ 1408.510940] ret_from_intr+0x0/0x1e [ 1408.510943] native_safe_halt+0xe/0x10 [ 1408.510947] default_idle+0x49/0x310 [ 1408.510949] do_idle+0x2ec/0x4b0 [ 1408.510953] cpu_startup_entry+0xc5/0xe0 [ 1408.510956] start_secondary+0x435/0x5c0 [ 1408.510959] secondary_startup_64+0xa4/0xb0 [ 1408.510961] 20:55:34 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x20a080, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x400, 0x0, "003aff2aafad3808ef00000000ddc1517600"}) ioctl$TIOCPKT(r0, 0x5420, &(0x7f0000000040)=0x7) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) ioctl$KDDELIO(r2, 0x4b35, 0x5) [ 1408.510963] -> #1 (&port_lock_key){-.-.}: [ 1408.510974] serial8250_console_write+0x89b/0xad0 [ 1408.510977] console_unlock+0xbb6/0x1110 [ 1408.510980] vprintk_emit+0x2d1/0x740 [ 1408.510983] vprintk_func+0x79/0x180 [ 1408.510986] printk+0xba/0xed [ 1408.510989] register_console+0x87f/0xc90 [ 1408.510993] univ8250_console_init+0x3a/0x46 [ 1408.510995] console_init+0x4cb/0x718 [ 1408.510998] start_kernel+0x686/0x911 [ 1408.511001] secondary_startup_64+0xa4/0xb0 [ 1408.511003] [ 1408.511005] -> #0 (console_owner){-...}: [ 1408.511016] vprintk_emit+0x43b/0x740 [ 1408.511019] vprintk_func+0x79/0x180 [ 1408.511022] printk+0xba/0xed [ 1408.511026] tty_port_close_start.part.0+0x4f3/0x540 [ 1408.511029] tty_port_close+0x46/0x160 [ 1408.511032] tty_release+0x45e/0x1210 [ 1408.511035] __fput+0x2ce/0x890 [ 1408.511038] task_work_run+0x148/0x1c0 [ 1408.511042] exit_to_usermode_loop+0x251/0x2a0 [ 1408.511045] do_syscall_64+0x538/0x620 [ 1408.511049] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1408.511050] [ 1408.511054] other info that might help us debug this: [ 1408.511056] [ 1408.511058] Chain exists of: [ 1408.511060] console_owner --> &port_lock_key --> &(&port->lock)->rlock [ 1408.511074] [ 1408.511077] Possible unsafe locking scenario: [ 1408.511079] [ 1408.511082] CPU0 CPU1 [ 1408.511086] ---- ---- [ 1408.511088] lock(&(&port->lock)->rlock); [ 1408.511096] lock(&port_lock_key); [ 1408.511104] lock(&(&port->lock)->rlock); [ 1408.511110] lock(console_owner); [ 1408.511116] [ 1408.511119] *** DEADLOCK *** [ 1408.511120] [ 1408.511124] 2 locks held by syz-executor.4/26403: [ 1408.511125] #0: 000000008829cdc7 (&tty->legacy_mutex){+.+.}, at: tty_lock+0x6a/0xa0 [ 1408.511138] #1: 0000000040c7cc24 (&(&port->lock)->rlock){-.-.}, at: tty_port_close_start.part.0+0x28/0x540 [ 1408.511152] [ 1408.511155] stack backtrace: [ 1408.511160] CPU: 1 PID: 26403 Comm: syz-executor.4 Not tainted 4.19.189-syzkaller #0 [ 1408.511166] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1408.511168] Call Trace: [ 1408.511172] dump_stack+0x1fc/0x2ef [ 1408.511176] print_circular_bug.constprop.0.cold+0x2d7/0x41e [ 1408.511179] __lock_acquire+0x30c9/0x3ff0 [ 1408.511182] ? mark_held_locks+0xf0/0xf0 [ 1408.511185] ? memcpy+0x35/0x50 [ 1408.511188] ? vprintk_emit+0x416/0x740 [ 1408.511191] lock_acquire+0x170/0x3c0 [ 1408.511194] ? vprintk_emit+0x3fe/0x740 [ 1408.511197] vprintk_emit+0x43b/0x740 [ 1408.511200] ? vprintk_emit+0x3fe/0x740 [ 1408.511204] vprintk_func+0x79/0x180 [ 1408.511206] printk+0xba/0xed [ 1408.511209] ? log_store.cold+0x16/0x16 [ 1408.511212] ? lock_acquire+0x170/0x3c0 [ 1408.511216] ? tty_port_close_start.part.0+0x28/0x540 [ 1408.511220] tty_port_close_start.part.0+0x4f3/0x540 [ 1408.511223] tty_port_close+0x46/0x160 [ 1408.511226] ? tpk_open+0x60/0x60 [ 1408.511229] tty_release+0x45e/0x1210 [ 1408.511232] ? do_tty_hangup+0x30/0x30 [ 1408.511235] __fput+0x2ce/0x890 [ 1408.511238] ? tty_poll+0x1b0/0x1b0 [ 1408.511241] task_work_run+0x148/0x1c0 [ 1408.511245] exit_to_usermode_loop+0x251/0x2a0 [ 1408.511248] do_syscall_64+0x538/0x620 [ 1408.511252] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1408.511255] RIP: 0033:0x41940b [ 1408.511265] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 1408.511269] RSP: 002b:00007ffc83c8ddb0 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1408.511277] RAX: 0000000000000000 RBX: 0000000000000007 RCX: 000000000041940b [ 1408.511282] RDX: 0000000000000000 RSI: 0000000008c9f4bf RDI: 0000000000000006 [ 1408.511287] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b2f52404c [ 1408.511291] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000056c9e0 [ 1408.511296] R13: 000000000056c9e0 R14: 000000000056bf60 R15: 0000000000157b04 [ 1409.071772] device team0 entered promiscuous mode [ 1409.077557] device team_slave_0 entered promiscuous mode 20:55:35 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010050000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:35 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x0, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1409.092919] bond0: team0 is up - this may be due to an out of date ifenslave [ 1409.115740] device team0 left promiscuous mode [ 1409.120427] device team_slave_0 left promiscuous mode 20:55:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010078188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1409.141833] NILFS (loop3): couldn't find nilfs on the device [ 1409.148440] bridge0: port 3(team0) entered disabled state [ 1409.158916] bond0: team0 is up - this may be due to an out of date ifenslave [ 1409.167346] bridge0: port 3(team0) entered blocking state [ 1409.173226] bridge0: port 3(team0) entered disabled state [ 1409.182138] device team0 entered promiscuous mode 20:55:35 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) r2 = dup2(0xffffffffffffffff, r1) ioctl$VT_ACTIVATE(r2, 0x5606, 0x400) [ 1409.191656] device team_slave_0 entered promiscuous mode [ 1409.198629] bridge0: port 3(team0) entered blocking state [ 1409.204236] bridge0: port 3(team0) entered forwarding state [ 1409.216985] device team0 left promiscuous mode [ 1409.222137] device team_slave_0 left promiscuous mode [ 1409.233446] device team_slave_1 left promiscuous mode [ 1409.246322] NILFS (loop3): couldn't find nilfs on the device [ 1409.256017] bridge0: port 3(team0) entered disabled state [ 1409.263665] bond0: team0 is up - this may be due to an out of date ifenslave [ 1409.273740] bridge0: port 3(team0) entered blocking state 20:55:35 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010060000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1409.297453] bridge0: port 3(team0) entered disabled state [ 1409.312319] device team0 entered promiscuous mode [ 1409.329013] device team_slave_0 entered promiscuous mode [ 1409.334563] NILFS (loop3): couldn't find nilfs on the device [ 1409.335900] device team_slave_1 entered promiscuous mode 20:55:35 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:35 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010088188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1409.349449] bridge0: port 3(team0) entered blocking state [ 1409.355069] bridge0: port 3(team0) entered forwarding state [ 1409.363582] bond0: team0 is up - this may be due to an out of date ifenslave [ 1409.375877] device team0 left promiscuous mode [ 1409.388434] device team_slave_0 left promiscuous mode [ 1409.436082] NILFS (loop3): couldn't find nilfs on the device [ 1409.440508] bridge0: port 3(team0) entered disabled state 20:55:35 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010070000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1409.529424] 8021q: adding VLAN 0 to HW filter on device team0 [ 1409.561560] device team0 entered promiscuous mode [ 1409.566646] device team_slave_0 entered promiscuous mode [ 1409.571908] NILFS (loop3): couldn't find nilfs on the device [ 1409.589669] bond0: Enslaving team0 as an active interface with an up link [ 1409.630865] device team0 left promiscuous mode [ 1409.635652] device team_slave_0 left promiscuous mode [ 1409.656418] NILFS (loop3): couldn't find nilfs on the device [ 1409.678135] bridge0: port 3(team0) entered disabled state 20:55:35 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010080000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1409.757983] bond0: team0 is up - this may be due to an out of date ifenslave [ 1409.779424] bond0: Releasing backup interface team0 [ 1409.797065] device team0 left promiscuous mode 20:55:35 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f0000000000)={0x3ff, 0x1, 0x2, 0x6, 0x2, "f57d6ceb21940491640a34d6ed6b033b57409b", 0x9, 0x1}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCGSERIAL(r1, 0x541e, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/152}) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x2) [ 1409.822571] device team_slave_0 left promiscuous mode [ 1409.864552] NILFS (loop3): couldn't find nilfs on the device [ 1409.922031] NILFS (loop3): couldn't find nilfs on the device 20:55:36 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010090000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1410.068271] NILFS (loop3): couldn't find nilfs on the device 20:55:36 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000000100c0000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1410.167132] bridge0: port 3(team0) entered blocking state [ 1410.192831] bridge0: port 3(team0) entered disabled state [ 1410.230235] device team0 entered promiscuous mode [ 1410.258497] NILFS (loop3): couldn't find nilfs on the device [ 1410.260585] device team_slave_0 entered promiscuous mode [ 1410.297650] bridge0: port 3(team0) entered blocking state 20:55:36 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1410.310113] bridge0: port 3(team0) entered disabled state 20:55:36 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010120000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1410.354694] device team0 entered promiscuous mode [ 1410.359567] device team_slave_0 entered promiscuous mode [ 1410.381911] bridge0: port 3(team0) entered blocking state [ 1410.387563] bridge0: port 3(team0) entered forwarding state [ 1410.397875] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:36 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e000000100a8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1410.411784] device team0 left promiscuous mode [ 1410.417311] device team_slave_0 left promiscuous mode [ 1410.423457] device team_slave_1 left promiscuous mode [ 1410.435054] bridge0: port 3(team0) entered disabled state [ 1410.449045] NILFS (loop3): couldn't find nilfs on the device 20:55:36 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010230000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1410.459397] bond0: team0 is up - this may be due to an out of date ifenslave [ 1410.468930] bridge0: port 3(team0) entered blocking state [ 1410.475248] bridge0: port 3(team0) entered disabled state 20:55:36 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1410.512678] device team0 entered promiscuous mode [ 1410.522433] device team_slave_0 entered promiscuous mode [ 1410.530906] device team_slave_1 entered promiscuous mode [ 1410.538995] bridge0: port 3(team0) entered blocking state [ 1410.544647] bridge0: port 3(team0) entered forwarding state [ 1410.553434] device team0 left promiscuous mode 20:55:36 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000000)=0xf) 20:55:36 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010480000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1410.581237] device team_slave_0 left promiscuous mode [ 1410.593562] NILFS (loop3): couldn't find nilfs on the device [ 1410.607957] bridge0: port 3(team0) entered disabled state [ 1410.684297] 8021q: adding VLAN 0 to HW filter on device team0 [ 1410.712103] device team0 entered promiscuous mode [ 1410.725412] device team_slave_0 entered promiscuous mode [ 1410.781819] bond0: Enslaving team0 as an active interface with an up link [ 1410.786588] NILFS (loop3): couldn't find nilfs on the device [ 1410.794687] bond0: team0 is up - this may be due to an out of date ifenslave [ 1410.803114] device team0 left promiscuous mode [ 1410.817258] device team_slave_0 left promiscuous mode 20:55:36 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e000000100c8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:55:36 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000000104c0000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1410.829827] bridge0: port 3(team0) entered disabled state [ 1410.877663] bond0: team0 is up - this may be due to an out of date ifenslave [ 1410.887207] validate_nla: 18 callbacks suppressed [ 1410.887214] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1410.903045] bond0: Releasing backup interface team0 [ 1410.912334] device team0 left promiscuous mode [ 1410.916607] NILFS (loop3): couldn't find nilfs on the device [ 1410.918879] device team_slave_0 left promiscuous mode [ 1410.986272] NILFS (loop3): couldn't find nilfs on the device 20:55:37 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010600000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1411.068688] bridge0: port 3(team0) entered blocking state [ 1411.075067] bridge0: port 3(team0) entered disabled state [ 1411.083797] device team0 entered promiscuous mode [ 1411.094078] device team_slave_0 entered promiscuous mode [ 1411.103866] NILFS (loop3): couldn't find nilfs on the device [ 1411.111610] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 20:55:37 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1411.124598] bridge0: port 3(team0) entered blocking state [ 1411.140497] bridge0: port 3(team0) entered disabled state [ 1411.163892] NILFS (loop3): couldn't find nilfs on the device 20:55:37 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010680000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1411.175634] device team0 entered promiscuous mode [ 1411.181116] device team_slave_0 entered promiscuous mode [ 1411.204400] bridge0: port 3(team0) entered blocking state [ 1411.210091] bridge0: port 3(team0) entered forwarding state 20:55:37 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1411.234301] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1411.249248] device team0 left promiscuous mode [ 1411.271775] device team_slave_0 left promiscuous mode [ 1411.273776] NILFS (loop3): couldn't find nilfs on the device [ 1411.298769] device team_slave_1 left promiscuous mode [ 1411.334476] bridge0: port 3(team0) entered disabled state [ 1411.361455] NILFS (loop3): couldn't find nilfs on the device 20:55:37 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000000106c0000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1411.408258] bond0: team0 is up - this may be due to an out of date ifenslave [ 1411.424667] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1411.442983] bridge0: port 3(team0) entered blocking state 20:55:37 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x1b) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1411.474036] bridge0: port 3(team0) entered disabled state [ 1411.482641] device team0 entered promiscuous mode [ 1411.494126] device team_slave_0 entered promiscuous mode [ 1411.501041] device team_slave_1 entered promiscuous mode [ 1411.507289] bridge0: port 3(team0) entered blocking state [ 1411.512938] bridge0: port 3(team0) entered forwarding state 20:55:37 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1411.523191] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1411.533435] bond0: team0 is up - this may be due to an out of date ifenslave [ 1411.552233] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1411.563283] device team0 left promiscuous mode 20:55:37 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e000000100e8188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1411.569698] device team_slave_0 left promiscuous mode [ 1411.585254] bridge0: port 3(team0) entered disabled state [ 1411.590275] NILFS (loop3): couldn't find nilfs on the device 20:55:37 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010740000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1411.707266] 8021q: adding VLAN 0 to HW filter on device team0 [ 1411.737480] device team0 entered promiscuous mode [ 1411.744184] device team_slave_0 entered promiscuous mode 20:55:37 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000000107a0000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1411.758796] NILFS (loop3): couldn't find nilfs on the device [ 1411.767487] bond0: Enslaving team0 as an active interface with an up link [ 1411.775452] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1411.792848] bond0: Releasing backup interface team0 [ 1411.811371] device team0 left promiscuous mode [ 1411.824728] device team_slave_0 left promiscuous mode [ 1411.894360] NILFS (loop3): couldn't find nilfs on the device 20:55:38 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010000300000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1412.018033] NILFS (loop3): couldn't find nilfs on the device 20:55:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000000)) 20:55:38 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010000500000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1412.151086] bridge0: port 3(team0) entered blocking state [ 1412.159422] bridge0: port 3(team0) entered disabled state [ 1412.183139] NILFS (loop3): couldn't find nilfs on the device [ 1412.191386] device team0 entered promiscuous mode 20:55:38 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010000600000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:38 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1412.228345] device team_slave_0 entered promiscuous mode [ 1412.250115] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1412.267640] device team0 left promiscuous mode [ 1412.300273] device team_slave_0 left promiscuous mode [ 1412.341778] bridge0: port 3(team0) entered disabled state [ 1412.374470] NILFS (loop3): couldn't find nilfs on the device [ 1412.394148] bond0: team0 is up - this may be due to an out of date ifenslave [ 1412.420518] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1412.442437] bridge0: port 3(team0) entered blocking state [ 1412.485855] bridge0: port 3(team0) entered disabled state [ 1412.514497] device team0 entered promiscuous mode [ 1412.573143] device team_slave_0 entered promiscuous mode [ 1412.597988] bridge0: port 3(team0) entered blocking state [ 1412.603617] bridge0: port 3(team0) entered forwarding state [ 1412.612943] netlink: 'syz-executor.2': attribute type 10 has an invalid length. 20:55:38 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:38 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010000700000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:38 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) socketpair(0x2, 0x800, 0x8, &(0x7f0000000040)={0xffffffffffffffff}) syz_genetlink_get_family_id$tipc2(&(0x7f0000000000), r2) [ 1412.624477] bond0: team0 is up - this may be due to an out of date ifenslave [ 1412.643716] device team0 left promiscuous mode [ 1412.658396] device team_slave_0 left promiscuous mode [ 1412.671712] device team_slave_1 left promiscuous mode [ 1412.694023] bridge0: port 3(team0) entered disabled state [ 1412.711909] NILFS (loop3): couldn't find nilfs on the device [ 1412.758167] bond0: team0 is up - this may be due to an out of date ifenslave [ 1412.789720] bridge0: port 3(team0) entered blocking state [ 1412.795942] bridge0: port 3(team0) entered disabled state [ 1412.831655] device team0 entered promiscuous mode [ 1412.836923] device team_slave_0 entered promiscuous mode [ 1412.844969] device team_slave_1 entered promiscuous mode [ 1412.869991] bridge0: port 3(team0) entered blocking state [ 1412.876062] bridge0: port 3(team0) entered forwarding state 20:55:39 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:39 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010108188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) 20:55:39 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010000900000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1412.909968] device team0 left promiscuous mode [ 1412.914947] device team_slave_0 left promiscuous mode [ 1412.971222] bridge0: port 3(team0) entered disabled state [ 1413.010402] NILFS (loop3): couldn't find nilfs on the device 20:55:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x4003, 0x0) r2 = syz_open_pts(r1, 0x416c00) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r2, 0x804c4700, 0x0) ioctl$VIDIOC_G_TUNER(r1, 0xc054561d, &(0x7f0000000100)={0xb00, "40225e36fdca3978bea05ac0ab42dc613152ce52e22e8da8b0da8b66fec342cc", 0x1, 0x100, 0xff, 0x6, 0x8, 0x1, 0x1ff, 0x9}) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000000)={0x664, 0xfff}) [ 1413.143369] NILFS (loop3): couldn't find nilfs on the device 20:55:39 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010000c00000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1413.186441] 8021q: adding VLAN 0 to HW filter on device team0 [ 1413.210666] device team0 entered promiscuous mode 20:55:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x214c00, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x400000, 0x1ffffffd, 0xffff, 0x1b, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) ioctl$F2FS_IOC_GET_FEATURES(r2, 0x8004f50c, &(0x7f0000000000)) chown(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x0) r3 = getpid() sched_setattr(r3, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000e80)=0xe8) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000540)='./file1\x00', 0x5, 0x8, &(0x7f0000000c00)=[{&(0x7f00000006c0)="d86a9a21dd02a8f6e8b464fd93a68af7d38bd65dc80f28be4fcce05293bb22eb9ae0dbbdc692eec36fd643258029206bc8781737c62c3add2a70616271de480bf50c8d5130c3b875bb8c81aa01492fdeb624d48ef96229fe6a409d25d9bf6e430a973401a3f7ee64e36240e697b7a510cc18378116ef1e2cd3c8230b9110a00041f62422cda5e8390a4f50c6dda4df5deda59fe08e89113a8fd893819c2158d0536d20a613b91785499a4b1731879cb34427f7f96337a3d25639d53873da86ff1e28cbe1951adf9c69", 0xc9, 0x3}, {&(0x7f0000000600)="0cd5d7d4066c0e5060b80760b3833022b191e389f00e4a1ca71aa3b5179429d5438a32d632f834b05f23dead02a4d6d7546c04ca0d3942363f2e0444bbdf8154d46eca0e114dd176fe51878c15052d3eb8c75246", 0x54, 0x5}, {&(0x7f00000007c0)="cf4fefb79e552468de067bc98a8c8a5ce531740c501d60cc2c4084912742b109446453450eef0d1e11ad0123953187aa4691fc011b803ee833afd36a", 0x3c, 0x5}, {&(0x7f0000000900)="d5f2148492e814981cd8f689f2a1d5d59591211af66b9ad07711c74cd0c7be5b009e99c756af4b7050f0b71f32cb55be6a2d49dcbf23d344e3a509c890b80df0cafdf0dbd6db009232d9d101616ffa3504821afccc41af4bc6497760b9c06511d860a534e2a7050c10e3f0e7e3b0cdb286506a8baefae4d32a6dc79ef9fedb97019d9bb7edc0c38da3b07c64309bfa6a030bfa6b", 0x94, 0x7ff}, {&(0x7f0000000800)="e9d6a290ec73c736fcd55b22bbec337b6db5c9ea9b77d13a2713738f52192fc330274eb17ea961d9b4e365a2d71afc85dfd55de02c3a062f4a877911aab63dfe430bfc10", 0x44, 0x1}, {&(0x7f00000009c0)="b1a42875e3df1d1d78892ffb1455f80c4a96853ded1cf3d5a6569bb043d891ba7bc54d9e57e17f70d3f042597a025c8bae3aae73caf6405e0a3951bd97d5aea28129af41a50667f6ab2618867203e50c7d39ca3415849c21511d6bb885fd434de6a7ee6a787b33d59524dd7ad3eff7153b11e7f927a046d19b517de230ce7899129b6b4bd005111a56ca56b04cee451a3240aec155ad1073f60a6c3c84f50db9455b1f961f3468550abb5d0079db12ec4bc77c6223961d4833f1657256dc73ebde5a280f80cae9f5ca5cce08e216993e0707c570b310c2c29ec1707d3e4878732b97b2ccb3f352d9", 0xe8, 0x3}, {&(0x7f0000000ac0)="8a80458c3290aeb418e713036cfe63fbe69cef58b8e1d51a60691550832ce3c29017b6e9e4556533f28b43984049e6ccf65cd1229b431a5aab9c06000000c8837dfeb7949d8d0e80d5943bcf49d4438de8150a1fe0e7d7475ebed765914129fcf0538b6e1395eb145604c938c5889599179427805c30179f1c5f3a511b8cf0ab2848f142adff4e6e4859280df112efc7ee9f2eb2bdcfbd3168eb91bd17b3a8df3fe6e26229a6d1a3abe1ad79a2209cdefd3a650c037fc0da5a50b52e4081689a1782d6132d86ea325831", 0xca, 0x8}, {&(0x7f0000000bc0)="193844ff3315bd1d26ea4b981b8d20592a8f2aad03d314f2f98926eab8922339612c4d4dbc5450", 0x27, 0x4}], 0x88, &(0x7f0000000ec0)={[{@huge_always}, {@gid}, {@gid}, {@huge_never}], [{@smackfsroot={'smackfsroot', 0x3d, '#-^](+{'}}, {@fowner_lt={'fowner<', r4}}, {@euid_gt={'euid>', 0xee00}}, {@appraise}, {@obj_type={'obj_type', 0x3d, '%\x00'}}, {@obj_role={'obj_role', 0x3d, 'huge=never'}}, {@pcr={'pcr', 0x3d, 0x33}}]}) getresgid(&(0x7f0000000480), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) r6 = getpid() sched_setattr(r6, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d80)={{{@in6=@dev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast1}}, &(0x7f0000000e80)=0xe8) syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000540)='./file1\x00', 0x5, 0x8, &(0x7f0000000c00)=[{&(0x7f00000006c0)="d86a9a21dd02a8f6e8b464fd93a68af7d38bd65dc80f28be4fcce05293bb22eb9ae0dbbdc692eec36fd643258029206bc8781737c62c3add2a70616271de480bf50c8d5130c3b875bb8c81aa01492fdeb624d48ef96229fe6a409d25d9bf6e430a973401a3f7ee64e36240e697b7a510cc18378116ef1e2cd3c8230b9110a00041f62422cda5e8390a4f50c6dda4df5deda59fe08e89113a8fd893819c2158d0536d20a613b91785499a4b1731879cb34427f7f96337a3d25639d53873da86ff1e28cbe1951adf9c69", 0xc9, 0x3}, {&(0x7f0000000600)="0cd5d7d4066c0e5060b80760b3833022b191e389f00e4a1ca71aa3b5179429d5438a32d632f834b05f23dead02a4d6d7546c04ca0d3942363f2e0444bbdf8154d46eca0e114dd176fe51878c15052d3eb8c75246", 0x54, 0x5}, {&(0x7f00000007c0)="cf4fefb79e552468de067bc98a8c8a5ce531740c501d60cc2c4084912742b109446453450eef0d1e11ad0123953187aa4691fc011b803ee833afd36a", 0x3c, 0x5}, {&(0x7f0000000900)="d5f2148492e814981cd8f689f2a1d5d59591211af66b9ad07711c74cd0c7be5b009e99c756af4b7050f0b71f32cb55be6a2d49dcbf23d344e3a509c890b80df0cafdf0dbd6db009232d9d101616ffa3504821afccc41af4bc6497760b9c06511d860a534e2a7050c10e3f0e7e3b0cdb286506a8baefae4d32a6dc79ef9fedb97019d9bb7edc0c38da3b07c64309bfa6a030bfa6b", 0x94, 0x7ff}, {&(0x7f0000000800)="e9d6a290ec73c736fcd55b22bbec337b6db5c9ea9b77d13a2713738f52192fc330274eb17ea961d9b4e365a2d71afc85dfd55de02c3a062f4a877911aab63dfe430bfc10", 0x44, 0x1}, {&(0x7f00000009c0)="b1a42875e3df1d1d78892ffb1455f80c4a96853ded1cf3d5a6569bb043d891ba7bc54d9e57e17f70d3f042597a025c8bae3aae73caf6405e0a3951bd97d5aea28129af41a50667f6ab2618867203e50c7d39ca3415849c21511d6bb885fd434de6a7ee6a787b33d59524dd7ad3eff7153b11e7f927a046d19b517de230ce7899129b6b4bd005111a56ca56b04cee451a3240aec155ad1073f60a6c3c84f50db9455b1f961f3468550abb5d0079db12ec4bc77c6223961d4833f1657256dc73ebde5a280f80cae9f5ca5cce08e216993e0707c570b310c2c29ec1707d3e4878732b97b2ccb3f352d9", 0xe8, 0x3}, {&(0x7f0000000ac0)="8a80458c3290aeb418e713036cfe63fbe69cef58b8e1d51a60691550832ce3c29017b6e9e4556533f28b43984049e6ccf65cd1229b431a5aab9c06000000c8837dfeb7949d8d0e80d5943bcf49d4438de8150a1fe0e7d7475ebed765914129fcf0538b6e1395eb145604c938c5889599179427805c30179f1c5f3a511b8cf0ab2848f142adff4e6e4859280df112efc7ee9f2eb2bdcfbd3168eb91bd17b3a8df3fe6e26229a6d1a3abe1ad79a2209cdefd3a650c037fc0da5a50b52e4081689a1782d6132d86ea325831", 0xca, 0x8}, {&(0x7f0000000bc0)="193844ff3315bd1d26ea4b981b8d20592a8f2aad03d314f2f98926eab8922339612c4d4dbc5450", 0x27, 0x4}], 0x88, &(0x7f0000000340)=ANY=[@ANYBLOB='huge=always,gid=', @ANYRESHEX=0x0, @ANYBLOB=',gid=', @ANYRESHEX=0x0, @ANYBLOB=',huge=never,smackfsroot=#-^](+{,fowner<', @ANYRESDEC=r7, @ANYBLOB=',euid>', @ANYRESDEC=0xee00, @ANYBLOB="2c6170707261697365780e722bf69a2c6f626a5f747970653d25002c6f626a5f726f6c653d687567653d6e657665722c7063723d30303030303030303030303b36fd4630303030303030"]) newfstatat(0xffffffffffffff9c, &(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x400) sendmsg$unix(r2, &(0x7f00000007c0)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000200)=[{&(0x7f0000000100)="7508ae3cff31b59788df7e1fbeeb81b442b36aac06bc31b17c79f9e0b1de894316be3886bfdc013eff9b5bc198cbc3b5d8a80c524cb73a2848a2d6a8a123dc1640e06e8d9541742cd150fae4d733e66f95cc987983aaee864b4403488e1482fe6918839bb8c0383993dedadf53e18e1c51c639248f6f4400c3768522f2910ca9f175b07bb770592dcc9ca193a6ef6bcfd918818f2568f8095a68b2ca9b4262240f55676b827c63ebcedd1dedbb423ec5c7dd971dfb188cc1aae80846df0e6c73f7fa4f76c294", 0xc6}, {&(0x7f0000000280)="15842adb6864a47a0ede80690935cec1e1772a134b3c0df91beee2b7bea55a18e4b19ac692a0aa2861a9d83788183d8a8a2554e19232c050dc624202ee748ddbbdc060c94d5e019d9948e71fcaf70cf5eacff9c342421dbc51c66dc748211db225bee574da1c856983c5c27403b84d1f9ab03fe0f928b7ce8e7735a54c2f58c41b0280d9ba8295c9841794", 0x8b}], 0x2, &(0x7f00000006c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r0, r0, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r3, r4, 0xee00}}}, @rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee01, r5}}}, @cred={{0x1c, 0x1, 0x2, {r6, r7, r8}}}], 0xd0, 0x44090}, 0x4040c00) ioctl$TCFLSH(r1, 0x804c4700, 0x0) [ 1413.240928] device team_slave_0 entered promiscuous mode [ 1413.247375] bond0: Enslaving team0 as an active interface with an up link [ 1413.259547] NILFS (loop3): couldn't find nilfs on the device [ 1413.267887] bond0: Releasing backup interface team0 [ 1413.274322] device team0 left promiscuous mode [ 1413.279412] device team_slave_0 left promiscuous mode 20:55:39 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010001200000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1413.312259] NILFS (loop3): couldn't find nilfs on the device [ 1413.371025] bridge0: port 3(team0) entered blocking state [ 1413.378282] tmpfs: Bad mount option smackfsroot [ 1413.399650] bridge0: port 3(team0) entered disabled state [ 1413.411942] device team0 entered promiscuous mode 20:55:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1413.412774] NILFS (loop3): couldn't find nilfs on the device [ 1413.419468] tmpfs: Bad mount option smackfsroot [ 1413.428446] device team_slave_0 entered promiscuous mode [ 1413.437301] device team0 left promiscuous mode [ 1413.442005] device team_slave_0 left promiscuous mode 20:55:39 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010002000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1413.469276] bridge0: port 3(team0) entered disabled state [ 1413.490198] tmpfs: Bad mount option smackfsroot [ 1413.507262] bond0: team0 is up - this may be due to an out of date ifenslave [ 1413.518113] bridge0: port 3(team0) entered blocking state [ 1413.524791] bridge0: port 3(team0) entered disabled state [ 1413.531605] device team0 entered promiscuous mode [ 1413.540002] device team_slave_0 entered promiscuous mode [ 1413.560695] bridge0: port 3(team0) entered blocking state [ 1413.566365] bridge0: port 3(team0) entered forwarding state [ 1413.573101] device team0 left promiscuous mode [ 1413.578346] device team_slave_0 left promiscuous mode [ 1413.615916] device team_slave_1 left promiscuous mode 20:55:39 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:39 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0), 0x200040, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r2) syz_open_pts(r2, 0x80000) ioctl$TCFLSH(r1, 0x804c4700, 0x0) 20:55:39 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1413.648912] NILFS (loop3): couldn't find nilfs on the device [ 1413.702058] bridge0: port 3(team0) entered disabled state [ 1413.760231] bond0: team0 is up - this may be due to an out of date ifenslave [ 1413.774127] bond0: team0 is up - this may be due to an out of date ifenslave [ 1413.800108] bridge0: port 3(team0) entered blocking state [ 1413.808134] bridge0: port 3(team0) entered disabled state [ 1413.854674] device team0 entered promiscuous mode [ 1413.870571] device team_slave_0 entered promiscuous mode [ 1413.893054] device team_slave_1 entered promiscuous mode [ 1413.911885] bridge0: port 3(team0) entered blocking state [ 1413.917549] bridge0: port 3(team0) entered forwarding state 20:55:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:40 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010002300000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010608188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1413.965108] device team0 left promiscuous mode [ 1413.970270] device team_slave_0 left promiscuous mode [ 1414.062999] bridge0: port 3(team0) entered disabled state [ 1414.077259] NILFS (loop3): couldn't find nilfs on the device 20:55:40 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010343400000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1414.154968] bond0: team0 is up - this may be due to an out of date ifenslave [ 1414.189433] bridge0: port 3(team0) entered blocking state [ 1414.195065] bridge0: port 3(team0) entered disabled state [ 1414.218932] device team0 entered promiscuous mode [ 1414.244464] NILFS (loop3): couldn't find nilfs on the device [ 1414.290505] device team_slave_0 entered promiscuous mode 20:55:40 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010003f00000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:40 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0xff) [ 1414.335112] bridge0: port 3(team0) entered blocking state [ 1414.335142] bridge0: port 3(team0) entered forwarding state [ 1414.341495] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:40 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1414.342152] device team0 left promiscuous mode 20:55:40 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:40 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1414.342175] device team_slave_0 left promiscuous mode [ 1414.359402] device team_slave_1 left promiscuous mode [ 1414.361522] bridge0: port 3(team0) entered disabled state 20:55:40 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010004000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) 20:55:40 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188050f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1414.397417] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:40 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010004800000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1414.397591] bridge0: port 3(team0) entered blocking state [ 1414.397621] bridge0: port 3(team0) entered disabled state [ 1414.398641] device team0 entered promiscuous mode [ 1414.398648] device team_slave_0 entered promiscuous mode [ 1414.398759] device team_slave_1 entered promiscuous mode [ 1414.399982] bridge0: port 3(team0) entered blocking state [ 1414.400015] bridge0: port 3(team0) entered forwarding state 20:55:40 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010004c00000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1414.441583] NILFS (loop3): couldn't find nilfs on the device [ 1414.460758] bond0: team0 is up - this may be due to an out of date ifenslave [ 1414.499342] NILFS (loop3): couldn't find nilfs on the device [ 1414.577705] device team0 left promiscuous mode [ 1414.577725] device team_slave_0 left promiscuous mode [ 1414.580452] bridge0: port 3(team0) entered disabled state [ 1414.617790] NILFS (loop3): couldn't find nilfs on the device 20:55:41 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010006000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1414.756550] NILFS (loop3): couldn't find nilfs on the device [ 1414.959434] NILFS (loop3): couldn't find nilfs on the device [ 1415.018013] bond0: team0 is up - this may be due to an out of date ifenslave [ 1415.050180] device team0 left promiscuous mode [ 1415.057576] device team_slave_0 left promiscuous mode 20:55:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f0000000000), 0x60200, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000040)=0x12) ioctl$TIOCMIWAIT(0xffffffffffffffff, 0x545c, 0x0) r2 = dup2(r0, 0xffffffffffffffff) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000100), &(0x7f0000000140)=0xc) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/igmp\x00') ioctl$TIOCVHANGUP(r4, 0x5437, 0x0) r5 = syz_open_pts(r2, 0x2c8600) ioctl$TIOCSETD(r5, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCSBRK(r5, 0x5409, 0x10000) ioctl$TCFLSH(r5, 0x804c4700, 0x0) [ 1415.077518] device team_slave_1 left promiscuous mode [ 1415.094063] bridge0: port 3(team0) entered disabled state [ 1415.126730] bond0: team0 is up - this may be due to an out of date ifenslave [ 1415.136324] bond0: team0 is up - this may be due to an out of date ifenslave [ 1415.143607] bridge0: port 3(team0) entered blocking state [ 1415.150883] bridge0: port 3(team0) entered disabled state [ 1415.175876] device team0 entered promiscuous mode [ 1415.180760] device team_slave_0 entered promiscuous mode [ 1415.188428] bridge0: port 3(team0) entered blocking state [ 1415.194024] bridge0: port 3(team0) entered forwarding state [ 1415.271579] bridge0: port 3(team0) entered blocking state [ 1415.278664] bridge0: port 3(team0) entered disabled state 20:55:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:41 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1415.336342] device team0 entered promiscuous mode [ 1415.341500] device team_slave_0 entered promiscuous mode [ 1415.344845] NILFS (loop3): couldn't find nilfs on the device 20:55:41 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010886000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1415.403112] device team_slave_1 entered promiscuous mode 20:55:41 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x6) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) syz_open_pts(r1, 0x0) ioctl$TCFLSH(r1, 0x804c4700, 0x0) 20:55:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1415.488398] bridge0: port 3(team0) entered blocking state [ 1415.494056] bridge0: port 3(team0) entered forwarding state [ 1415.505044] bridge0: port 3(team0) entered blocking state [ 1415.516880] bridge0: port 3(team0) entered disabled state [ 1415.526181] device team0 entered promiscuous mode 20:55:41 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:41 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010006800000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1415.559498] NILFS (loop3): couldn't find nilfs on the device [ 1415.576564] device team_slave_0 entered promiscuous mode [ 1415.598754] device team_slave_1 entered promiscuous mode 20:55:41 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40f000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1415.608173] bridge0: port 3(team0) entered blocking state [ 1415.616172] bridge0: port 3(team0) entered forwarding state [ 1415.630076] device team0 left promiscuous mode [ 1415.634849] device team_slave_0 left promiscuous mode [ 1415.662740] bridge0: port 3(team0) entered disabled state [ 1415.688323] NILFS (loop3): couldn't find nilfs on the device [ 1415.705337] bond0: team0 is up - this may be due to an out of date ifenslave 20:55:41 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010006c00000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1415.714624] bridge0: port 3(team0) entered blocking state [ 1415.725917] bridge0: port 3(team0) entered disabled state [ 1415.733915] device team0 entered promiscuous mode [ 1415.745146] device team_slave_0 entered promiscuous mode [ 1415.758155] bridge0: port 3(team0) entered blocking state [ 1415.763827] bridge0: port 3(team0) entered forwarding state [ 1415.773349] device team0 left promiscuous mode [ 1415.778270] device team_slave_0 left promiscuous mode 20:55:41 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0x0, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:42 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010007400000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1415.844286] NILFS (loop3): couldn't find nilfs on the device [ 1415.876479] bridge0: port 3(team0) entered disabled state 20:55:42 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000640)={{0x0, 0x0, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1415.963301] NILFS (loop3): couldn't find nilfs on the device [ 1415.973317] 8021q: adding VLAN 0 to HW filter on device team0 [ 1416.008187] device team0 entered promiscuous mode [ 1416.019659] device team_slave_0 entered promiscuous mode [ 1416.046534] bond0: Enslaving team0 as an active interface with an up link [ 1416.056393] validate_nla: 24 callbacks suppressed [ 1416.056412] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 1416.075382] device team0 left promiscuous mode [ 1416.082281] device team_slave_0 left promiscuous mode [ 1416.087716] NILFS (loop3): couldn't find nilfs on the device 20:55:42 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010007a00000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1416.136206] device team_slave_1 left promiscuous mode [ 1416.146112] bridge0: port 3(team0) entered disabled state [ 1416.174916] bond0: team0 is up - this may be due to an out of date ifenslave [ 1416.196817] NILFS (loop3): couldn't find nilfs on the device [ 1416.199611] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1416.217004] device team0 left promiscuous mode [ 1416.222288] device team_slave_0 left promiscuous mode [ 1416.229095] device team_slave_1 left promiscuous mode [ 1416.237892] bridge0: port 3(team0) entered disabled state 20:55:42 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010ff8000000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1416.248496] NILFS (loop3): couldn't find nilfs on the device [ 1416.255891] bond0: team0 is up - this may be due to an out of date ifenslave [ 1416.263931] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 1416.273786] bond0: Releasing backup interface team0 [ 1416.283417] device team0 left promiscuous mode [ 1416.288372] device team_slave_0 left promiscuous mode [ 1416.345795] NILFS (loop3): couldn't find nilfs on the device [ 1416.391747] bridge0: port 3(team0) entered blocking state [ 1416.399926] bridge0: port 3(team0) entered disabled state [ 1416.410637] device team0 entered promiscuous mode [ 1416.414477] NILFS (loop3): couldn't find nilfs on the device [ 1416.418833] device team_slave_0 entered promiscuous mode [ 1416.431895] netlink: 'syz-executor.0': attribute type 10 has an invalid length. 20:55:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [], 0x0, "0a391feb26db05"}) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) [ 1416.442499] bridge0: port 3(team0) entered blocking state [ 1416.456845] bridge0: port 3(team0) entered disabled state [ 1416.479786] device team0 entered promiscuous mode [ 1416.488215] device team_slave_0 entered promiscuous mode [ 1416.498525] device team_slave_1 entered promiscuous mode [ 1416.529932] bridge0: port 3(team0) entered blocking state [ 1416.535601] bridge0: port 3(team0) entered forwarding state 20:55:42 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, "00000000000000000000000000ddc1517600"}) r1 = syz_open_pts(r0, 0x0) ioctl$TIOCSETD(r1, 0x5423, &(0x7f0000000ac0)=0x15) ioctl$TCFLSH(r1, 0x804c4700, 0x0) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000000)=0x80) 20:55:42 executing program 0: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e5980", 0x40, 0x0, &(0x7f0000000280)={0xa, 0x0, 0x5, @mcast1, 0x7}, 0x1c) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = syz_init_net_socket$ax25(0x3, 0x5, 0x0) close(r1) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0xffffffffffffffff, 0x8, 0x0, 0x1, 0x7ff, 0x200, 0x8, 0x401, 0x80, 0x7, 0x7, 0x7ff, 0x3f, 0x31}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005e4c0)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}], 0x0, "0a391feb26db05"}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3000fa14221d3e6dec34993ba6398acd98534bf815aa8ba46e330dc555"], 0x18) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0), 0x12) 20:55:42 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f000000000000000000100fff00000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1416.551749] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1416.572346] bridge0: port 3(bond0) entered blocking state [ 1416.601765] bridge0: port 3(bond0) entered disabled state [ 1416.627389] device bond0 entered promiscuous mode [ 1416.643755] NILFS (loop3): couldn't find nilfs on the device [ 1416.657109] device bond_slave_0 entered promiscuous mode [ 1416.678654] device bond_slave_1 entered promiscuous mode [ 1416.695689] bridge0: port 3(bond0) entered blocking state [ 1416.701330] bridge0: port 3(bond0) entered forwarding state [ 1416.719747] NILFS (loop3): couldn't find nilfs on the device 20:55:42 executing program 2: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) syz_init_net_socket$ax25(0x3, 0x0, 0x0) close(0xffffffffffffffff) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x18) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef467000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) [ 1416.720815] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1416.743512] device team0 left promiscuous mode 20:55:42 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f0000000000000000001080ff00000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1416.769414] device team_slave_0 left promiscuous mode [ 1416.792978] bridge0: port 3(team0) entered disabled state [ 1416.835040] NILFS (loop3): couldn't find nilfs on the device [ 1416.847885] bond0: team0 is up - this may be due to an out of date ifenslave [ 1416.855716] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1416.869142] bridge0: port 3(team0) entered blocking state [ 1416.883400] bridge0: port 3(team0) entered disabled state [ 1416.895154] NILFS (loop3): couldn't find nilfs on the device 20:55:43 executing program 3: syz_mount_image$nilfs2(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000017200)="0200000000003434180100007a4a79340e8ce88e010000001f00000000000000000010fe0101000002000000000000001000000005000000020000000000000020000000000000000200000000000000b001000000000000561b675f00000000571b675f00000000571b675f000000000100320001000100561b675f00000000004eed0000000000000000000b00000080002000c0001000d5e9c444ac624a73aa02cbe5d9660aa5", 0xa8, 0x800000000ff000}], 0x2000001, &(0x7f0000000880)=ANY=[]) [ 1416.940539] device team0 entered promiscuous mode [ 1416.953645] device team_slave_0 entered promiscuous mode [ 1416.964895] bridge0: port 3(team0) entered blocking state [ 1416.970999] bridge0: port 3(team0) entered forwarding state 20:55:43 executing program 1: socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000500)="3e6544bbdffe5f748a1ff5b0cbc7ab311e9ae19efd34e11ae36264d8026b0a3d6cefa00259f6c13f23d9757fa7dff129d7c6d6901c7442414f4415cbf07e59", 0x3f, 0x0, &(0x7f0000000280)={0xa, 0x4e24, 0x5, @mcast1, 0x7}