, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x3}, 0x42c09, 0x0, 0x4, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:40:07 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x1b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) [ 929.535045][T28246] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 929.572909][T28246] device team0 left promiscuous mode [ 929.603529][T28246] device team_slave_0 left promiscuous mode 06:40:07 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:07 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 929.644543][T28246] device team_slave_1 left promiscuous mode [ 929.657803][T28246] bridge0: port 3(team0) entered disabled state [ 929.704479][T28246] team0: Cannot enslave team device to itself [ 929.730193][T28242] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 929.781139][T28242] @þ: Device ipvlan1 failed to register rx_handler 06:40:07 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:07 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 930.150951][T28252] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 930.171077][T28252] bridge0: port 3(team0) entered blocking state [ 930.202019][T28252] bridge0: port 3(team0) entered disabled state 06:40:07 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100008, 0x500001c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001840)={r5, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x9, 0x4, 0x3, 0x1, 0x0, 0x7, 0x81000, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000100), 0xb8a5e9f6a14f7d37}, 0x4000, 0x90, 0x7, 0x7, 0x4, 0x6, 0x40}, r0, 0x5, r5, 0xa) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x40, 0x84, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x3}, 0x42c09, 0x0, 0x4, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:40:08 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 930.344670][T28252] device team0 entered promiscuous mode [ 930.362180][T28252] device team_slave_0 entered promiscuous mode [ 930.392189][T28252] device team_slave_1 entered promiscuous mode [ 930.415347][T28252] bridge0: port 3(team0) entered blocking state [ 930.421698][T28252] bridge0: port 3(team0) entered forwarding state [ 930.506792][T28269] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 930.577828][T28269] @þ: Device ipvlan1 failed to register rx_handler [ 931.230893][ T3252] ieee802154 phy0 wpan0: encryption failed: -22 [ 931.237448][ T3252] ieee802154 phy1 wpan1: encryption failed: -22 06:40:10 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x7) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000040)) 06:40:10 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:10 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map=r0}, 0x13a3df4637a1a912) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x101) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:10 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:10 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100008, 0x500001c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001840)={r5, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x9, 0x4, 0x3, 0x1, 0x0, 0x7, 0x81000, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000100), 0xb8a5e9f6a14f7d37}, 0x4000, 0x90, 0x7, 0x7, 0x4, 0x6, 0x40}, r0, 0x5, r5, 0xa) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:10 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x1b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) [ 932.580420][T28282] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 932.624556][T28282] device team0 left promiscuous mode [ 932.682266][T28282] device team_slave_0 left promiscuous mode [ 932.698870][T28282] device team_slave_1 left promiscuous mode [ 932.715289][T28282] bridge0: port 3(team0) entered disabled state 06:40:10 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 932.736810][T28282] team0: Cannot enslave team device to itself [ 932.767963][T28286] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 932.847081][T28286] @þ: Device ipvlan1 failed to register rx_handler 06:40:10 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:10 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 933.291817][T28292] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 933.357691][T28292] bridge0: port 3(team0) entered blocking state 06:40:11 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="546038000000530000bc4501d64061204fe0c62852a4d173b670f514bf1dbb104764444c075642166948213cab2463693e25089f002d517647ecada21d56dfc356abe323473ee89c2b19edd4b2880cf3d9a1363973a9ed407c5869de3b9a3828338d0000300a99ebc2d02780d479eee6fbb06bea580b1c2dfd1f12d57bd209000000d8502ee65a035ec0901e749c0667b71b655f320dcf8eca8876a15b8b5c27d385188f75ce821f0e8774e48849edba9f2f4cf38c45983247dd96ffc9e8f4ab6cb2085e38d092bde050536c06ddede8d6cd46dd0365786fec3ef7802309058f094442a551bf3feba8bfdc358ca7eb79e8c048042beef5e100733bfa5600b1f13f9ad363efa38dee03f44fc4a4e26f63054db4038ed4096ea913801c91fb790270df9ea7a2ca6c017f39000000"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100008, 0x500001c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001840)={r5, 0x0, 0x0}, 0x10) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 933.402427][T28292] bridge0: port 3(team0) entered disabled state [ 933.438271][T28292] device team0 entered promiscuous mode [ 933.461787][T28292] device team_slave_0 entered promiscuous mode [ 933.493490][T28292] device team_slave_1 entered promiscuous mode 06:40:11 executing program 5: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 933.524438][T28292] bridge0: port 3(team0) entered blocking state [ 933.530858][T28292] bridge0: port 3(team0) entered forwarding state [ 933.628359][T28309] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 933.740246][T28309] @þ: Device ipvlan1 failed to register rx_handler 06:40:13 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x7) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000040)) 06:40:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map=r0}, 0x13a3df4637a1a912) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x101) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:13 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:13 executing program 5: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:13 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100008, 0x500001c) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:13 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x1b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000040)) [ 935.682254][T28324] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 935.710229][T28324] device team0 left promiscuous mode [ 935.725040][T28324] device team_slave_0 left promiscuous mode [ 935.747534][T28324] device team_slave_1 left promiscuous mode [ 935.773589][T28324] bridge0: port 3(team0) entered disabled state [ 935.821366][T28324] team0: Cannot enslave team device to itself [ 935.846310][T28332] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:40:13 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:13 executing program 5: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 935.889797][T28332] bridge0: port 3(team0) entered blocking state [ 935.912464][T28332] bridge0: port 3(team0) entered disabled state [ 936.000555][T28332] device team0 entered promiscuous mode [ 936.006730][T28332] device team_slave_0 entered promiscuous mode [ 936.036409][T28332] device team_slave_1 entered promiscuous mode [ 936.095832][T28332] bridge0: port 3(team0) entered blocking state [ 936.102236][T28332] bridge0: port 3(team0) entered forwarding state [ 936.133272][T28330] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:13 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map=r0}, 0x13a3df4637a1a912) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x101) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 936.243792][T28330] @þ: Device ipvlan1 failed to register rx_handler 06:40:14 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:14 executing program 5: perf_event_open(&(0x7f00000002c0)={0x0, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:14 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 936.730102][T28346] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 936.744373][T28346] device team0 left promiscuous mode [ 936.766195][T28346] device team_slave_0 left promiscuous mode [ 936.794699][T28346] device team_slave_1 left promiscuous mode [ 936.820932][T28346] bridge0: port 3(team0) entered disabled state [ 937.009340][T28346] team0: Cannot enslave team device to itself [ 937.015896][T28351] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 937.035560][T28351] bridge0: port 3(team0) entered blocking state [ 937.048880][T28351] bridge0: port 3(team0) entered disabled state [ 937.110129][T28351] device team0 entered promiscuous mode [ 937.116007][T28351] device team_slave_0 entered promiscuous mode [ 937.145319][T28351] device team_slave_1 entered promiscuous mode [ 937.170261][T28351] bridge0: port 3(team0) entered blocking state [ 937.177223][T28351] bridge0: port 3(team0) entered forwarding state 06:40:16 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x7) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000040)) 06:40:16 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:16 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="546038000000530000bc4501d64061204fe0c62852a4d173b670f514bf1dbb104764444c075642166948213cab2463693e25089f002d517647ecada21d56dfc356abe323473ee89c2b19edd4b2880cf3d9a1363973a9ed407c5869de3b9a3828338d0000300a99ebc2d02780d479eee6fbb06bea580b1c2dfd1f12d57bd209000000d8502ee65a035ec0901e749c0667b71b655f320dcf8eca8876a15b8b5c27d385188f75ce821f0e8774e48849edba9f2f4cf38c45983247dd96ffc9e8f4ab6cb2085e38d092bde050536c06ddede8d6cd46dd0365786fec3ef7802309058f094442a551bf3feba8bfdc358ca7eb79e8c048042beef5e100733bfa5600b1f13f9ad363efa38dee03f44fc4a4e26f63054db4038ed4096ea913801c91fb790270df9ea7a2ca6c017f39000000"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100008, 0x500001c) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:16 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:16 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map=r0}, 0x13a3df4637a1a912) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x101) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:16 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x1b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000040)) [ 938.862486][T28373] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 938.889186][T28373] device team0 left promiscuous mode [ 938.896857][T28373] device team_slave_0 left promiscuous mode 06:40:16 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 938.917726][T28373] device team_slave_1 left promiscuous mode [ 938.935619][T28373] bridge0: port 3(team0) entered disabled state [ 938.946867][T28373] team0: Cannot enslave team device to itself [ 938.955299][T28371] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:16 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 939.027073][T28371] @þ: Device ipvlan1 failed to register rx_handler 06:40:16 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:16 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:17 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:17 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) [ 939.630806][T28377] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 939.657638][T28377] bridge0: port 3(team0) entered blocking state [ 939.699134][T28377] bridge0: port 3(team0) entered disabled state [ 939.706855][T28377] device team0 entered promiscuous mode [ 939.728975][T28377] device team_slave_0 entered promiscuous mode [ 939.735412][T28377] device team_slave_1 entered promiscuous mode [ 939.759547][T28377] bridge0: port 3(team0) entered blocking state [ 939.765857][T28377] bridge0: port 3(team0) entered forwarding state 06:40:19 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x7) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, 0x0) 06:40:19 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x5, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:19 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:19 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:19 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map=r0}, 0x13a3df4637a1a912) recvmsg$kcm(0xffffffffffffffff, 0x0, 0x101) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:19 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x1b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x0, &(0x7f0000000040)) [ 941.919924][T28408] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 941.992989][T28408] device team0 left promiscuous mode 06:40:19 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x10000, 0x9, 0x0, 0x2, 0x0, 0x120}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 942.029534][T28408] device team_slave_0 left promiscuous mode [ 942.043209][T28408] device team_slave_1 left promiscuous mode [ 942.062705][T28408] bridge0: port 3(team0) entered disabled state [ 942.091223][T28408] team0: Cannot enslave team device to itself [ 942.117231][T28413] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:40:19 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 942.136256][T28413] bridge0: port 3(team0) entered blocking state [ 942.156931][T28413] bridge0: port 3(team0) entered disabled state [ 942.293813][T28413] device team0 entered promiscuous mode [ 942.300106][T28413] device team_slave_0 entered promiscuous mode 06:40:20 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 942.337022][T28413] device team_slave_1 entered promiscuous mode [ 942.406739][T28413] bridge0: port 3(team0) entered blocking state [ 942.414680][T28413] bridge0: port 3(team0) entered forwarding state [ 942.524205][T28409] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:20 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:20 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:20 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) r0 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x10}, 0xc) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map=r0}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 942.585589][T28409] @þ: Device ipvlan1 failed to register rx_handler [ 943.027400][T28432] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 943.043954][T28432] device team0 left promiscuous mode [ 943.056395][T28432] device team_slave_0 left promiscuous mode [ 943.069561][T28432] device team_slave_1 left promiscuous mode [ 943.082791][T28432] bridge0: port 3(team0) entered disabled state [ 943.101786][T28432] team0: Cannot enslave team device to itself [ 943.117877][T28434] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 943.136752][T28434] bridge0: port 3(team0) entered blocking state [ 943.158385][T28434] bridge0: port 3(team0) entered disabled state [ 943.238065][T28434] device team0 entered promiscuous mode [ 943.249889][T28434] device team_slave_0 entered promiscuous mode [ 943.269934][T28434] device team_slave_1 entered promiscuous mode [ 943.300006][T28434] bridge0: port 3(team0) entered blocking state [ 943.306860][T28434] bridge0: port 3(team0) entered forwarding state 06:40:22 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x7) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, 0x0) 06:40:22 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:22 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:22 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="546038000000530000bc4501d64061204fe0c62852a4d173b670f514bf1dbb104764444c075642166948213cab2463693e25089f002d517647ecada21d56dfc356abe323473ee89c2b19edd4b2880cf3d9a1363973a9ed407c5869de3b9a3828338d0000300a99ebc2d02780d479eee6fbb06bea580b1c2dfd1f12d57bd209000000d8502ee65a035ec0901e749c0667b71b655f320dcf8eca8876a15b8b5c27d385188f75ce821f0e8774e48849edba9f2f4cf38c45983247dd96ffc9e8f4ab6cb2085e38d092bde050536c06ddede8d6cd46dd0365786fec3ef7802309058f094442a551bf3feba8bfdc358ca7eb79e8c048042beef5e100733bfa5600b1f13f9ad363efa38dee03f44fc4a4e26f63054db4038ed4096ea913801c91fb790270df9ea7a2ca6c017f39000000"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:22 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x10}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:22 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x1b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, 0x0) [ 944.997687][T28445] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 945.033409][T28445] device team0 left promiscuous mode [ 945.055997][T28445] device team_slave_0 left promiscuous mode [ 945.088572][T28445] device team_slave_1 left promiscuous mode [ 945.094900][T28445] bridge0: port 3(team0) entered disabled state [ 945.131525][T28445] team0: Cannot enslave team device to itself [ 945.154487][T28454] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:40:22 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 945.186750][T28454] bridge0: port 3(team0) entered blocking state [ 945.208249][T28454] bridge0: port 3(team0) entered disabled state 06:40:22 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 945.295742][T28454] device team0 entered promiscuous mode [ 945.310199][T28454] device team_slave_0 entered promiscuous mode [ 945.333307][T28454] device team_slave_1 entered promiscuous mode [ 945.375730][T28454] bridge0: port 3(team0) entered blocking state [ 945.382582][T28454] bridge0: port 3(team0) entered forwarding state [ 945.417062][T28451] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:23 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:23 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x10}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 945.565417][T28451] @þ: Device ipvlan1 failed to register rx_handler 06:40:23 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:23 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 946.011414][T28465] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 946.028799][T28465] device team0 left promiscuous mode [ 946.041963][T28465] device team_slave_0 left promiscuous mode [ 946.061617][T28465] device team_slave_1 left promiscuous mode [ 946.083125][T28465] bridge0: port 3(team0) entered disabled state [ 946.126357][T28465] team0: Cannot enslave team device to itself [ 946.146641][T28467] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 946.189788][T28467] bridge0: port 3(team0) entered blocking state [ 946.223241][T28467] bridge0: port 3(team0) entered disabled state [ 946.353739][T28467] device team0 entered promiscuous mode [ 946.369285][T28467] device team_slave_0 entered promiscuous mode [ 946.386827][T28467] device team_slave_1 entered promiscuous mode [ 946.435987][T28467] bridge0: port 3(team0) entered blocking state [ 946.442360][T28467] bridge0: port 3(team0) entered forwarding state 06:40:25 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x5e}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x7) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, 0x0) 06:40:25 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:25 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:25 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:25 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000000c0)={0x0, 0x0, 0x10}, 0xc) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:25 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x1b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, 0x0) [ 948.192166][T28492] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 948.219236][T28492] device team0 left promiscuous mode 06:40:25 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 948.241670][T28492] device team_slave_0 left promiscuous mode [ 948.261467][T28492] device team_slave_1 left promiscuous mode [ 948.276537][T28492] bridge0: port 3(team0) entered disabled state 06:40:25 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 948.296648][T28492] team0: Cannot enslave team device to itself [ 948.306971][T28489] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 948.340866][T28489] @þ: Device ipvlan1 failed to register rx_handler 06:40:26 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:26 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:26 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:26 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) [ 948.765614][T28496] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 948.785586][T28496] bridge0: port 3(team0) entered blocking state [ 948.813734][T28496] bridge0: port 3(team0) entered disabled state [ 949.014658][T28496] device team0 entered promiscuous mode [ 949.031869][T28496] device team_slave_0 entered promiscuous mode [ 949.057062][T28496] device team_slave_1 entered promiscuous mode [ 949.077966][T28496] bridge0: port 3(team0) entered blocking state [ 949.084376][T28496] bridge0: port 3(team0) entered forwarding state 06:40:28 executing program 2: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x1b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, 0x0) 06:40:28 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="546038000000530000bc4501d64061204fe0c62852a4d173b670f514bf1dbb104764444c075642166948213cab2463693e25089f002d517647ecada21d56dfc356abe323473ee89c2b19edd4b2880cf3d9a1363973a9ed407c5869de3b9a3828338d0000300a99ebc2d02780d479eee6fbb06bea580b1c2dfd1f12d57bd209000000d8502ee65a035ec0901e749c0667b71b655f320dcf8eca8876a15b8b5c27d385188f75ce821f0e8774e48849edba9f2f4cf38c45983247dd96ffc9e8f4ab6cb2085e38d092bde050536c06ddede8d6cd46dd0365786fec3ef7802309058f094442a551bf3feba8bfdc358ca7eb79e8c048042beef5e100733bfa5600b1f13f9ad363efa38dee03f44fc4a4e26f63054db4038ed4096ea913801c91fb790270df9ea7a2ca6c017f39000000"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:28 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:28 executing program 4: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x2da8020000100008, 0x500001c) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001840)={r5, 0x0, 0x0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x3, 0x70, 0x9, 0x4, 0x3, 0x1, 0x0, 0x7, 0x81000, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000100), 0xb8a5e9f6a14f7d37}, 0x4000, 0x90, 0x7, 0x7, 0x4, 0x6, 0x40}, r0, 0x5, r5, 0xa) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x40, 0x84, 0x0, 0x0, 0x202, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x4, 0x3}, 0x42c09, 0x0, 0x4, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="2b72646d61baed202d6d20637075202d637075542b637075200000009d826ebff04157de0f4d6748402e0c03ddfda13f9b90d24f6d845ee3afd48483133f1fa4739a3c6d327049899465b167cd8976fa5e8295d97c38e771fd7cf4a5972b3d489e13f452aba03836fb5ad27a89f9d3f0d9143127f23c11c12e918cc4664dde79ad389403a74d6b001170535b0b8637427848986a7e2618c92539e50c4bfd7b0eee45f55e5269a55684e7d2af60b8428fbab3eae361f826e463a3a337de5f5eeb9c8f54d2cd978797aab2960b1b207dce0db0a1b4b4d262ce6ee00cca3f"], 0x25) 06:40:28 executing program 1: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000), 0x10}, 0x78) bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:28 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r0, &(0x7f0000000000)='threaded\x00', 0x248800) [ 951.313386][T28531] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 951.358445][T28531] device team0 left promiscuous mode 06:40:29 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, 0x0, 0x0) 06:40:29 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 951.382495][T28531] device team_slave_0 left promiscuous mode [ 951.416690][T28531] device team_slave_1 left promiscuous mode [ 951.475833][T28531] bridge0: port 3(team0) entered disabled state [ 951.500082][T28531] team0: Cannot enslave team device to itself 06:40:29 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 951.521548][T28534] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 951.560766][T28534] bridge0: port 3(team0) entered blocking state [ 951.590569][T28534] bridge0: port 3(team0) entered disabled state 06:40:29 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, 0x0, 0x0) 06:40:29 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 951.709407][T28534] device team0 entered promiscuous mode [ 951.736381][T28534] device team_slave_0 entered promiscuous mode [ 951.774805][T28534] device team_slave_1 entered promiscuous mode [ 951.847002][T28534] bridge0: port 3(team0) entered blocking state [ 951.854098][T28534] bridge0: port 3(team0) entered forwarding state 06:40:29 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 951.922510][T28535] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 952.092699][T28535] team0: Device ipvlan1 failed to register rx_handler 06:40:31 executing program 0: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xf, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, 0x0, 0x0) 06:40:31 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:31 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:31 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:31 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x4}, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_int(r3, &(0x7f0000000200)=0x1f00, 0x43408) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x3f, 0x3f, 0x1, 0x0, 0x0, 0x5, 0x1597, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x50844, 0x5, 0x0, 0x4, 0x0, 0xfa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0xc1, 0x81, 0x81, 0x40, 0x0, 0x0, 0x1042, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80a1, 0x0, @perf_config_ext={0x0, 0x5}, 0x1040, 0xd7c, 0x7d, 0x2, 0x7fff, 0x8, 0x5}, r2, 0x3, r2, 0x0) 06:40:31 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 954.323391][T28564] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 954.334173][T28564] device team0 left promiscuous mode [ 954.371630][T28564] device team_slave_0 left promiscuous mode [ 954.424973][T28564] device team_slave_1 left promiscuous mode [ 954.457424][T28564] bridge0: port 3(team0) entered disabled state 06:40:32 executing program 0: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000d00)={0x0, 0x300, &(0x7f0000000bc0)=[{&(0x7f0000002300)=""/4096, 0x7ffff000}, {&(0x7f0000003300)=""/4096, 0x6a00}], 0x2}, 0x0) sendmsg$kcm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000001600)="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", 0xcfa}], 0x1}, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000240)}, {0x0}], 0x2, &(0x7f0000000500)=""/173, 0xad}, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) 06:40:32 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x1, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 954.517970][T28564] team0: Cannot enslave team device to itself [ 954.575093][T28568] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 954.611660][T28568] bridge0: port 3(team0) entered blocking state [ 954.673325][T28568] bridge0: port 3(team0) entered disabled state 06:40:32 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:32 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x4}, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_int(r3, &(0x7f0000000200)=0x1f00, 0x43408) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x3f, 0x3f, 0x1, 0x0, 0x0, 0x5, 0x1597, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x50844, 0x5, 0x0, 0x4, 0x0, 0xfa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0xc1, 0x81, 0x81, 0x40, 0x0, 0x0, 0x1042, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80a1, 0x0, @perf_config_ext={0x0, 0x5}, 0x1040, 0xd7c, 0x7d, 0x2, 0x7fff, 0x8, 0x5}, r2, 0x3, r2, 0x0) [ 954.834463][T28568] device team0 entered promiscuous mode [ 954.871601][T28568] device team_slave_0 entered promiscuous mode [ 954.939611][T28568] device team_slave_1 entered promiscuous mode [ 955.010321][T28568] bridge0: port 3(team0) entered blocking state [ 955.017535][T28568] bridge0: port 3(team0) entered forwarding state [ 955.052567][T28565] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 955.104993][T28565] @þ: Device ipvlan1 failed to register rx_handler 06:40:32 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x0, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:32 executing program 1: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 955.801886][T28579] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. [ 955.826770][T28594] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 955.846200][T28594] device team0 left promiscuous mode 06:40:33 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x0, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:33 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x4}, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_int(r3, &(0x7f0000000200)=0x1f00, 0x43408) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x3f, 0x3f, 0x1, 0x0, 0x0, 0x5, 0x1597, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x50844, 0x5, 0x0, 0x4, 0x0, 0xfa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0xc1, 0x81, 0x81, 0x40, 0x0, 0x0, 0x1042, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80a1, 0x0, @perf_config_ext={0x0, 0x5}, 0x1040, 0xd7c, 0x7d, 0x2, 0x7fff, 0x8, 0x5}, r2, 0x3, r2, 0x0) 06:40:33 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:33 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 955.868860][T28594] device team_slave_0 left promiscuous mode [ 955.884604][T28594] device team_slave_1 left promiscuous mode [ 955.928317][T28594] bridge0: port 3(team0) entered disabled state [ 956.224721][T28594] team0: Cannot enslave team device to itself [ 956.264282][T28598] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:40:34 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={0xffffffffffffffff, 0xc0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)={0x4}, &(0x7f0000000400), 0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0x32600) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cpuset.memory_pressure\x00', 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[], 0xda00) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) write$cgroup_int(r3, &(0x7f0000000200)=0x1f00, 0x43408) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) perf_event_open(&(0x7f0000000340)={0x5, 0x70, 0x3f, 0x3f, 0x1, 0x0, 0x0, 0x5, 0x1597, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000240), 0x9}, 0x50844, 0x5, 0x0, 0x4, 0x0, 0xfa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x70, 0xc1, 0x81, 0x81, 0x40, 0x0, 0x0, 0x1042, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x80a1, 0x0, @perf_config_ext={0x0, 0x5}, 0x1040, 0xd7c, 0x7d, 0x2, 0x7fff, 0x8, 0x5}, r2, 0x3, r2, 0x0) [ 956.278734][T28598] bridge0: port 3(team0) entered blocking state [ 956.304940][T28598] bridge0: port 3(team0) entered disabled state [ 956.355945][T28598] device team0 entered promiscuous mode [ 956.387004][T28598] device team_slave_0 entered promiscuous mode [ 956.402228][T28598] device team_slave_1 entered promiscuous mode [ 956.414717][T28598] bridge0: port 3(team0) entered blocking state [ 956.421136][T28598] bridge0: port 3(team0) entered forwarding state [ 956.449786][T28582] netlink: 3286 bytes leftover after parsing attributes in process `syz-executor.0'. [ 956.473589][T28625] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:34 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x0, 0x0, &(0x7f0000000740)) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:34 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000580)) 06:40:34 executing program 1: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 956.540322][T28625] @þ: Device ipvlan1 failed to register rx_handler 06:40:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:34 executing program 0: capset(&(0x7f0000000000)={0x20071026}, &(0x7f0000000080)) 06:40:34 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:34 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:34 executing program 0: openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000001c0)='devices.deny\x00', 0x2, 0x0) 06:40:35 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='auxv\x00') ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, 0x0) [ 957.374350][T28637] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 957.395571][T28637] device team0 left promiscuous mode 06:40:35 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='auxv\x00') ioctl$RNDADDENTROPY(r0, 0x40085203, 0x0) [ 957.422956][T28637] device team_slave_0 left promiscuous mode 06:40:35 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x12, 0x1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000400)='syzkaller\x00', 0x6, 0x68, &(0x7f0000000440)=""/104, 0x41000, 0x0, [], 0x0, 0x23, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x8, 0x5}, 0x8, 0x10, 0x0}, 0x78) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 957.463978][T28637] device team_slave_1 left promiscuous mode [ 957.479582][T28637] bridge0: port 3(team0) entered disabled state [ 957.719760][T28637] team0: Cannot enslave team device to itself [ 957.752928][T28641] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:40:35 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 957.787470][T28641] bridge0: port 3(team0) entered blocking state [ 957.811589][T28641] bridge0: port 3(team0) entered disabled state 06:40:35 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBLED(r0, 0x5412, 0x0) [ 957.854427][T28641] device team0 entered promiscuous mode [ 957.874518][T28641] device team_slave_0 entered promiscuous mode [ 957.911305][T28641] device team_slave_1 entered promiscuous mode [ 957.946791][T28641] bridge0: port 3(team0) entered blocking state [ 957.953241][T28641] bridge0: port 3(team0) entered forwarding state [ 958.001531][T28664] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:35 executing program 1: bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:35 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff}) recvmmsg(r0, 0x0, 0x0, 0x100, 0x0) 06:40:35 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:35 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000040)=ANY=[], 0x10) [ 958.164204][T28664] @þ: Device ipvlan1 failed to register rx_handler 06:40:35 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:36 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x2, 0x0) write$P9_RWSTAT(r0, 0x0, 0x0) 06:40:36 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff}) recvfrom(r0, &(0x7f0000000180)=""/6, 0x6, 0x0, 0x0, 0x0) 06:40:36 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 958.708017][T28682] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 958.722204][T28682] device team0 left promiscuous mode 06:40:36 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:36 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:36 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000400), 0x0, 0x100, &(0x7f0000000440)={0x77359400}) 06:40:36 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_type(r1, &(0x7f0000000000)='threaded\x00', 0x248800) [ 958.751760][T28682] device team_slave_0 left promiscuous mode [ 958.771851][T28682] device team_slave_1 left promiscuous mode [ 958.834040][T28682] bridge0: port 3(team0) entered disabled state [ 959.037973][T28682] team0: Cannot enslave team device to itself [ 959.056452][T28685] bridge0: port 3(team0) entered blocking state [ 959.081626][T28685] bridge0: port 3(team0) entered disabled state [ 959.160078][T28685] device team0 entered promiscuous mode [ 959.183158][T28685] device team_slave_0 entered promiscuous mode [ 959.214601][T28685] device team_slave_1 entered promiscuous mode [ 959.229740][T28685] bridge0: port 3(team0) entered blocking state [ 959.236254][T28685] bridge0: port 3(team0) entered forwarding state [ 959.280387][T28708] @þ: Device ipvlan1 failed to register rx_handler 06:40:37 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:37 executing program 0: r0 = eventfd2(0x0, 0x0) fsetxattr$system_posix_acl(r0, &(0x7f00000010c0)='system.posix_acl_access\x00', &(0x7f0000001280)=ANY=[], 0x64, 0x0) 06:40:37 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:37 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000000400)=[{{0x0, 0x0, 0x0}}], 0x1, 0x100, &(0x7f0000000440)={0x77359400}) 06:40:37 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff}) sendmmsg$inet(r0, 0x0, 0x0, 0x0) 06:40:37 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 959.957920][T28719] validate_nla: 2 callbacks suppressed [ 959.957940][T28719] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 959.990239][T28719] device team0 left promiscuous mode 06:40:37 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:37 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 06:40:37 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) 06:40:37 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 960.009095][T28719] device team_slave_0 left promiscuous mode [ 960.029347][T28719] device team_slave_1 left promiscuous mode [ 960.069069][T28719] bridge0: port 3(team0) entered disabled state [ 960.319799][T28719] team0: Cannot enslave team device to itself [ 960.366961][T28723] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 960.385311][T28723] bridge0: port 3(team0) entered blocking state [ 960.415062][T28723] bridge0: port 3(team0) entered disabled state [ 960.454238][T28723] device team0 entered promiscuous mode [ 960.465785][T28723] device team_slave_0 entered promiscuous mode [ 960.475952][T28723] device team_slave_1 entered promiscuous mode [ 960.490562][T28723] bridge0: port 3(team0) entered blocking state [ 960.496922][T28723] bridge0: port 3(team0) entered forwarding state 06:40:38 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, 0x0, 0x0) 06:40:38 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, 0x0) 06:40:38 executing program 4: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self\x00', 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0xc0000) [ 960.544916][T28746] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:38 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:38 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 960.608212][T28746] @þ: Device ipvlan1 failed to register rx_handler 06:40:38 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, 0x0, 0x0) 06:40:38 executing program 4: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x0, 0x0) r1 = getuid() fchown(r0, r1, 0xee00) 06:40:38 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x12, &(0x7f0000000200)=[{&(0x7f0000010000)="0042454130310100", 0x8, 0x8000}, {&(0x7f0000010100)="004e5352303301", 0x7, 0x8800}, {0x0}, {&(0x7f0000010300)="0100030012000100cbf1f001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e757855444600"/107, 0x6b, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1643092d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="00000000000000000100000000000000000000000000000000000000000000000600030061000100fd10e8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e757855444600", 0x7e, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200002000000000000000000000004000000001000000002a4c696e7578205544464653000000000000000000000004050000000000", 0x6f, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e0102040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500030033000100cd0af001620000000500000001000000002b4e5352303300"/142, 0x8e, 0xc3a0}, {&(0x7f0000010800)}, {0x0, 0x0, 0xc600}, {0x0}, {&(0x7f0000011100)="02000300fe0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011300)}, {&(0x7f0000011400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00OSTA Compressed Unicode\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\bLinuxUDF\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\bCopyright\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\bAbstract', 0x99, 0xa80e0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000013500)) [ 960.986135][T28767] loop0: detected capacity change from 0 to 2688 [ 961.059008][T28767] UDF-fs: warning (device loop0): udf_load_logicalvol: Damaged or missing LVID, forcing readonly mount [ 961.421163][T28759] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 961.437498][T28759] device team0 left promiscuous mode [ 961.459168][T28759] device team_slave_0 left promiscuous mode 06:40:39 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) r0 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000240)='.^\xc5', 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) socket$nl_xfrm(0x10, 0x3, 0x6) 06:40:39 executing program 5: perf_event_open(&(0x7f00000002c0)={0x2, 0x70, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) socketpair(0x0, 0x1, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_type(r1, 0x0, 0x0) 06:40:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x12, &(0x7f0000000200)=[{&(0x7f0000010000)="0042454130310100", 0x8, 0x8000}, {&(0x7f0000010100)="004e5352303301", 0x7, 0x8800}, {0x0}, {&(0x7f0000010300)="0100030012000100cbf1f001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e757855444600"/107, 0x6b, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1643092d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="00000000000000000100000000000000000000000000000000000000000000000600030061000100fd10e8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e757855444600", 0x7e, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200002000000000000000000000004000000001000000002a4c696e7578205544464653000000000000000000000004050000000000", 0x6f, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e0102040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500030033000100cd0af001620000000500000001000000002b4e5352303300"/142, 0x8e, 0xc3a0}, {&(0x7f0000010800)}, {0x0, 0x0, 0xc600}, {0x0}, {&(0x7f0000011100)="02000300fe0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011300)}, {&(0x7f0000011400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00OSTA Compressed Unicode\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\bLinuxUDF\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\bCopyright\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\bAbstract', 0x99, 0xa80e0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000013500)) [ 961.472484][T28759] device team_slave_1 left promiscuous mode [ 961.488912][T28759] bridge0: port 3(team0) entered disabled state [ 961.545339][T28759] team0: Cannot enslave team device to itself [ 961.577731][T28760] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 961.598331][T28760] bridge0: port 3(team0) entered blocking state [ 961.614398][T28760] bridge0: port 3(team0) entered disabled state [ 961.630598][T28760] device team0 entered promiscuous mode 06:40:39 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x12, &(0x7f0000000200)=[{&(0x7f0000010000)="0042454130310100", 0x8, 0x8000}, {&(0x7f0000010100)="004e5352303301", 0x7, 0x8800}, {0x0}, {&(0x7f0000010300)="0100030012000100cbf1f001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e757855444600"/107, 0x6b, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1643092d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="00000000000000000100000000000000000000000000000000000000000000000600030061000100fd10e8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e757855444600", 0x7e, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200002000000000000000000000004000000001000000002a4c696e7578205544464653000000000000000000000004050000000000", 0x6f, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e0102040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500030033000100cd0af001620000000500000001000000002b4e5352303300"/142, 0x8e, 0xc3a0}, {&(0x7f0000010800)}, {0x0, 0x0, 0xc600}, {0x0}, {&(0x7f0000011100)="02000300fe0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011300)}, {&(0x7f0000011400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00OSTA Compressed Unicode\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\bLinuxUDF\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\bCopyright\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\bAbstract', 0x99, 0xa80e0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000013500)) [ 961.645922][T28760] device team_slave_0 entered promiscuous mode [ 961.660913][T28760] device team_slave_1 entered promiscuous mode [ 961.676093][T28760] bridge0: port 3(team0) entered blocking state [ 961.682514][T28760] bridge0: port 3(team0) entered forwarding state 06:40:39 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 961.974850][T28801] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:40:39 executing program 5: syz_genetlink_get_family_id$ieee802154(&(0x7f0000000140)='802.15.4 MAC\x00', 0xffffffffffffffff) prctl$PR_CAPBSET_DROP(0x18, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_STATS(r0, &(0x7f0000000d00)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000cc0)={&(0x7f0000000c80)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000001fc0)='batadv\x00', 0xffffffffffffffff) [ 962.022333][T28801] device team0 left promiscuous mode [ 962.055869][T28801] device team_slave_0 left promiscuous mode 06:40:39 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:39 executing program 4: syz_open_procfs(0x0, &(0x7f0000000540)='net/psched\x00') [ 962.080647][T28798] loop0: detected capacity change from 0 to 2688 [ 962.109275][T28801] device team_slave_1 left promiscuous mode [ 962.139218][T28798] UDF-fs: warning (device loop0): udf_load_logicalvol: Damaged or missing LVID, forcing readonly mount [ 962.164596][T28801] bridge0: port 3(team0) entered disabled state 06:40:39 executing program 5: syz_genetlink_get_family_id$gtp(&(0x7f0000000a00)='gtp\x00', 0xffffffffffffffff) [ 962.250040][T28801] team0: Cannot enslave team device to itself [ 962.256704][T28797] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 962.290630][T28797] @þ: Device ipvlan1 failed to register rx_handler 06:40:40 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000340)='./cgroup/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:40 executing program 4: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x183100, 0x0) io_setup(0x0, 0x0) syz_mount_image$tmpfs(0x0, &(0x7f0000000c40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) openat$bsg(0xffffffffffffff9c, &(0x7f0000001380)='/dev/bsg\x00', 0x0, 0x0) 06:40:40 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$udf(&(0x7f0000000000)='udf\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x12, &(0x7f0000000200)=[{&(0x7f0000010000)="0042454130310100", 0x8, 0x8000}, {&(0x7f0000010100)="004e5352303301", 0x7, 0x8800}, {0x0}, {&(0x7f0000010300)="0100030012000100cbf1f001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e757855444600"/107, 0x6b, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1643092d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="00000000000000000100000000000000000000000000000000000000000000000600030061000100fd10e8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e757855444600", 0x7e, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200002000000000000000000000004000000001000000002a4c696e7578205544464653000000000000000000000004050000000000", 0x6f, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e0102040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500030033000100cd0af001620000000500000001000000002b4e5352303300"/142, 0x8e, 0xc3a0}, {&(0x7f0000010800)}, {0x0, 0x0, 0xc600}, {0x0}, {&(0x7f0000011100)="02000300fe0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011300)}, {&(0x7f0000011400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\x00OSTA Compressed Unicode\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\bLinuxUDF\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\t\bCopyright\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\n\bAbstract', 0x99, 0xa80e0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000013500)) 06:40:40 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) 06:40:40 executing program 5: msgrcv(0x0, 0x0, 0x4e, 0x0, 0x800) [ 962.887474][T28802] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 962.947092][T28802] bridge0: port 3(team0) entered blocking state [ 962.977580][T28802] bridge0: port 3(team0) entered disabled state 06:40:40 executing program 4: r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) socket$netlink(0x10, 0x3, 0x0) request_key(&(0x7f0000000400)='rxrpc_s\x00', &(0x7f0000000440)={'syz', 0x0}, &(0x7f0000000480)='\\/(]\x00', r0) [ 963.019416][T28802] device team0 entered promiscuous mode [ 963.026503][T28832] loop0: detected capacity change from 0 to 2688 [ 963.063203][T28802] device team_slave_0 entered promiscuous mode [ 963.130726][T28832] UDF-fs: warning (device loop0): udf_load_logicalvol: Damaged or missing LVID, forcing readonly mount [ 963.148866][T28802] device team_slave_1 entered promiscuous mode [ 963.197857][T28802] bridge0: port 3(team0) entered blocking state [ 963.204376][T28802] bridge0: port 3(team0) entered forwarding state [ 963.244504][T28837] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:41 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:41 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x4e20, @multicast2}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_retopts={{0x20000010}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @private}}}, @ip_ttl={{0x14}}, @ip_retopts={{0x18, 0x0, 0x7, {[@end, @timestamp_prespec={0x44, 0x4}]}}}, @ip_tos_u8={{0x11}}], 0x78}, 0x0) 06:40:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) 06:40:41 executing program 4: setrlimit(0xb, &(0x7f0000000040)={0x0, 0x8001}) [ 963.293531][T28837] @þ: Device ipvlan1 failed to register rx_handler 06:40:41 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x18, 0x1}, 0x40) 06:40:41 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@jmp={0x5, 0x0, 0x7}]}, &(0x7f0000000080)='syzkaller\x00', 0x2, 0x92, &(0x7f00000000c0)=""/146, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:40:41 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) 06:40:41 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000180)='/dev/binder#\x00', 0x0, 0x800) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000400)={0x48, 0x0, &(0x7f0000000340)=[@reply={0x40406301, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, @register_looper], 0x4, 0x0, &(0x7f00000003c0)="890d509c"}) 06:40:41 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x24, 0x4, 0x8, 0x101, 0x0, 0x0, {}, [@CTA_TIMEOUT_L4PROTO={0x5}, @CTA_TIMEOUT_L3PROTO={0x6}]}, 0x24}}, 0x0) 06:40:41 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8000000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r3, 0x2402, 0xe43) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:41 executing program 4: socketpair(0x1d, 0x0, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, &(0x7f0000000200)=@generic={0x1}) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, &(0x7f0000000100)) socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x6b, 0x0, 0x0, 0x0, 0x0, 0x0, 'syz0\x00'}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) sendmsg$TIPC_NL_SOCK_GET(0xffffffffffffffff, 0x0, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000001200)) [ 964.041337][T28852] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 964.072248][T28852] device team0 left promiscuous mode [ 964.115848][T28852] device team_slave_0 left promiscuous mode [ 964.155541][T28852] device team_slave_1 left promiscuous mode [ 964.190427][T28865] can: request_module (can-proto-0) failed. [ 964.195983][T28852] bridge0: port 3(team0) entered disabled state 06:40:41 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @private2}}}, &(0x7f0000000200)=0x98) [ 964.319084][T28865] can: request_module (can-proto-0) failed. [ 964.396115][T28852] team0: Cannot enslave team device to itself [ 964.420939][T28853] bridge0: port 3(team0) entered blocking state [ 964.442246][T28853] bridge0: port 3(team0) entered disabled state [ 964.478329][T28853] device team0 entered promiscuous mode [ 964.513450][T28853] device team_slave_0 entered promiscuous mode [ 964.524079][T28853] device team_slave_1 entered promiscuous mode [ 964.541482][T28853] bridge0: port 3(team0) entered blocking state [ 964.547994][T28853] bridge0: port 3(team0) entered forwarding state 06:40:42 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:42 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 06:40:42 executing program 4: socketpair(0xa, 0x3, 0x0, &(0x7f00000002c0)) 06:40:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:42 executing program 0: syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0xeb, {0x7, 0x25, 0x1, 0x0, 0x0, 0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x3f7, 0x0, 0x0, 0x0, {0x7, 0x25, 0x1, 0x81, 0x0, 0xfffe}}}}}}}]}}, &(0x7f0000000400)={0x0, 0x0, 0x26, &(0x7f0000000100)={0x5, 0xf, 0x26, 0x3, [@ss_container_id={0x14, 0x10, 0x4, 0x0, "0888b9b3e8519c94d7b8e12ad4bf42fc"}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x0, 0x9, 0x40}, @ptm_cap={0x3}]}, 0x2, [{0x2, &(0x7f0000000180)=@string={0x2}}, {0x0, 0x0}]}) [ 964.591775][T28881] @þ: Device ipvlan1 failed to register rx_handler 06:40:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x77, 0x0, 0x0) 06:40:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:42 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000100), &(0x7f0000000140)=0x30) [ 964.937161][ T9730] usb 1-1: new high-speed USB device number 8 using dummy_hcd 06:40:42 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x75, 0x0, 0x0) [ 965.176842][ T9730] usb 1-1: Using ep0 maxpacket: 32 [ 965.227441][T28895] validate_nla: 2 callbacks suppressed [ 965.227460][T28895] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 965.263429][T28895] device team0 left promiscuous mode 06:40:42 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) perf_event_open(0x0, 0x0, 0x0, r2, 0xb) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xe43) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:42 executing program 4: socketpair(0xa, 0x6, 0x0, &(0x7f0000001200)) 06:40:42 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 965.272842][T28895] device team_slave_0 left promiscuous mode [ 965.283878][T28895] device team_slave_1 left promiscuous mode [ 965.294594][T28895] bridge0: port 3(team0) entered disabled state [ 965.317003][ T9730] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 965.325730][ T9730] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 965.360181][ T9730] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 965.437050][ T9730] usb 1-1: language id specifier not provided by device, defaulting to English [ 965.500923][T28895] team0: Cannot enslave team device to itself [ 965.523989][T28898] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 965.555385][T28898] bridge0: port 3(team0) entered blocking state [ 965.585380][T28898] bridge0: port 3(team0) entered disabled state [ 965.608344][T28898] device team0 entered promiscuous mode [ 965.613931][T28898] device team_slave_0 entered promiscuous mode [ 965.636825][T28898] device team_slave_1 entered promiscuous mode [ 965.643760][T28898] bridge0: port 3(team0) entered blocking state [ 965.650359][T28898] bridge0: port 3(team0) entered forwarding state 06:40:43 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}, {0x0}], 0x4, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:43 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x4, 0x0, 0x0) 06:40:43 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, 0x0, &(0x7f00000000c0)) 06:40:43 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 965.677044][T28921] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 965.690140][T28921] @þ: Device ipvlan1 failed to register rx_handler [ 965.837108][ T9730] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 965.857692][ T9730] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 965.880871][ T9730] usb 1-1: Product: syz [ 965.885264][ T9730] usb 1-1: SerialNumber: syz [ 966.140159][T28931] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 966.161422][T28931] device team0 left promiscuous mode [ 966.176847][T28931] device team_slave_0 left promiscuous mode [ 966.213771][T28931] device team_slave_1 left promiscuous mode [ 966.246983][ T9730] usb 1-1: 0:2 : does not exist [ 966.282681][T28931] bridge0: port 3(team0) entered disabled state [ 966.299346][ T9730] usb 1-1: USB disconnect, device number 8 [ 966.593989][T28931] team0: Cannot enslave team device to itself [ 966.605081][T28934] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 966.618460][T28934] bridge0: port 3(team0) entered blocking state [ 966.626307][T28934] bridge0: port 3(team0) entered disabled state [ 966.691214][T28934] device team0 entered promiscuous mode [ 966.717053][T28934] device team_slave_0 entered promiscuous mode [ 966.723587][T28934] device team_slave_1 entered promiscuous mode [ 966.741856][T28934] bridge0: port 3(team0) entered blocking state [ 966.748247][T28934] bridge0: port 3(team0) entered forwarding state [ 966.937260][ T9730] usb 1-1: new high-speed USB device number 9 using dummy_hcd [ 967.226692][ T9730] usb 1-1: Using ep0 maxpacket: 32 [ 967.367539][ T9730] usb 1-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 967.381928][ T9730] usb 1-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 967.392408][ T9730] usb 1-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 967.446822][ T9730] usb 1-1: language id specifier not provided by device, defaulting to English 06:40:45 executing program 0: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000080)={0xb, {'syz1\x00', 'syz1\x00', 'syz1\x00'}}, 0x118) 06:40:45 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, 0x0, 0x0, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:45 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000580)={0x34, 0x6, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}]}, 0x34}}, 0x0) 06:40:45 executing program 5: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0x10, 0x0, &(0x7f0000000180)) 06:40:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:45 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x4, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x6, 0x103, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc87, 0x1, @perf_bp={&(0x7f0000000080), 0x2}, 0x40, 0x1, 0x8e82e91e, 0x9, 0x0, 0x7}, r0, 0x0, r1, 0xa) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xe43) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 967.736649][ T9730] usb 1-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 967.745742][ T9730] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 967.783424][ T9730] usb 1-1: Product: syz [ 967.791493][T28964] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:40:45 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x1c, 0xd, 0x6, 0x3, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 06:40:45 executing program 4: socketpair(0x1d, 0x80000, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(0x0, 0xffffffffffffffff) accept4(0xffffffffffffffff, 0x0, 0x0, 0x1000) ioctl$sock_SIOCSIFBR(0xffffffffffffffff, 0x8941, 0x0) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) socket$l2tp6(0xa, 0x2, 0x73) [ 967.827278][T28964] device team0 left promiscuous mode [ 967.837654][ T9730] usb 1-1: can't set config #1, error -71 [ 967.876236][T28964] device team_slave_0 left promiscuous mode [ 967.888443][ T9730] usb 1-1: USB disconnect, device number 9 [ 967.907832][T28964] device team_slave_1 left promiscuous mode 06:40:45 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 967.938874][T28964] bridge0: port 3(team0) entered disabled state [ 967.965072][T28964] team0: Cannot enslave team device to itself [ 967.979290][T28966] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:45 executing program 0: r0 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000000)={0x41}, 0x10) bind$tipc(r0, 0x0, 0x0) [ 968.000469][T28966] @þ: Device ipvlan1 failed to register rx_handler 06:40:45 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x40002060) 06:40:45 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x2) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x4}, 0x1c) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='loginuid\x00') sendfile(r0, r1, 0x0, 0xedc0) 06:40:45 executing program 0: r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x3, &(0x7f0000000140)={&(0x7f0000000000)=""/116}, 0x20) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f00000000c0)=0x20001, 0x4) [ 968.475941][T28970] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 968.490050][T28970] bridge0: port 3(team0) entered blocking state [ 968.526857][T28970] bridge0: port 3(team0) entered disabled state [ 968.567497][T28970] device team0 entered promiscuous mode [ 968.573200][T28970] device team_slave_0 entered promiscuous mode [ 968.596579][T28970] device team_slave_1 entered promiscuous mode [ 968.597122][T28970] bridge0: port 3(team0) entered blocking state [ 968.609262][T28970] bridge0: port 3(team0) entered forwarding state 06:40:46 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_PARAMS(r0, 0xc2604111, 0x0) 06:40:46 executing program 2: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 06:40:46 executing program 5: mkdir(&(0x7f00000003c0)='./bus\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) mknod(&(0x7f00000002c0)='./bus/file0\x00', 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000140)='./bus/file0\x00', &(0x7f0000000180)='system.posix_acl_access\x00', &(0x7f0000000300)={{}, {}, [{}]}, 0x2c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) mount$overlay(0x400002, &(0x7f00000000c0)='./bus\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='upperdir=./file1,lowerdir=./bus,workdir=./file0,nfs_export=on']) unlink(&(0x7f0000000000)='./bus/file0\x00') 06:40:46 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000010c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@union={0x0, 0x0, 0x2}]}}, &(0x7f00000000c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 06:40:46 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, 0x0, 0x0, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:46 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) write$cgroup_subtree(r1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xe43) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 968.758301][T29007] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x6, 0x0, &(0x7f00000010c0)) 06:40:46 executing program 2: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 06:40:46 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r1) [ 968.822748][T29007] @þ: Device ipvlan1 failed to register rx_handler [ 968.903357][T29012] overlayfs: upperdir is in-use as upperdir/workdir of another mount, mount with '-o index=off' to override exclusive upperdir protection. 06:40:46 executing program 5: add_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'syz', 0x1}, &(0x7f0000000080)="92", 0x1, 0xffffffffffffffff) 06:40:46 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x200001, 0x4) 06:40:46 executing program 2: ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40305829, &(0x7f0000000040)) 06:40:46 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8910, &(0x7f0000000100)={'team0\x00'}) 06:40:46 executing program 0: getpriority(0xfee44a2b039dd361, 0x0) 06:40:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:47 executing program 0: openat$pidfd(0xffffff9c, &(0x7f00000000c0)='/proc/self\x00', 0x105e40, 0x0) [ 969.414010][T29011] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 969.439870][T29011] device team0 left promiscuous mode [ 969.471338][T29011] device team_slave_0 left promiscuous mode [ 969.501666][T29011] device team_slave_1 left promiscuous mode [ 969.527773][T29011] bridge0: port 3(team0) entered disabled state [ 969.758767][T29011] team0: Cannot enslave team device to itself [ 969.765065][T29013] bridge0: port 3(team0) entered blocking state [ 969.778927][T29013] bridge0: port 3(team0) entered disabled state [ 969.797082][T29013] device team0 entered promiscuous mode 06:40:47 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, 0x0, 0x0, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8910, &(0x7f0000000100)={'team0\x00'}) 06:40:47 executing program 5: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$AUDIT_GET(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:40:47 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000440)='cpuacct.usage_percpu\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xe43) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:47 executing program 0: r0 = openat$vnet(0xffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0xaf01, 0x0) [ 969.809469][T29013] device team_slave_0 entered promiscuous mode [ 969.818201][T29013] device team_slave_1 entered promiscuous mode [ 969.825084][T29013] bridge0: port 3(team0) entered blocking state [ 969.831463][T29013] bridge0: port 3(team0) entered forwarding state 06:40:47 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000000), &(0x7f0000000040)) [ 969.950993][T29050] @þ: Device ipvlan1 failed to register rx_handler 06:40:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:47 executing program 0: r0 = openat$vnet(0xffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0xaf01, 0x0) 06:40:47 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8910, &(0x7f0000000100)={'team0\x00'}) 06:40:47 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:47 executing program 5: r0 = perf_event_open$cgroup(&(0x7f00000004c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80042407, &(0x7f0000000000)) [ 970.487327][T29054] validate_nla: 2 callbacks suppressed [ 970.487347][T29054] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 970.523472][T29054] device team0 left promiscuous mode [ 970.554318][T29054] device team_slave_0 left promiscuous mode [ 970.576708][T29054] device team_slave_1 left promiscuous mode [ 970.596683][T29054] bridge0: port 3(team0) entered disabled state [ 970.678730][T29054] team0: Cannot enslave team device to itself [ 970.685342][T29057] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 970.710541][T29057] bridge0: port 3(team0) entered blocking state [ 970.722725][T29057] bridge0: port 3(team0) entered disabled state 06:40:48 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}], 0x3, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:48 executing program 0: r0 = openat$vnet(0xffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0xaf01, 0x0) 06:40:48 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000100)={'team0\x00'}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8910, &(0x7f0000000100)={'team0\x00'}) 06:40:48 executing program 5: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vim2m\x00', 0x2, 0x0) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000080)={0x0, 0x7, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "814eee69"}, 0x0, 0x0, @fd}) 06:40:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:48 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x3, 0x70, 0x4, 0x0, 0xff, 0x1, 0x0, 0x9c, 0x34, 0xe, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0xff, 0x0, @perf_bp={0x0}, 0x2a0, 0xffffffffffffffff, 0x38, 0x0, 0x401, 0x2, 0x3ff}, 0x0, 0xd, 0xffffffffffffffff, 0x3) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xe43) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 970.790583][T29057] device team0 entered promiscuous mode [ 970.798030][T29057] device team_slave_0 entered promiscuous mode [ 970.807121][T29057] device team_slave_1 entered promiscuous mode [ 970.814481][T29057] bridge0: port 3(team0) entered blocking state [ 970.820846][T29057] bridge0: port 3(team0) entered forwarding state [ 970.937057][T29085] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:48 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) 06:40:48 executing program 0: r0 = openat$vnet(0xffffff9c, &(0x7f0000000040)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_ADDR(r0, 0xaf01, 0x0) [ 970.992926][T29085] @þ: Device ipvlan1 failed to register rx_handler 06:40:48 executing program 5: bpf$MAP_CREATE(0xe, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 06:40:48 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:48 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0)='nl80211\x00', 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000200)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x15}]}, 0x24}}, 0x0) 06:40:48 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) [ 971.517420][T29088] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 971.541304][T29088] device team0 left promiscuous mode [ 971.566434][T29088] device team_slave_0 left promiscuous mode [ 971.581709][T29088] device team_slave_1 left promiscuous mode [ 971.614537][T29088] bridge0: port 3(team0) entered disabled state [ 971.634933][T29088] team0: Cannot enslave team device to itself [ 971.648327][T29090] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 971.665646][T29090] bridge0: port 3(team0) entered blocking state [ 971.681334][T29090] bridge0: port 3(team0) entered disabled state [ 971.734714][T29090] device team0 entered promiscuous mode [ 971.749506][T29090] device team_slave_0 entered promiscuous mode [ 971.764032][T29090] device team_slave_1 entered promiscuous mode [ 971.790503][T29090] bridge0: port 3(team0) entered blocking state [ 971.797374][T29090] bridge0: port 3(team0) entered forwarding state 06:40:49 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}], 0x3, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:49 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f00000006c0)={'filter\x00', 0x7, 0x2, 0x3f0, 0x110, 0x220, 0x110, 0x308, 0x308, 0x308, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@link_local, @mac=@dev, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}}}, {{@arp={@empty, @loopback, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth1_macvtap\x00', 'veth0_to_hsr\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@broadcast, @mac=@multicast, @dev, @remote}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffb}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x440) 06:40:49 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) 06:40:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:49 executing program 3: r0 = getpid() perf_event_open(0x0, 0x0, 0x7, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xe43) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:49 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xa, 0x7, 0xd7, 0x3}, 0x40) bpf$MAP_UPDATE_ELEM(0x3, &(0x7f0000000140)={r0, 0x0, 0x0}, 0x20) [ 971.947359][T29114] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 971.995562][T29114] @þ: Device ipvlan1 failed to register rx_handler 06:40:49 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:49 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) getsockopt$IP_VS_SO_GET_SERVICE(r0, 0x0, 0x483, 0x0, 0x0) 06:40:49 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000600)={@local, @random="00801000", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x5, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}}}}}, 0x0) 06:40:49 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x9, 0x4, &(0x7f0000000080)=@framed={{}, [@generic={0xc}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:40:49 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$sock(r0, &(0x7f0000002940)=[{{&(0x7f0000000000)=@l2tp={0x2, 0x0, @private=0xa010102}, 0x80, &(0x7f0000002540)=[{&(0x7f0000000080)="b707fc3766fffd58a57b1735d1b28adcabba0fb7b48184b664a8017d1b4f86e43fc38e31540c3bf8121bdf7f233d7903c7a4f855281bd1ca4e6fc028222f291e848eebb65ed9819c7047d278214ddf0898d477c8ae90a60026a5ed257660656512cdac578eb70631b3cc281ad4850abef5a288618dc1d5340fa70de9a5696ad7cd600c261d25ab65bcd2213eb7d04ba58d362e2c27af036b7fcb104a988a2fd52dc4675c2b959b31a6fc", 0xaa}, {&(0x7f0000000140)="17c9e890ef7bd79eadc037c03a4d1294c48965566877cd066ad69375a17267024ebf546f7b28a0de2acf1f4b384f304cfa3686fc87a5c6c5b2ef5ef3b8b40552c2385303fc8bcc9c750d1c713565d80e461cc263ebd017705be9aee8b319d31986ec7011b5d25655f752121969ce24c2f8663279dfb3874c67cb1761a8627f", 0x7f}, {&(0x7f00000001c0)="ff877d707d0e5e63ae80f41f2f47da7a1037f090691e404eda1f62ff358902751bdcf32bf27e8b17f2abee229350c052183e58b100a2e74cb2d48dd255a0ff17dc66d548aa66b8b510f1980f619a909930468d2bd520ecea0c0359251a35cf11c7a2860939168513fa4b3d6559c59b72a7e88f99069fd4d99775b4f34641daf0b9577ce26efb7140df7d7d8a82f8bbe6837d23bcfbf57a8f7a76575063f2fa2828cc0f1634646a5c3bb666738d2038a2ae1ac6d82d6d2df702f84779ff1c42e7c3cd22111ec640681c7529276cd2154e2cb3b68a3fd12bf40dea7601397ec96157ac4fa93a5aa44126de914e5646aae12a964c08e7b8fdc089601409c00bf997d124614d92f44054ad3a79b699166598fc4e668f540561a09ca035b3d25d2bcebe539efaa6b9c012b128e772c63002ac2d23d92a92f17be4bc6ec224f345da9cfdd24d106681279eb05bd50aeea527e456a0f4069cb6a2b1c82cd118329e139460d53fe353f0f1b6397cc48148495fed96558d3c6813982283411db687a6a4a30b7b6058489746d5003c62da6aa7a63f038604d3702501a3f3aca5975f07037adc2506844abccbaf9f228340f6cd5dd2f689d935345a0fcf180dd7a52a5d6bdd30e549f200dd719876ce0891128a4b171588357e3cb461720e195864a6839bfedf1c2f8d28ec9262b448378895fd082fb7bf241db0a53137b6c750f950a405fe50a5bfece611871c0cc2b04455ba427f9358ca281345e39e4765ef7f095c4fb99cf9d9332bca127d11d1060dc2187aee32aa23b56a01a36efb6442ba8c4c1c73bee2f52f8089448dfd263ce6e7ebab0d16dc86d55ccd4d3fff59be557baa87266cd4107215fb1a5032bc4c005f0c1824cb5065a801933eccd69c7bf90b4abf7aca8a8180bbf42a8acd7263b00647f8bde1642d61fa2fe3f9a98d0fb77a6abf83a6d9cfae3a29db12958cbb0731efa134c06951dba536a7d7b3f8489e76c5df24757c92134cb96d091a5673316bc5d012c6c07f5092d5b7090d2bc14fd2ed7b056f916aa47aaef440ef8ca4da5d626a1f7b03d92a83a37b0cd90c989a7b8f2531fcc6d559811a016ced1d3ade198947b419177eec5a14098915543cb06097a1054db66ae9ee53ad0014708c5b511eaa7c6d5283180457bf1f6788d3408b8b79d29b81545e100e43c94c8db29800362e46090aeadde77e4acdee112ffcf2e0827c32772a18ca9d21fb797910576be1438474d2636577769bb6f167701e5e8bdad777694b0c62c1a6eff5bd0e422a0ef7ec9ea3b4137136d8e7f88f9657f6e1e4f68f2f7493e322cd94547f97fd5da24e16239be06c65dcdaa43e66a4ed", 0x3bc}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0) [ 972.583638][T29121] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 972.606748][T29121] device team0 left promiscuous mode [ 972.635370][T29121] device team_slave_0 left promiscuous mode [ 972.663144][T29121] device team_slave_1 left promiscuous mode [ 972.681020][T29121] bridge0: port 3(team0) entered disabled state [ 972.705744][T29121] team0: Cannot enslave team device to itself [ 972.722559][T29124] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 972.740528][T29124] bridge0: port 3(team0) entered blocking state [ 972.760160][T29124] bridge0: port 3(team0) entered disabled state [ 972.858150][T29124] device team0 entered promiscuous mode [ 972.869536][T29124] device team_slave_0 entered promiscuous mode [ 972.884150][T29124] device team_slave_1 entered promiscuous mode 06:40:50 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}], 0x3, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:50 executing program 5: pipe(&(0x7f0000001b40)={0xffffffffffffffff}) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) 06:40:50 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:50 executing program 3: r0 = getpid() ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xe43) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 972.903882][T29124] bridge0: port 3(team0) entered blocking state [ 972.910388][T29124] bridge0: port 3(team0) entered forwarding state [ 973.022310][T29148] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:50 executing program 5: r0 = socket$nl_crypto(0x10, 0x3, 0x15) sendmsg$netlink(r0, &(0x7f000000c480)={0x0, 0x0, 0x0}, 0x0) [ 973.067637][T29148] @þ: Device ipvlan1 failed to register rx_handler 06:40:50 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:50 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000440)={0x0, 0x0}) 06:40:51 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000740)=@delchain={0x24, 0x65, 0x1}, 0x24}}, 0x0) 06:40:51 executing program 5: io_setup(0x39, &(0x7f0000000000)=0x0) r1 = eventfd(0x0) io_submit(r0, 0x1, &(0x7f0000001440)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 06:40:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) [ 973.644803][T29151] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 973.671648][T29151] device team0 left promiscuous mode [ 973.699844][T29151] device team_slave_0 left promiscuous mode [ 973.735364][T29151] device team_slave_1 left promiscuous mode [ 973.757996][T29151] bridge0: port 3(team0) entered disabled state [ 973.989458][T29151] team0: Cannot enslave team device to itself [ 973.995721][T29153] bridge0: port 3(team0) entered blocking state [ 974.004528][T29153] bridge0: port 3(team0) entered disabled state [ 974.036155][T29153] device team0 entered promiscuous mode [ 974.056181][T29153] device team_slave_0 entered promiscuous mode [ 974.077887][T29153] device team_slave_1 entered promiscuous mode [ 974.092292][T29153] bridge0: port 3(team0) entered blocking state [ 974.098694][T29153] bridge0: port 3(team0) entered forwarding state 06:40:51 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}], 0x3, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:51 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0xe43) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:51 executing program 5: socketpair(0x25, 0x3, 0x7, &(0x7f0000000000)) 06:40:51 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:51 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f000000e780)='/dev/vcsu#\x00', 0x1, 0x109082) write$P9_RRENAME(r0, 0x0, 0x0) 06:40:51 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) [ 974.219248][T29179] @þ: Device ipvlan1 failed to register rx_handler 06:40:51 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000004c0)=@newtfilter={0x2c, 0x2c, 0x1, 0x0, 0x0, {}, [@TCA_RATE={0x6, 0x8}]}, 0x2c}}, 0x0) 06:40:52 executing program 4: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$BTRFS_IOC_QUOTA_CTL(r0, 0xc0109428, &(0x7f0000000000)) 06:40:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:52 executing program 5: io_setup(0x40, &(0x7f0000000080)=0x0) r1 = syz_open_dev$rtc(&(0x7f00000000c0)='/dev/rtc#\x00', 0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000001540)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) [ 974.740509][T29186] device team0 left promiscuous mode [ 974.746091][T29186] device team_slave_0 left promiscuous mode 06:40:52 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:52 executing program 5: clock_nanosleep(0xa3e841ebe46ce064, 0x0, &(0x7f0000000180), 0x0) [ 974.782134][T29186] device team_slave_1 left promiscuous mode [ 974.807164][T29186] bridge0: port 3(team0) entered disabled state [ 975.084394][T29186] team0: Cannot enslave team device to itself [ 975.110510][T29189] bridge0: port 3(team0) entered blocking state [ 975.135249][T29189] bridge0: port 3(team0) entered disabled state [ 975.158117][T29189] device team0 entered promiscuous mode [ 975.175507][T29189] device team_slave_0 entered promiscuous mode [ 975.204977][T29189] device team_slave_1 entered promiscuous mode [ 975.244124][T29189] bridge0: port 3(team0) entered blocking state [ 975.250530][T29189] bridge0: port 3(team0) entered forwarding state 06:40:53 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}], 0x3, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:53 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(&(0x7f0000000180)={0x7, 0x70, 0x0, 0x9, 0x0, 0x3f, 0x0, 0x49, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff9}, 0x0, 0x400000000000001, 0x0, 0x6, 0x244e, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:53 executing program 5: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000380)='ns/user\x00') 06:40:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:53 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000580)='net/netstat\x00') 06:40:53 executing program 5: syz_mount_image$iso9660(&(0x7f0000000100)='iso9660\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x1, &(0x7f00000004c0)=[{&(0x7f00000001c0)="92", 0x1}], 0x0, &(0x7f0000000580)={[{@session={'session'}}], [{@fscontext={'fscontext', 0x3d, 'root'}}]}) socket$inet6_icmp(0xa, 0x2, 0x3a) syz_init_net_socket$bt_l2cap(0x1f, 0x0, 0x0) [ 975.416353][T29218] @þ: Device ipvlan1 failed to register rx_handler 06:40:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:53 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f00000002c0)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0100000000000000000001"], 0x68}}, 0x0) 06:40:53 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:53 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="0942dbee82c1d3bd0d07e976509c5f5c81722d4fdedafb855a20e5e8d5cbe70ea54f856932af7de22ebcea8a8fe5d12ca00e5fbb449f6159ccde3f879860c7973c9338766b497710b34e1076839db99c971e032faf69fd43c9bffcdf88a179a3df2ac2e7cc80b1ab26149592072a7933a73c530731849714485f4a554a14251a894b81b60a3c182966ac4833fb12d458568809cc9b442c82e79ba6cc8a7718982a76eb6581c315fecd556a7c6f14f5af5eb47a5781d92eeb0ed51614043a42bafcbf9f1e96e356ec9f0c054f6d6df4157a06108b3a21b993befff6ae7bfe1ab9e1ef7d8dfa8e5914f3635c783782348c38fd650a2cb0d8e983ccbc59365c1b72613c2e14be5a73f249dfeb640f5a097aa2709e1f5e505014669a5d207bb7396a2e632aedbb76d253a105da12087a821aaca95a969c309ee9b2816dfdcd173eaee65c75b7c563100ee64271938ba7c9a2695f80d527c1ce34be4f46de1bb51d00517b33bf06874f84a77fd072db202750f77acfb28e79c1d0b6c019e4a507dbd2b753be66675c2e09efb9303a9831a417a5ed5288a81e97c2e1508df6ffaa6711c253a95a15af87eead20b8551d90f4ad287fd62f4f83f607d546ecc383ff9bde1c907cc48ab843ba4c3516c40586652ea04f7d28368e2b25a94d4864b19d783b4bc1a85541ed3cd92f93c07bb603a73460b7f2f6f4e25a65e81250a585d3d11c67d7a1cd155b3d54339644ce053ea80b50c2848323bf6c3041f59993ad9670ffa77a916ff15a5c2f5e6a3f771044fc6639c50ca281f024f0c9fc52", 0x180}], 0x1}}], 0x3, 0x0) [ 975.671216][T29227] ISOFS: Unable to identify CD-ROM format. 06:40:53 executing program 5: timer_create(0x2, 0x0, &(0x7f0000000000)) timer_gettime(0x0, &(0x7f0000000100)) [ 976.056148][T29221] validate_nla: 5 callbacks suppressed [ 976.056166][T29221] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 976.090942][T29221] device team0 left promiscuous mode [ 976.104610][T29221] device team_slave_0 left promiscuous mode [ 976.113445][T29221] device team_slave_1 left promiscuous mode [ 976.128212][T29221] bridge0: port 3(team0) entered disabled state [ 976.153436][T29221] team0: Cannot enslave team device to itself [ 976.169130][T29224] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 976.184396][T29224] bridge0: port 3(team0) entered blocking state [ 976.202634][T29224] bridge0: port 3(team0) entered disabled state [ 976.251035][T29224] device team0 entered promiscuous mode [ 976.263641][T29224] device team_slave_0 entered promiscuous mode [ 976.305889][T29224] device team_slave_1 entered promiscuous mode [ 976.312709][T29224] bridge0: port 3(team0) entered blocking state [ 976.319076][T29224] bridge0: port 3(team0) entered forwarding state 06:40:54 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {&(0x7f00000007c0)=""/197, 0xc5}, {0x0}], 0x3, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:54 executing program 4: request_key(&(0x7f0000000000)='encrypted\x00', &(0x7f0000000040)={'syz', 0x0}, 0x0, 0xfffffffffffffffa) 06:40:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:54 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', &(0x7f00000001c0)={'fscrypt:', @desc1='0000111122223333'}, &(0x7f0000000100)={0x0, "d1289189d18188088c56dd6bbc9095f78aba8b4259935139e706155e5c8516b3d88488d14491700000000000000d4d1ee201fa07846e00"}, 0x48, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$link(0x8, r0, r1) 06:40:54 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 976.442738][T29255] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 06:40:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:54 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x12, 0x0, 0x0) [ 976.520004][T29255] @þ: Device ipvlan1 failed to register rx_handler 06:40:54 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x9, &(0x7f0000000000)=@raw=[@generic, @call, @generic, @btf_id, @btf_id, @map_val={0x18, 0x0, 0x2, 0x0, 0x1}], &(0x7f0000000080)='GPL\x00', 0x3ff, 0x0, 0x0, 0x41100, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:40:54 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:54 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x0, 0x0) accept4(r0, 0x0, 0x0, 0x0) 06:40:54 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) [ 977.032179][T29259] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 977.065840][T29259] device team0 left promiscuous mode [ 977.071163][T29259] device team_slave_0 left promiscuous mode [ 977.099347][T29259] device team_slave_1 left promiscuous mode [ 977.105557][T29259] bridge0: port 3(team0) entered disabled state [ 977.132246][T29259] team0: Cannot enslave team device to itself [ 977.143648][T29262] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 977.167130][T29262] bridge0: port 3(team0) entered blocking state [ 977.181514][T29262] bridge0: port 3(team0) entered disabled state 06:40:55 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000700)=""/136, 0x88}, {0x0}, {0x0}], 0x3, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:55 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, 0x3a) 06:40:55 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) 06:40:55 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:55 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 977.295291][T29262] device team0 entered promiscuous mode [ 977.303116][T29262] device team_slave_0 entered promiscuous mode [ 977.310869][T29262] device team_slave_1 entered promiscuous mode [ 977.321191][T29262] bridge0: port 3(team0) entered blocking state [ 977.327580][T29262] bridge0: port 3(team0) entered forwarding state 06:40:55 executing program 5: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='uid_map\x00') 06:40:55 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="0942dbee82c1d3bd0d07e976509c5f5c81722d4fdedafb855a20e5e8d5cbe70ea54f856932af7de22ebcea8a8fe5d12ca00e5fbb449f6159ccde3f879860c7973c9338766b497710b34e1076839db99c971e032faf69fd43c9bffcdf88a179a3df2ac2e7cc80b1ab26149592072a7933a73c530731849714485f4a554a14251a894b81b60a3c182966ac4833fb12d458568809cc9b442c82e79ba6cc8a7718982a76eb6581c315fecd556a7c6f14f5af5eb47a5781d92eeb0ed51614043a42bafcbf9f1e96e356ec9f0c054f6d6df4157a06108b3a21b993befff6ae7bfe1ab9e1ef7d8dfa8e5914f3635c783782348c38fd650a2cb0d8e983ccbc59365c1b72613c2e14be5a73f249dfeb640f5a097aa2709e1f5e505014669a5d207bb7396a2e632aedbb76d253a105da12087a821aaca95a969c309ee9b2816dfdcd173eaee65c75b7c563100ee64271938ba7c9a2695f80d527c1ce34be4f46de1bb51d00517b33bf06874f84a77fd072db202750f77acfb28e79c1d0b6c019e4a507dbd2b753be66675c2e09efb9303a9831a417a5ed5288a81e97c2e1508df6ffaa6711c253a95a15af87eead20b8551d90f4ad287fd62f4f83f607d546ecc383ff9bde1c907cc48ab843ba4c3516c40586652ea04f7d28368e2b25a94d4864b19d783b4bc1a85541ed3cd92f93c07bb603a73460b7f2f6f4e25a65e81250a585d3d11c67d7a1cd155b3d54339644ce053ea80b50c2848323bf6c3041f59993ad9670ffa77a916ff15a5c2f5e6a3f771044fc6639c50ca281f024f0c9fc52", 0x180}], 0x1}}], 0x3, 0x0) 06:40:55 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) 06:40:55 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 977.557041][T29291] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:40:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 977.639672][T29291] device team0 left promiscuous mode [ 977.645001][T29291] device team_slave_0 left promiscuous mode [ 977.691926][T29291] device team_slave_1 left promiscuous mode [ 977.727028][T29291] bridge0: port 3(team0) entered disabled state 06:40:55 executing program 5: openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x107000, 0x0) [ 977.783485][T29291] team0: Cannot enslave team device to itself [ 977.828626][T29292] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 977.854478][T29292] bridge0: port 3(team0) entered blocking state [ 977.890260][T29292] bridge0: port 3(team0) entered disabled state [ 977.993027][T29292] device team0 entered promiscuous mode [ 978.026920][T29292] device team_slave_0 entered promiscuous mode [ 978.057154][T29292] device team_slave_1 entered promiscuous mode [ 978.115197][T29292] bridge0: port 3(team0) entered blocking state [ 978.122198][T29292] bridge0: port 3(team0) entered forwarding state 06:40:55 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:55 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 06:40:55 executing program 0: bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r0 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:55 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:55 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:55 executing program 5: clone3(&(0x7f0000000ec0)={0x44108100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, 0x0, 0x0) [ 978.354666][T29314] IPVS: ftp: loaded support on port[0] = 21 [ 978.365753][T29319] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:40:56 executing program 4: syz_80211_join_ibss(&(0x7f0000000240)='wlan1\x00', &(0x7f0000000280)=@random="86", 0x1, 0x0) 06:40:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:56 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 978.409615][T29319] device team0 left promiscuous mode 06:40:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 978.466843][T29319] device team_slave_0 left promiscuous mode [ 978.472942][T29319] device team_slave_1 left promiscuous mode [ 978.519089][T29319] bridge0: port 3(team0) entered disabled state [ 978.556982][T29319] team0: Cannot enslave team device to itself [ 978.599907][T29321] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 978.622478][T29321] bridge0: port 3(team0) entered blocking state [ 978.653468][T29321] bridge0: port 3(team0) entered disabled state 06:40:56 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="0942dbee82c1d3bd0d07e976509c5f5c81722d4fdedafb855a20e5e8d5cbe70ea54f856932af7de22ebcea8a8fe5d12ca00e5fbb449f6159ccde3f879860c7973c9338766b497710b34e1076839db99c971e032faf69fd43c9bffcdf88a179a3df2ac2e7cc80b1ab26149592072a7933a73c530731849714485f4a554a14251a894b81b60a3c182966ac4833fb12d458568809cc9b442c82e79ba6cc8a7718982a76eb6581c315fecd556a7c6f14f5af5eb47a5781d92eeb0ed51614043a42bafcbf9f1e96e356ec9f0c054f6d6df4157a06108b3a21b993befff6ae7bfe1ab9e1ef7d8dfa8e5914f3635c783782348c38fd650a2cb0d8e983ccbc59365c1b72613c2e14be5a73f249dfeb640f5a097aa2709e1f5e505014669a5d207bb7396a2e632aedbb76d253a105da12087a821aaca95a969c309ee9b2816dfdcd173eaee65c75b7c563100ee64271938ba7c9a2695f80d527c1ce34be4f46de1bb51d00517b33bf06874f84a77fd072db202750f77acfb28e79c1d0b6c019e4a507dbd2b753be66675c2e09efb9303a9831a417a5ed5288a81e97c2e1508df6ffaa6711c253a95a15af87eead20b8551d90f4ad287fd62f4f83f607d546ecc383ff9bde1c907cc48ab843ba4c3516c40586652ea04f7d28368e2b25a94d4864b19d783b4bc1a85541ed3cd92f93c07bb603a73460b7f2f6f4e25a65e81250a585d3d11c67d7a1cd155b3d54339644ce053ea80b50c2848323bf6c3041f59993ad9670ffa77a916ff15a5c2f5e6a3f771044fc6639c50ca281f024f0c9fc52", 0x180}], 0x1}}], 0x3, 0x0) [ 978.772248][T29321] device team0 entered promiscuous mode [ 978.798693][T29321] device team_slave_0 entered promiscuous mode [ 978.830828][T29321] device team_slave_1 entered promiscuous mode [ 978.885400][T29321] bridge0: port 3(team0) entered blocking state [ 978.892231][T29321] bridge0: port 3(team0) entered forwarding state 06:40:56 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:40:56 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:56 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:56 executing program 4: perf_event_open(&(0x7f0000000640)={0x2, 0x70, 0xd8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pidfd_open(0x0, 0x0) bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x1, &(0x7f0000000040)=@raw=[@func], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNDETACHFILTER(0xffffffffffffffff, 0x401054d6, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) 06:40:56 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(0xffffffffffffffff, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) [ 979.138415][T29320] IPVS: ftp: loaded support on port[0] = 21 [ 979.261338][T29366] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 979.285208][T29366] device team0 left promiscuous mode [ 979.322596][T29366] device team_slave_0 left promiscuous mode [ 979.359214][T29366] device team_slave_1 left promiscuous mode [ 979.400077][T29366] bridge0: port 3(team0) entered disabled state [ 979.436786][T29366] team0: Cannot enslave team device to itself [ 979.468039][T29370] bridge0: port 3(team0) entered blocking state [ 979.474804][T29370] bridge0: port 3(team0) entered disabled state [ 979.625872][T29370] device team0 entered promiscuous mode [ 979.641929][T29370] device team_slave_0 entered promiscuous mode [ 979.650800][T29370] device team_slave_1 entered promiscuous mode [ 979.729056][T29370] bridge0: port 3(team0) entered blocking state [ 979.735858][T29370] bridge0: port 3(team0) entered forwarding state 06:40:57 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000014240)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x3, 0xe2, &(0x7f0000000080)=""/226, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:40:57 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 06:40:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:57 executing program 4: perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000ec0)={0x44108100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) getitimer(0x0, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000000c0), 0x10) 06:40:57 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 979.977048][T29401] device team0 left promiscuous mode [ 979.997159][T29401] device team_slave_0 left promiscuous mode [ 980.008648][T29402] IPVS: ftp: loaded support on port[0] = 21 [ 980.024407][T29401] device team_slave_1 left promiscuous mode 06:40:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="0942dbee82c1d3bd0d07e976509c5f5c81722d4fdedafb855a20e5e8d5cbe70ea54f856932af7de22ebcea8a8fe5d12ca00e5fbb449f6159ccde3f879860c7973c9338766b497710b34e1076839db99c971e032faf69fd43c9bffcdf88a179a3df2ac2e7cc80b1ab26149592072a7933a73c530731849714485f4a554a14251a894b81b60a3c182966ac4833fb12d458568809cc9b442c82e79ba6cc8a7718982a76eb6581c315fecd556a7c6f14f5af5eb47a5781d92eeb0ed51614043a42bafcbf9f1e96e356ec9f0c054f6d6df4157a06108b3a21b993befff6ae7bfe1ab9e1ef7d8dfa8e5914f3635c783782348c38fd650a2cb0d8e983ccbc59365c1b72613c2e14be5a73f249dfeb640f5a097aa2709e1f5e505014669a5d207bb7396a2e632aedbb76d253a105da12087a821aaca95a969c309ee9b2816dfdcd173eaee65c75b7c563100ee64271938ba7c9a2695f80d527c1ce34be4f46de1bb51d00517b33bf06874f84a77fd072db202750f77acfb28e79c1d0b6c019e4a507dbd2b753be66675c2e09efb9303a9831a417a5ed5288a81e97c2e1508df6ffaa6711c253a95a15af87eead20b8551d90f4ad287fd62f4f83f607d546ecc383ff9bde1c907cc48ab843ba4c3516c40586652ea04f7d28368e2b25a94d4864b19d783b4bc1a85541ed3cd92f93c07bb603a73460b7f2f6f4e25a65e81250a585d3d11c67d7a1cd155b3d54339644ce053ea80b50c2848323bf6c3041f59993ad9670ffa77a916ff15a5c2f5e6a3f771044fc6639c50ca281f024f0c9fc52", 0x180}], 0x1}}], 0x3, 0x0) 06:40:57 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 06:40:57 executing program 5: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) [ 980.054871][T29401] bridge0: port 3(team0) entered disabled state [ 980.082871][T29401] team0: Cannot enslave team device to itself 06:40:57 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 980.123866][T29406] bridge0: port 3(team0) entered blocking state [ 980.137007][T29406] bridge0: port 3(team0) entered disabled state [ 980.211133][T29406] device team0 entered promiscuous mode [ 980.227998][T29406] device team_slave_0 entered promiscuous mode [ 980.259815][T29406] device team_slave_1 entered promiscuous mode 06:40:57 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, 0x0, 0x0) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:58 executing program 5: syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x0) openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:40:58 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) [ 980.340697][T29406] bridge0: port 3(team0) entered blocking state [ 980.347732][T29406] bridge0: port 3(team0) entered forwarding state 06:40:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:58 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:40:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) [ 980.614906][T29402] IPVS: ftp: loaded support on port[0] = 21 [ 980.685965][T29448] device team0 left promiscuous mode [ 980.691605][T29448] device team_slave_0 left promiscuous mode [ 980.701976][T29448] device team_slave_1 left promiscuous mode [ 980.712905][T29448] bridge0: port 3(team0) entered disabled state [ 980.785972][T29448] team0: Cannot enslave team device to itself [ 980.801770][T29453] bridge0: port 3(team0) entered blocking state [ 980.850295][T29453] bridge0: port 3(team0) entered disabled state [ 980.943052][T29453] device team0 entered promiscuous mode [ 980.949791][T29453] device team_slave_0 entered promiscuous mode [ 980.963987][T29453] device team_slave_1 entered promiscuous mode [ 981.000854][T29453] bridge0: port 3(team0) entered blocking state [ 981.007703][T29453] bridge0: port 3(team0) entered forwarding state 06:40:58 executing program 4: perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = clone3(&(0x7f0000000ec0)={0x44108100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = getpid() kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000000)) write$P9_RREADLINK(0xffffffffffffffff, &(0x7f0000000100)={0x10, 0x17, 0x1, {0x7, './file0'}}, 0x10) getitimer(0x0, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f00000000c0), 0x10) 06:40:58 executing program 5: fsopen(&(0x7f00000000c0)='ceph\x00', 0x0) 06:40:58 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 06:40:58 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:58 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 981.220152][T29484] validate_nla: 5 callbacks suppressed [ 981.220170][T29484] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 981.263220][T29484] device team0 left promiscuous mode 06:40:58 executing program 5: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000001c0)="bd", 0x1}, {&(0x7f0000000280)="b4", 0x1}, {&(0x7f0000000380)="84", 0x1}], 0x3, &(0x7f0000000640)=[{0x28, 0x0, 0x0, "2c93b21df9faadb182038046278727ef4c"}], 0x28}, 0x40881) 06:40:58 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:59 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 981.295860][T29484] device team_slave_0 left promiscuous mode [ 981.332244][T29484] device team_slave_1 left promiscuous mode [ 981.361624][T29484] bridge0: port 3(team0) entered disabled state [ 981.362003][T29490] IPVS: ftp: loaded support on port[0] = 21 06:40:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 981.409171][T29484] team0: Cannot enslave team device to itself 06:40:59 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000140)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000340)={0x54, 0x0, &(0x7f0000000240)=[@clear_death, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x4, 0x0, &(0x7f00000002c0)="f2dbccca"}) [ 981.456951][T29489] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 981.478266][T29489] bridge0: port 3(team0) entered blocking state 06:40:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) [ 981.518210][T29489] bridge0: port 3(team0) entered disabled state [ 981.766775][T29489] device team0 entered promiscuous mode [ 981.791611][T29489] device team_slave_0 entered promiscuous mode [ 981.833557][T29489] device team_slave_1 entered promiscuous mode [ 981.869139][T29489] bridge0: port 3(team0) entered blocking state [ 981.876404][T29489] bridge0: port 3(team0) entered forwarding state 06:40:59 executing program 4: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x2405, 0x0) 06:40:59 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 06:40:59 executing program 5: socketpair(0x9, 0x0, 0x0, &(0x7f0000000040)) 06:40:59 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:40:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="0942dbee82c1d3bd0d07e976509c5f5c81722d4fdedafb855a20e5e8d5cbe70ea54f856932af7de22ebcea8a8fe5d12ca00e5fbb449f6159ccde3f879860c7973c9338766b497710b34e1076839db99c971e032faf69fd43c9bffcdf88a179a3df2ac2e7cc80b1ab26149592072a7933a73c530731849714485f4a554a14251a894b81b60a3c182966ac4833fb12d458568809cc9b442c82e79ba6cc8a7718982a76eb6581c315fecd556a7c6f14f5af5eb47a5781d92eeb0ed51614043a42bafcbf9f1e96e356ec9f0c054f6d6df4157a06108b3a21b993befff6ae7bfe1ab9e1ef7d8dfa8e5914f3635c783782348c38fd650a2cb0d8e983ccbc59365c1b72613c2e14be5a73f249dfeb640f5a097aa2709e1f5e505014669a5d207bb7396a2e632aedbb76d253a105da12087a821aaca95a969c309ee9b2816dfdcd173eaee65c75b7c563100ee64271938ba7c9a2695f80d527c1ce34be4f46de1bb51d00517b33bf06874f84a77fd072db202750f77acfb28e79c1d0b6c019e4a507dbd2b753be66675c2e09efb9303a9831a417a5ed5288a81e97c2e1508df6ffaa6711c253a95a15af87eead20b8551d90f4ad287fd62f4f83f607d546ecc383ff9bde1c907cc48ab843ba4c3516c40586652ea04f7d28368e2b25a94d4864b19d783b4bc1a85541ed3cd92f93c07bb603a73460b7f2f6f4e25a65e81250a585d3d11c67d7a1cd155b3d54339644ce053ea80b50c2848323bf6c3041f59993ad9670ffa77a916ff15a5c2f5e6a3f771044fc6639c50ca281f024f0c9fc52", 0x180}], 0x1}}], 0x3, 0x0) 06:40:59 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 982.192659][T29535] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 982.251355][T29535] device team0 left promiscuous mode 06:40:59 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0xfffffc99}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}, {{0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000500)="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", 0x180}], 0x1}}], 0x3, 0x0) 06:40:59 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x5451, 0x0) 06:41:00 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}], 0x1}, 0x0) [ 982.286500][T29535] device team_slave_0 left promiscuous mode 06:41:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={&(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @random}}, 0x80, &(0x7f0000000180)=[{0x0}, {&(0x7f00000000c0)=""/164, 0xa4}], 0x2, &(0x7f00000001c0)=""/219, 0xdb}, 0x2102) sendmsg(r1, &(0x7f0000004880)={0x0, 0x0, &(0x7f00000046c0)=[{&(0x7f0000000340)='H', 0x1}], 0x1}, 0x0) 06:41:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 982.337908][T29535] device team_slave_1 left promiscuous mode [ 982.373210][T29535] bridge0: port 3(team0) entered disabled state [ 982.428477][T29535] team0: Cannot enslave team device to itself [ 982.435259][T29541] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 982.447574][T29541] bridge0: port 3(team0) entered blocking state [ 982.469016][T29541] bridge0: port 3(team0) entered disabled state 06:41:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, 0x0, 0x0, 0x0) 06:41:00 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000002c0)={r1, r0, 0x0, 0x0, 0x0}, 0x30) [ 982.599643][T29541] device team0 entered promiscuous mode [ 982.630773][T29541] device team_slave_0 entered promiscuous mode 06:41:00 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}], 0x1}, 0x0) 06:41:00 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f00000000c0)=""/164, 0xa4}], 0x2}, 0x0) sendmsg(r1, &(0x7f0000004880)={0x0, 0x0, &(0x7f00000046c0)=[{&(0x7f0000000340)='H', 0x1}], 0x1}, 0x0) [ 982.664913][T29541] device team_slave_1 entered promiscuous mode [ 982.709917][T29541] bridge0: port 3(team0) entered blocking state [ 982.716798][T29541] bridge0: port 3(team0) entered forwarding state 06:41:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:41:00 executing program 5: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x401, 0x0, 0x0, 0x2}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 06:41:00 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, 0x0, 0x0, 0x0) 06:41:00 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}], 0x1}, 0x0) 06:41:00 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000020c0)={0x11, 0x3, &(0x7f0000001f00)=@framed, &(0x7f0000001f40)='syzkaller\x00', 0xfffffffd, 0xbd, &(0x7f0000001f80)=""/189, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 983.022756][T29572] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 983.065427][T29572] device team0 left promiscuous mode 06:41:00 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x77f05f70ebdecd2a, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 983.095717][T29572] device team_slave_0 left promiscuous mode [ 983.123501][T29572] device team_slave_1 left promiscuous mode 06:41:00 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:41:00 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, 0x0, 0x0, 0x0) [ 983.153704][T29572] bridge0: port 3(team0) entered disabled state 06:41:00 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {0x0}], 0x2}, 0x0) [ 983.196378][T29572] team0: Cannot enslave team device to itself [ 983.231041][T29577] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:00 executing program 4: r0 = socket(0x11, 0xa, 0x0) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000580)={&(0x7f00000003c0), 0xc, &(0x7f0000000540)={0x0}}, 0x0) [ 983.252593][T29577] bridge0: port 3(team0) entered blocking state [ 983.284575][T29577] bridge0: port 3(team0) entered disabled state 06:41:01 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002dc0)={0x0, 0x1, &(0x7f0000002b00)=@raw=[@func], &(0x7f0000002b40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:41:01 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {0x0}], 0x2}, 0x0) 06:41:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0x1}], 0x2}}, {{0x0, 0x0, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000040)='x', 0x1}, {&(0x7f0000000100)="57a64ba02cdc7e6f79671499c5136a90378fa0b2d774a71aa67f21b85ad0bb3f145e3e70b5e5413fe792be75b6aef0b9c239e077e53b654c7bc48817f08b1ba590265a71365e1e53d67d987a08b9987de40c0648b6facd7b849fca4591f438a62782", 0x62}], 0x3}}], 0x2, 0x0) [ 983.438183][T29577] device team0 entered promiscuous mode [ 983.474308][T29577] device team_slave_0 entered promiscuous mode [ 983.505036][T29577] device team_slave_1 entered promiscuous mode [ 983.547694][T29577] bridge0: port 3(team0) entered blocking state [ 983.554651][T29577] bridge0: port 3(team0) entered forwarding state 06:41:01 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:01 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) splice(r0, 0x0, r0, 0x0, 0x6, 0x0) 06:41:01 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$EBT_SO_GET_INIT_ENTRIES(r0, 0x0, 0x83, 0x0, &(0x7f0000000180)) 06:41:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:41:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}, {&(0x7f00000004c0)='?', 0x1}], 0x2}}], 0x1, 0x0) 06:41:01 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {0x0}], 0x2}, 0x0) 06:41:01 executing program 4: r0 = socket(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, &(0x7f0000007100)) [ 983.804227][T29607] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 983.848829][T29607] device team0 left promiscuous mode 06:41:01 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xa, 0x3, 0x0, 0x8c, 0x0, 0x1}, 0x40) [ 983.918262][T29607] device team_slave_0 left promiscuous mode 06:41:01 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0), 0x0, 0x0) 06:41:01 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)}], 0x2}, 0x0) [ 983.989994][T29607] device team_slave_1 left promiscuous mode [ 984.024992][T29607] bridge0: port 3(team0) entered disabled state 06:41:01 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:41:01 executing program 4: r0 = socket(0x18, 0x0, 0x1) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, 0x0) [ 984.067387][T29607] team0: Cannot enslave team device to itself [ 984.122456][T29611] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 984.149764][T29611] bridge0: port 3(team0) entered blocking state [ 984.197674][T29611] bridge0: port 3(team0) entered disabled state [ 984.302237][T29611] device team0 entered promiscuous mode [ 984.338181][T29611] device team_slave_0 entered promiscuous mode [ 984.356843][T29611] device team_slave_1 entered promiscuous mode [ 984.390282][T29611] bridge0: port 3(team0) entered blocking state [ 984.397053][T29611] bridge0: port 3(team0) entered forwarding state 06:41:02 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:02 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) recvmsg(r0, &(0x7f00000007c0)={0x0, 0x0, 0x0}, 0x2000) 06:41:02 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)}], 0x2}, 0x0) 06:41:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0), 0x0, 0x0) 06:41:02 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000140)={&(0x7f0000000000), 0xc, &(0x7f0000000100)={0x0}}, 0x0) 06:41:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) 06:41:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0), 0x0, 0x0) 06:41:02 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000040), 0x10) 06:41:02 executing program 5: syz_usb_connect$uac1(0x0, 0x78, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x66, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{}, [@mixer_unit={0x7, 0x24, 0x4, 0x0, 0x6, "a3b0"}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x2, &(0x7f0000000180)=@string={0x2}}, {0x2, &(0x7f0000000240)=@string={0x2}}]}) [ 984.624665][T29640] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:02 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)}], 0x2}, 0x0) 06:41:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, 0x0, 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, &(0x7f0000000040)) [ 984.688778][T29640] device team0 left promiscuous mode [ 984.705751][T29640] device team_slave_0 left promiscuous mode [ 984.715619][T29640] device team_slave_1 left promiscuous mode [ 984.721831][T29640] bridge0: port 3(team0) entered disabled state [ 984.789253][T29640] team0: Cannot enslave team device to itself [ 984.812500][T29642] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 984.836647][T29642] bridge0: port 3(team0) entered blocking state [ 984.857617][T29642] bridge0: port 3(team0) entered disabled state [ 984.962072][T29642] device team0 entered promiscuous mode [ 984.986066][T29642] device team_slave_0 entered promiscuous mode [ 985.003991][T29642] device team_slave_1 entered promiscuous mode [ 985.045419][ T9587] usb 6-1: new high-speed USB device number 7 using dummy_hcd [ 985.083558][T29642] bridge0: port 3(team0) entered blocking state [ 985.090515][T29642] bridge0: port 3(team0) entered forwarding state 06:41:02 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:02 executing program 4: bpf$BPF_LINK_CREATE(0xb, 0x0, 0x0) 06:41:02 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O', 0x2}], 0x2}, 0x0) 06:41:02 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:41:02 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) [ 985.285161][ T9587] usb 6-1: Using ep0 maxpacket: 32 06:41:03 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:41:03 executing program 4: r0 = socket(0xa, 0x2, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x0, 0x0, 0x0) 06:41:03 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O', 0x2}], 0x2}, 0x0) [ 985.405937][ T9587] usb 6-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 985.445238][ T9587] usb 6-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 985.489097][ T9587] usb 6-1: too many endpoints for config 1 interface 0 altsetting 6: 163, using maximum allowed: 30 [ 985.531858][ T9587] usb 6-1: config 1 interface 0 altsetting 6 has 0 endpoint descriptors, different from the interface descriptor's value: 163 [ 985.595014][ T9587] usb 6-1: config 1 interface 0 has no altsetting 1 [ 985.640570][ T9587] usb 6-1: language id specifier not provided by device, defaulting to English [ 985.795419][ T9587] usb 6-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 985.804505][ T9587] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 985.829546][ T9587] usb 6-1: Product: syz [ 985.833739][ T9587] usb 6-1: SerialNumber: syz [ 986.181773][ T9587] usb 6-1: 0:2 : does not exist [ 986.221945][ T9587] usb 6-1: USB disconnect, device number 7 [ 986.865054][T29698] usb 6-1: new high-speed USB device number 8 using dummy_hcd [ 987.105072][T29698] usb 6-1: Using ep0 maxpacket: 32 [ 987.225005][T29698] usb 6-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 987.235268][T29698] usb 6-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 987.244151][T29698] usb 6-1: too many endpoints for config 1 interface 0 altsetting 6: 163, using maximum allowed: 30 [ 987.259278][T29698] usb 6-1: config 1 interface 0 altsetting 6 has 0 endpoint descriptors, different from the interface descriptor's value: 163 [ 987.274599][T29698] usb 6-1: config 1 interface 0 has no altsetting 1 [ 987.315048][T29698] usb 6-1: language id specifier not provided by device, defaulting to English [ 987.444965][T29698] usb 6-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 987.454049][T29698] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 987.465699][T29698] usb 6-1: Product: syz [ 987.469887][T29698] usb 6-1: SerialNumber: syz 06:41:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)='d', 0x1}], 0x1}}], 0x1, 0x0) 06:41:05 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) 06:41:05 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a0010000000028000", 0x2b}, {&(0x7f0000000140)='=O', 0x2}], 0x2}, 0x0) 06:41:05 executing program 4: r0 = socket(0xa, 0x2, 0x0) bind$unix(r0, 0x0, 0x0) 06:41:05 executing program 5: r0 = socket(0x2, 0x1, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x41, 0x0, 0x0) [ 987.804971][T29698] usb 6-1: 0:2 : does not exist [ 987.849081][T29698] usb 6-1: USB disconnect, device number 8 06:41:05 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x10141) 06:41:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)}}], 0x1, 0x0) 06:41:05 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:05 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)='=O@', 0x3}], 0x1}, 0x0) 06:41:05 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r1, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) 06:41:05 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000006a80)={0x11, 0x9, &(0x7f0000000000)=ANY=[@ANYBLOB="181000000000000000000000000000000000000000000000000000000000000018000000000000000000000000000000050000000000000085100000f8ffffff95"], &(0x7f00000000c0)='GPL\x00', 0x6, 0xb1, &(0x7f00000002c0)=""/177, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:41:05 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)}}], 0x1, 0x0) 06:41:05 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)='=O@', 0x3}], 0x1}, 0x0) 06:41:05 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:06 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='ext4_free_blocks\x00'}, 0x10) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x4ea00) write$cgroup_int(r1, &(0x7f0000000000), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x443000035) 06:41:06 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)}}], 0x1, 0x0) [ 988.424396][T29750] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:06 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000140)='=O@', 0x3}], 0x1}, 0x0) 06:41:07 executing program 4: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000002c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='ext4_ext_rm_leaf\x00', r0}, 0x10) perf_event_open(&(0x7f00000001c0)={0x2, 0x70, 0xd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) 06:41:07 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:07 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, 0x0) 06:41:07 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}], 0x1, 0x0) 06:41:07 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:07 executing program 5: openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) openat$cgroup_procs(r0, 0x0, 0x2, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='ext4_free_blocks\x00'}, 0x10) write$cgroup_int(r2, &(0x7f0000000200), 0x43400) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0x32600) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r3, &(0x7f0000000200)=ANY=[], 0x4ea00) write$cgroup_int(r1, &(0x7f0000000000), 0x12) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc028660f, &(0x7f00000005c0)=0x443000035) [ 990.365690][T29780] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:08 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}], 0x1, 0x0) 06:41:08 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, 0x0) 06:41:08 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{0x0}], 0x1}}], 0x1, 0x0) [ 990.711539][T29796] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:08 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000175c0)) 06:41:08 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:08 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:08 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)}], 0x1}}], 0x1, 0x0) 06:41:08 executing program 4: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) [ 991.099051][T29811] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:08 executing program 5: r0 = socket$inet(0x2, 0x3, 0x7) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x7, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @broadcast}}}, 0x108) 06:41:08 executing program 2: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40086602, 0x400007) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400fffd}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_int(r2, &(0x7f0000000200), 0x806000) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='memory.stat\x00', 0x0, 0x0) write$cgroup_subtree(r0, &(0x7f0000000080)=ANY=[], 0xffba) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305829, 0x0) 06:41:08 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:08 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:08 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000006a80)={0x1a, 0x3, &(0x7f0000000000)=@framed, &(0x7f00000000c0)='GPL\x00', 0x6, 0xb1, &(0x7f00000002c0)=""/177, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x345}, 0x78) 06:41:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)}], 0x1}}], 0x1, 0x0) 06:41:09 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 991.402049][T29825] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:09 executing program 4: r0 = socket(0xa, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000002580)=[{&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000002b40)=ANY=[], 0x38}], 0x1, 0x0) 06:41:09 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:09 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000200)={0x26, 'hash\x00', 0x0, 0x0, 'sha384\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendmmsg$inet(r1, &(0x7f00000111c0)=[{{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000300)}], 0x1}}], 0x1, 0x0) 06:41:09 executing program 5: r0 = socket(0x11, 0x2, 0x0) getpeername$unix(r0, 0x0, 0x0) 06:41:09 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c00", 0x16}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:09 executing program 2: r0 = socket(0x2, 0x1, 0x0) sendmsg$rds(r0, &(0x7f0000001440)={&(0x7f0000000000)={0x2, 0x0, @multicast1}, 0x10, 0x0}, 0x20000000) 06:41:09 executing program 4: socket(0x25, 0x5, 0x3) [ 991.689999][T29838] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:09 executing program 0: r0 = socket(0xa, 0x6, 0x0) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) 06:41:09 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:09 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 06:41:09 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) sendmmsg$inet6(r0, 0x0, 0x0, 0x0) 06:41:09 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c00", 0x16}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:09 executing program 4: lsetxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000080)=ANY=[], 0x104, 0x0) 06:41:09 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) openat$cgroup_int(r0, &(0x7f0000000240)='cpuset.cpus\x00', 0x2, 0x0) [ 991.948968][T29857] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:09 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_LK(r0, 0x0, 0x0) 06:41:09 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RXATTRCREATE(r0, 0x0, 0x0) 06:41:09 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c00", 0x16}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:09 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:09 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/fuse\x00', 0x2, 0x0) syz_fuse_handle_req(r0, &(0x7f00000065c0)="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", 0x2000, &(0x7f000000b500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:41:09 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, 0x0, 0x0) 06:41:09 executing program 0: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 06:41:09 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff}) syz_fuse_handle_req(r0, &(0x7f00000025c0)="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", 0x2000, &(0x7f0000005340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:41:09 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e", 0x21}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 992.278723][T29874] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:10 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) 06:41:10 executing program 2: lsetxattr$security_ima(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='security.ima\x00', 0x0, 0x0, 0x0) 06:41:10 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:10 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, 0x0, 0x0) 06:41:10 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e", 0x21}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 992.549127][T29891] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:10 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) sendmmsg$sock(r0, &(0x7f0000002e80)=[{{&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x80, 0x0}}], 0x1, 0x0) 06:41:10 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f00000006c0)) 06:41:10 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600), 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:10 executing program 0: pipe(&(0x7f0000000180)={0xffffffffffffffff}) accept$inet6(r0, 0x0, 0x0) [ 992.656877][ T3252] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.663214][ T3252] ieee802154 phy1 wpan1: encryption failed: -22 06:41:10 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e", 0x21}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 992.768354][T29901] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:10 executing program 5: execveat(0xffffffffffffffff, &(0x7f0000000a80)='./file0\x00', 0x0, 0x0, 0x0) 06:41:10 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_CREATE_OPEN(r0, 0x0, 0x0) 06:41:10 executing program 4: pselect6(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000240), &(0x7f00000002c0), 0x0) 06:41:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$IPVS_CMD_NEW_SERVICE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x14}, 0x14}}, 0x40) 06:41:10 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600), 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:10 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a001000", 0x26}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:11 executing program 2: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$FUSE_BMAP(r0, 0x0, 0x0) 06:41:11 executing program 4: pipe(&(0x7f0000000000)={0xffffffffffffffff}) read$FUSE(r0, &(0x7f0000000500)={0x2020}, 0x2020) 06:41:11 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a001000", 0x26}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:11 executing program 5: pselect6(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000240), &(0x7f00000002c0), &(0x7f0000000340)={0x0}) 06:41:11 executing program 0: open$dir(&(0x7f0000000040)='./file0/file0\x00', 0x408401, 0x0) 06:41:11 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600), 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:11 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a001000", 0x26}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:11 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) ioctl$sock_inet6_SIOCADDRT(r0, 0x890b, 0x0) 06:41:11 executing program 5: statx(0xffffffffffffffff, &(0x7f0000004dc0)='./file0\x00', 0x0, 0x0, 0x0) 06:41:11 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) [ 993.625488][T29935] validate_nla: 1 callbacks suppressed [ 993.625523][T29935] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:11 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:11 executing program 5: open$dir(&(0x7f0000001500)='./file0\x00', 0xc040, 0x0) lsetxattr(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=@random={'trusted.', '\x00'}, 0x0, 0x0, 0x0) 06:41:11 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a001000000002", 0x29}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) [ 993.922411][T29948] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 993.927942][ T36] audit: type=1800 audit(1614753671.582:35): pid=29949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=14505 res=0 errno=0 [ 994.034643][ T36] audit: type=1800 audit(1614753671.622:36): pid=29949 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.5" name="file0" dev="sda1" ino=14505 res=0 errno=0 06:41:12 executing program 4: getresuid(&(0x7f0000004a80), &(0x7f0000004ac0), &(0x7f0000004b00)) 06:41:12 executing program 2: pipe(&(0x7f0000000180)={0xffffffffffffffff}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) 06:41:12 executing program 0: openat$cgroup_type(0xffffffffffffffff, &(0x7f0000003540)='cgroup.type\x00', 0x2, 0x0) 06:41:12 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a001000000002", 0x29}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:12 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:12 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) getsockname(r0, 0x0, 0x0) [ 994.416607][T29961] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:12 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) recvfrom(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:41:12 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a001000000002", 0x29}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:12 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff}) read$char_usb(r0, &(0x7f0000000540)=""/160, 0xa0) 06:41:12 executing program 2: pipe2$9p(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RLOPEN(r0, 0x0, 0x0) 06:41:12 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) bind(r0, 0x0, 0x0) 06:41:12 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{0x0}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:12 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_ifreq(r0, 0x891d, 0x0) [ 994.670858][T29978] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:12 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a00100000000280", 0x2a}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:12 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:12 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff}) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, 0x0, 0x0) 06:41:12 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a00100000000280", 0x2a}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:12 executing program 2: openat$tun(0xffffffffffffff9c, &(0x7f0000000280)='/dev/net/tun\x00', 0x101000, 0x0) [ 994.849147][T29987] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:12 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 06:41:12 executing program 5: pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) fchownat(r0, &(0x7f0000000100)='./file0\x00', 0xee00, 0xee01, 0x0) 06:41:13 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000002d00)={0x0, 0x0, 0x0}, 0x0) 06:41:13 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:13 executing program 3: ioctl$PERF_EVENT_IOC_REFRESH(0xffffffffffffffff, 0x2402, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef43c000000e3bd6efb440e09000e000a00100000000280", 0x2a}, {&(0x7f0000000140)='=O@', 0x3}], 0x2}, 0x0) 06:41:13 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) getsockname(r0, 0x0, &(0x7f0000000540)) 06:41:13 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_score_adj\x00') write$P9_RREADDIR(r0, &(0x7f0000000080)=ANY=[], 0x103) 06:41:13 executing program 0: inotify_init1(0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000480)='fd/4\x00') close(r0) [ 995.567701][T30012] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:13 executing program 2: munmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) 06:41:13 executing program 5: r0 = eventfd(0x0) writev(r0, &(0x7f00000005c0)=[{&(0x7f0000000000)="3d3375882255d8ab", 0x8}], 0x1) 06:41:13 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:13 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0x20000094) 06:41:13 executing program 4: pipe(&(0x7f0000000180)={0xffffffffffffffff}) setsockopt$inet6_udp_int(r0, 0x11, 0x0, 0x0, 0x0) 06:41:13 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000000b80)=[{{&(0x7f0000000000)=@l2tp6={0xa, 0x0, 0x0, @dev}, 0x0, &(0x7f0000000600)=[{&(0x7f0000000080)=""/88}, {&(0x7f0000000100)=""/218}, {&(0x7f0000000c40)=""/176}, {&(0x7f00000002c0)=""/142}, {&(0x7f0000000380)=""/178}, {&(0x7f0000000440)=""/171}, {&(0x7f0000000500)=""/12}, {&(0x7f0000000540)=""/143}]}}, {{&(0x7f0000000680)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @initdev}}}, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000700)=""/158}], 0x0, &(0x7f0000000800)=""/4}}, {{&(0x7f0000000840)=@sco={0x1f, @fixed}, 0x0, &(0x7f0000000a40)=[{&(0x7f00000008c0)=""/199}, {&(0x7f00000009c0)=""/91}], 0x0, &(0x7f0000000a80)=""/224}}], 0x400000000000176, 0x40, 0x0) 06:41:13 executing program 2: socket(0x2c, 0x3, 0x800) 06:41:13 executing program 3: r0 = socket(0x2, 0x2, 0x0) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) 06:41:13 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x4, &(0x7f0000000600)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff9}]}, &(0x7f0000000680)='syzkaller\x00', 0x1, 0xe9, &(0x7f00000006c0)=""/233, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 995.878128][T30029] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:13 executing program 4: r0 = socket(0x2, 0x1, 0x0) ioctl$SIOCX25GCALLUSERDATA(r0, 0x8905, 0x0) 06:41:13 executing program 0: r0 = socket(0x2, 0x6, 0x0) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, 0x0, 0x0) 06:41:13 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f848100000", 0x17}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:13 executing program 2: r0 = socket(0x1, 0x2, 0x0) connect$nfc_raw(r0, &(0x7f0000000000), 0x10) 06:41:13 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_COALESCE(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x20}, @val={0x8}, @void}}}, 0x24}}, 0x0) 06:41:13 executing program 3: r0 = socket$inet(0x2, 0xa, 0x0) getsockname$inet(r0, 0x0, &(0x7f0000000140)) 06:41:13 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmsg(r0, &(0x7f0000001380)={&(0x7f0000001100)=@in6={0xa, 0x4e24, 0x0, @mcast2, 0x7}, 0x80, 0x0}, 0x0) 06:41:13 executing program 0: r0 = socket(0xa, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000002500)={'batadv0\x00'}) [ 996.157412][T30043] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:13 executing program 2: r0 = socket(0x11, 0x2, 0x0) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x5000}, 0x0) 06:41:13 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f848100000", 0x17}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:14 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) recvmmsg(r0, &(0x7f0000001f40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 996.287454][T30052] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. [ 996.299712][ T36] audit: type=1400 audit(1614753673.963:37): avc: denied { ioctl } for pid=30049 comm="syz-executor.0" path="socket:[78532]" dev="sockfs" ino=78532 ioctlcmd=0x8933 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 [ 996.326691][T30055] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.5'. 06:41:14 executing program 3: r0 = socket(0x2, 0x1, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000002100)={&(0x7f0000000080), 0xc, &(0x7f00000020c0)={0x0}}, 0x2404c8c0) 06:41:14 executing program 0: r0 = socket(0xa, 0x2, 0x0) sendmmsg$unix(r0, &(0x7f0000004440)=[{&(0x7f0000000000)=@abs, 0x6e, 0x0}], 0x1, 0x0) 06:41:14 executing program 2: r0 = socket(0x11, 0x2, 0x0) bind$unix(r0, 0x0, 0x7) [ 996.438040][T30060] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:14 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_RADAR_DETECT(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01107d7bf20dfcdbdf255f"], 0x40}}, 0x0) 06:41:14 executing program 0: r0 = socket(0xa, 0x2, 0x0) bind$unix(r0, &(0x7f0000000240)=@abs={0x2}, 0x6e) 06:41:14 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f848100000", 0x17}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:14 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000100)={&(0x7f0000000080)={0xa}, 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 06:41:14 executing program 2: r0 = socket(0x28, 0x801, 0x0) sendmsg$NL80211_CMD_STOP_AP(r0, &(0x7f0000000340)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={0x0}}, 0x0) [ 996.634274][T30071] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. 06:41:14 executing program 0: r0 = socket(0x11, 0x2, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x10042, 0x0, 0x0) [ 996.690993][T30073] netlink: 44 bytes leftover after parsing attributes in process `syz-executor.5'. [ 996.715524][T30076] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:14 executing program 5: r0 = socket(0xa, 0x6, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0xcc}}, 0x0) 06:41:14 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a", 0x23}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:14 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f00000023c0)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000002440)='nl80211\x00', r0) 06:41:14 executing program 2: r0 = socket$l2tp(0x2, 0x2, 0x73) recvmmsg(r0, &(0x7f00000018c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 06:41:14 executing program 3: r0 = socket$inet(0x2, 0x3, 0x7) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x30}}, 0x10) 06:41:14 executing program 0: socketpair(0x2c, 0x3, 0x70, &(0x7f0000000080)) 06:41:14 executing program 5: r0 = socket(0x2, 0x1, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x6e) 06:41:14 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a", 0x23}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:15 executing program 0: r0 = socket$inet(0x2, 0x3, 0x7) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) 06:41:15 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a", 0x23}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:15 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, [@sadb_ident={0x2, 0xa}, @sadb_x_sa2={0x2}]}, 0x30}}, 0x0) 06:41:15 executing program 3: r0 = epoll_create1(0x0) pipe2(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, 0x0) 06:41:15 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x2) 06:41:15 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000080)) timer_settime(0x0, 0x1, &(0x7f0000000300)={{0x77359400}}, &(0x7f0000000340)) 06:41:15 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002", 0x29}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:15 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000003440)={0x1, &(0x7f0000003400)=[{0xfff}]}, 0x10) 06:41:15 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000004b00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 06:41:15 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000001000)=@buf) 06:41:15 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) recvmmsg(r0, &(0x7f0000004b00), 0x0, 0x40000001, 0x0) 06:41:15 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002", 0x29}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:15 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xf1, &(0x7f00000000c0)=""/241, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280), 0x10}, 0x78) 06:41:16 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002", 0x29}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:16 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0x1f, 0x4) 06:41:16 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0xf4240, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:41:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000980)={'batadv0\x00', 0x0}) sendmmsg$inet(r0, &(0x7f00000035c0)=[{{&(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000040)="a9de23c71511345762c37070992f74225aec5118d0e5d7d9241f05a58c98a3e3fd260e24", 0x24}, {&(0x7f0000000080)="f88b0309ffbbf5b6ef08c2acd9e94b5a8f648bbe57143dbf4157f85b43341cbbeaff622bd5a11a3fbcdb53deeb8e3f4ad9119a1365c062a87d2269dd4c02da21fec38602e5831efa59e560979792aab52ee9b78ad0480ca8a4a8dbb12c65f9fd0a2af6fc361b7c5cff910de9aff2494bae2f2f74418c07b9b454692b87c284f63d839c964f9a17851ab12333acfa12113fa65f14a58f88d853451d0e6df0401002d5f6e22fca31842fd9335c27e6ea431f974edea50797c7d94dfda78c382845300abaf6ec3ab0faacf71f2bf387a08c3e9293e9c0e3bc2ccd67b2025adfbb", 0xdf}], 0x2, &(0x7f00000049c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @empty, @remote}}}], 0x20}}, {{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000280)="6598e17be704ed0df6ac9b5949e138c1", 0x10}, {&(0x7f00000002c0)="493980495b2cb91a44c61abb712702a509c32d4234c21e877d7acc6b7d3f040f88874df9883b49eaab2b3d41d375ba28ce0fb10e42172a121991ce56bc768456c91d3beb6999af9212fc3c3cbebc3121a362c452c2abdc2acb11422b6006bf9842de43ebd15703a118b65dcfe243f3e30f170c119aab9feb71f3096b6dd63e43eee32b7ca88808107f8a29bac022e86b12925f3a2f1a04f6f27f261090ac882e9e743f6ee7061cec07f64af8e28af9c177ae0007b8af84f96b5209d38b5ffcc93ff0c7bdd98e858d7ec4922d7048ef18db3e", 0xd2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000500)="a1fcdacbfe6379fec741e5f5dff5385519c203e265360d08e954cf1e0f01eef66c1079d8c88c81497ca135", 0x2b}, {&(0x7f0000000540)="adecddcfd4c77b326a629cdce9ae3e66fd5b1800d73eb05b340be39103163fdb39705736b0668102e93b2f2335e3572d5dcd27cebaad91e5ad1bfb54bdc6dd048fe7531545866363b391677a0322434f8946f791c79f46657d9f01c1c1ccd2300037de7bb3278b3cb27e39c05048945659eccf0d44eb890d1e009eb597140c362160fc7983dd8975ada17e299982681375b99db227ec6a4cb3794c1e", 0x9c}, {&(0x7f0000000600)="35e2e34a806312bf8a", 0x9}, {&(0x7f0000000640)="ce51892711383cd66ea5abf80f5a71bdbea39358579dd9fd0ff8617481b04c090b56cc2ff5c186f01d22c70f536828f2b98cd5c8e6ebdfc54d9cc53df16ce46b9d8028e3c320b4fea2ca1462ef5fc7c80b3c3b30a2612926861570cb48b291da2929645e09dc1bd4e4ebc0ce727d634526d6ab25ec670514c784d1aa03640897438dcc5630a2f74ae6bb3ee4469416ab78124dbe96d969b5601f3f517d91b92c376b888e16ba1f332f721d68a2f4e94fe606172587f8153af420d871c9723d584a01d21bb6eec6", 0xc7}, {&(0x7f0000000740)="a2f2efb60ec4", 0x6}, {&(0x7f0000000780)="7a75228cb73a3c7106926d154ab509f517ae9166ae624eb0ad5b5a7c421489b0bb3156b912a2c60bc1bd3d0fa338759b5d530667ebd7b256e20502fadf3d196e62ca8618c7a6b3ebaf3d3be8052bc11688761f543e531bf442a9829ae17cebe3f4ee0a3965f2dc443d48cd11c02bf4b2069dee5318c5f3940fdafcc4b19dfb7525", 0x81}, {&(0x7f0000000840)="aa1787dd3296ee61383ac03114b7ddc5465c3085deecf1b7280e1541e2f927a13afbdb88cc2882f2fc37e0a58af4180902ee92823523012c4a7d396dc18e85bcb94dc82174f14e7e6b7b96224fad8c45792f39e8cbd2c70d5b62f700243c0297ee08f6ee50d20590c53995457e23e311151232d133a6d555ce5b6141ad552746fd8ebb87a5db2ae631f9771fafd742495a71e8cd57b4ae686a087be7faa796e47bf3e9b11461ecc2f74636cdff44774e4ada410c713e5d3ed0650547cc5d8be5e29eff3e9294843cbb2f85aec4bbb755260b923cf8cd3dda9d9d40ce4da9d61ccec131a56af04b01c37aff54f76aa8a8ec8cde4790", 0xf5}, {&(0x7f0000000940)="2f138cfee8e88038d47bd7b31f29cec493032622875d7106644f", 0x1a}, {&(0x7f00000013c0)="8d07ac20dcce1889b291dbd43fbea4068f38fac27fdb4436a47f17be5dc2ebdc355075ab890ca98b75d3dd569eb4d074a1076ccacaa61c30e242845e83622a11d3b91789a8b6c7c5b0d6b3cc8ea004307d64a13685c755090158d77cdac9c560cd364ab79ce4bb32e528f7d99ae3dcd498ae6c995c28b771504c712cb9cca0ce3af2d65e444735b58840f8aa7ab0394be96edba0d6900afdb4c6c913ee115254084a3ca8fe5d5c54f859b2426bb2b3", 0xaf}], 0x9}}], 0x3, 0x8000) 06:41:16 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) vmsplice(r0, 0x0, 0x0, 0x0) 06:41:16 executing program 0: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f0000003340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=[@txtime={{0x18}}], 0x18}}], 0x1, 0x0) 06:41:16 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000", 0x2c}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 998.645991][T30157] validate_nla: 6 callbacks suppressed [ 998.647495][T30157] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:16 executing program 5: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_ext={0x1c, 0x1, &(0x7f0000000000)=@raw=[@generic], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0}, 0x78) 06:41:16 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001a40)={&(0x7f0000000280)={0xec4, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}, [@NL80211_ATTR_TID_CONFIG={0x6cc, 0x11d, 0x0, 0x1, [{0x3c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}]}, {0x19c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x180, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x74, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0x9c, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x4d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x0, 0x9}, {0x0, 0xa}, {}, {}, {}, {0x0, 0xa}, {}, {0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {0x1}, {}, {}, {0x7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x7}, {0x0, 0x5}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_60GHZ={0x6c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x5, 0x2, [{}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}, @NL80211_TXRATE_LEGACY={0xd, 0x1, [0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x48, 0x48, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0]}]}]}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}]}, {0x4e4, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x4a4, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0xa0, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x39, 0x2, [{0x0, 0x9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0x41, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_60GHZ={0x44, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x35, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x7, 0x7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_5GHZ={0x94, 0x1, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x2d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_60GHZ={0xdc, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x4d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {0x4}, {0x0, 0x2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x8}, {0x1, 0x9}, {0x1, 0x4}, {0x0, 0x6}, {0x7, 0x3}, {0x1, 0xa}, {0x0, 0xa}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0x35, 0x2, [{}, {}, {}, {}, {}, {}, {}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0x35, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0xc4, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x45, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0x15, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_2GHZ={0x38, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x4}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_6GHZ={0xec, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x25, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x7, 0x6}, {}, {0x0, 0x4}, {0x3}, {0x0, 0xa}, {}, {0x0, 0x4}, {0x0, 0x1}, {}, {}, {}, {0x0, 0xa}]}, @NL80211_TXRATE_HT={0x35, 0x2, [{}, {0x6}, {}, {0x3}, {}, {}, {0x0, 0x6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x19, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x0, 0xfffe, 0x6, 0x7]}}]}, @NL80211_BAND_60GHZ={0xc, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0x58, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x1d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}]}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}]}]}, @NL80211_ATTR_TID_CONFIG={0x320, 0x11d, 0x0, 0x1, [{0x20, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}]}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5}]}, {0x4}, {0x2b0, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x2a0, 0xd, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x2c, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_2GHZ={0x5c, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x41, 0x2, [{}, {}, {0x2, 0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_60GHZ={0xcc, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x2d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x25, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x5}, {0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0x3c, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0x2d, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}, @NL80211_BAND_60GHZ={0xc, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_60GHZ={0x100, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x41, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_HT={0x11, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x21, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x0, 0x0, 0x0, 0x0, 0xffbc, 0x0, 0x1]}}, @NL80211_TXRATE_HT={0x4d, 0x2, [{}, {}, {}, {}, {0x0, 0x2}, {}, {}, {0x6}, {}, {0x0, 0x9}, {}, {}, {}, {}, {}, {0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x3, 0x8}, {0x3, 0x8}, {0x4, 0x8}, {0x2, 0x3}, {}, {}, {0x6}, {0x4, 0x2}, {0x6, 0x7}, {0x2, 0x1}, {0x7, 0x8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}]}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}]}]}, @NL80211_ATTR_TID_CONFIG={0x4b0, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}]}, {0x10, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc}]}, {0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6}]}, {0x10, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}]}, {0x24, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x4}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}]}, {0x3d8, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x110, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x10, 0x3, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x9, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0]}]}, @NL80211_BAND_2GHZ={0x40, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_HT={0xd, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @NL80211_BAND_2GHZ={0xb8, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x19, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_HT={0x49, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x1}, {0x5}, {}, {}, {0x0, 0x7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_2GHZ={0x4}]}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0xac, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0x70, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0x38, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x15, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14}]}]}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x200, 0xd, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x94, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x31, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}]}, @NL80211_BAND_2GHZ={0x88, 0x0, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_HT={0x41, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x3}, {}, {0x0, 0x7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_5GHZ={0xa8, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x49, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5, 0x8}, {0x3, 0x4}, {0x1, 0x2}, {0x1, 0x6}, {0x0, 0x6}, {0x3, 0x6}, {0x2, 0x1}, {0x0, 0x1}, {0x3}, {0x0, 0x7}, {0x0, 0x2}, {0x7, 0x8}, {}, {}, {}]}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_VHT={0x14}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x11, 0x1, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @NL80211_TXRATE_VHT={0x14}]}, @NL80211_BAND_5GHZ={0x38, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x31, 0x2, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x1, 0x3}, {0x6, 0xa}, {0x1, 0x9}, {0x0, 0x2}, {0x5, 0x8}, {0x4, 0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}]}]}]}]}]}, 0xec4}}, 0x0) 06:41:16 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000", 0x2c}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:16 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xf1, &(0x7f00000000c0)=""/241, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:41:16 executing program 3: bpf$ITER_CREATE(0x15, &(0x7f0000000240), 0x8) 06:41:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x5460, 0x0) [ 999.197778][T30176] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:16 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00', 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)={0x20, r1, 0x221, 0x0, 0x0, {}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) 06:41:16 executing program 2: bpf$OBJ_GET_MAP(0x9, &(0x7f0000000440)={0x0, 0x25}, 0x10) 06:41:16 executing program 3: r0 = epoll_create1(0x0) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r0, 0xc0c89425, 0x0) 06:41:16 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000280)={0x18, 0x0, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_NAT_SRC={0x4}]}, 0x18}}, 0x0) 06:41:17 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000", 0x2c}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:17 executing program 0: socket(0x25, 0x3, 0xfffffbff) 06:41:17 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000a00)={0x44c, 0x3f3, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, [], [], [], [], 0x2b, ['batadv\x00', '\'@&&\xdc\x00', 'batadv\x00', 'batadv\x00', '\\\'}(/*%\\\x00', 'batadv\x00']}}, 0x44c}}, 0x0) recvmsg(r0, &(0x7f0000000800)={&(0x7f0000000140)=@qipcrtr, 0x80, &(0x7f0000000680)=[{0x0}, {&(0x7f0000000280)=""/180, 0xb4}, {&(0x7f0000000340)=""/192, 0xc0}], 0x3, &(0x7f0000000700)=""/255, 0xff}, 0x40002040) 06:41:17 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0xc01047d0, 0x0) [ 999.471133][T30194] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:17 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002540)={0x0, 0x3, &(0x7f00000023c0)=@framed, &(0x7f0000002440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:41:17 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x10, &(0x7f0000000200)={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:41:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000003440)={0x0, 0x0}, 0x10) 06:41:17 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a00100000000280000012", 0x2d}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:17 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x1600bd74, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) 06:41:17 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x16, 0x0, 0x40, 0x6, 0x120}, 0x40) 06:41:17 executing program 2: socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={0x0}}, 0x20000801) 06:41:17 executing program 4: pipe(&(0x7f0000007bc0)) [ 999.777624][T30208] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:17 executing program 0: r0 = epoll_create(0x400) r1 = socket$alg(0x26, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) 06:41:17 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a00100000000280000012", 0x2d}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:17 executing program 3: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000a00)={0x420}, 0x420}}, 0x0) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000680)=[{0x0}, {0x0}, {&(0x7f0000000340)=""/192, 0xc0}], 0x3}, 0x0) 06:41:17 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000380)={&(0x7f0000000240), 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0x14, 0x0, 0x1, 0x201}, 0x14}}, 0x0) 06:41:17 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0x64010102}, 0x10) 06:41:17 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0xc, &(0x7f0000000000), 0x4) [ 1000.023610][T30224] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x15, 0x0, 0x0) 06:41:17 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000000000)=""/222, &(0x7f0000000100)=0xde) 06:41:17 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000000080)) 06:41:17 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a00100000000280000012", 0x2d}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:17 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x1600bd7c, 0x0, &(0x7f00000000c0)) 06:41:17 executing program 4: bpf$BPF_BTF_GET_FD_BY_ID(0x8, 0x0, 0x0) 06:41:17 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0xf, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) [ 1000.295314][T30241] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0xc0045878, 0x0) 06:41:18 executing program 5: pipe(&(0x7f0000000040)={0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0) 06:41:18 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000001000)={0x19, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 06:41:18 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:18 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_REMOVE(r0, &(0x7f0000000d40)={&(0x7f0000000c40)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000d00)={0x0}}, 0x0) 06:41:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x6c2, &(0x7f0000000000), 0x4) 06:41:18 executing program 2: syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 06:41:18 executing program 5: r0 = socket(0x10, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x107, 0x60, 0x0, 0x0) 06:41:18 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0xc, 0x0, 0x0) 06:41:18 executing program 0: bpf$ITER_CREATE(0x21, &(0x7f0000000240)={0xffffffffffffffff, 0x7}, 0x8) 06:41:18 executing program 4: bpf$ITER_CREATE(0xf, 0x0, 0x0) [ 1000.644681][T30261] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1000.712756][T30261] device team0 left promiscuous mode [ 1000.739945][T30261] device team_slave_0 left promiscuous mode 06:41:18 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@call]}, &(0x7f0000000080)='syzkaller\x00', 0x3, 0xf1, &(0x7f00000000c0)=""/241, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, 0x0}, 0x78) 06:41:18 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000001a00)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @fixed}, 0x80, 0x0, 0x0, &(0x7f00000001c0)=[@timestamping={{0x14}}], 0x18}}], 0x1, 0x81) [ 1000.768434][T30261] device team_slave_1 left promiscuous mode 06:41:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x19, &(0x7f0000000000), 0x4) [ 1000.821283][T30261] bridge0: port 3(team0) entered disabled state 06:41:18 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x19, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) [ 1000.867223][T30261] team0: Cannot enslave team device to itself [ 1000.902023][T30265] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1000.926618][T30265] bridge0: port 3(team0) entered blocking state [ 1000.959024][T30265] bridge0: port 3(team0) entered disabled state [ 1001.048870][T30265] device team0 entered promiscuous mode [ 1001.065472][T30265] device team_slave_0 entered promiscuous mode [ 1001.079242][T30265] device team_slave_1 entered promiscuous mode [ 1001.126643][T30265] bridge0: port 3(team0) entered blocking state [ 1001.133473][T30265] bridge0: port 3(team0) entered forwarding state 06:41:18 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:18 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @private}, {0x2, 0x0, @remote}, {0x2, 0x0, @dev}, 0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0_to_hsr\x00'}) 06:41:18 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) 06:41:18 executing program 2: r0 = epoll_create(0x400) read(r0, 0x0, 0x0) 06:41:18 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0x6, 0x0, &(0x7f00000000c0)) 06:41:18 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001000)={0xb, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 06:41:18 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) vmsplice(r0, &(0x7f0000003880)=[{&(0x7f0000002400)="1d", 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) [ 1001.269571][T30292] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1001.308238][T30292] device team0 left promiscuous mode 06:41:19 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, 0x0) 06:41:19 executing program 5: bpf$MAP_CREATE(0x22, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 06:41:19 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x2, &(0x7f0000000000), 0x4) [ 1001.337959][T30292] device team_slave_0 left promiscuous mode [ 1001.359202][T30292] device team_slave_1 left promiscuous mode [ 1001.378431][T30292] bridge0: port 3(team0) entered disabled state [ 1001.422137][T30292] team0: Cannot enslave team device to itself [ 1001.453323][T30295] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:19 executing program 0: bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x3f) 06:41:19 executing program 3: bpf$ITER_CREATE(0x3, 0x0, 0x0) [ 1001.493883][T30295] bridge0: port 3(team0) entered blocking state [ 1001.525686][T30295] bridge0: port 3(team0) entered disabled state [ 1001.630997][T30295] device team0 entered promiscuous mode [ 1001.658784][T30295] device team_slave_0 entered promiscuous mode [ 1001.684721][T30295] device team_slave_1 entered promiscuous mode [ 1001.728575][T30295] bridge0: port 3(team0) entered blocking state [ 1001.735392][T30295] bridge0: port 3(team0) entered forwarding state 06:41:19 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:19 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {0x0, @link_local}, 0x0, {}, 'ip6_vti0\x00'}) 06:41:19 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @private}, {0x2, 0x0, @remote}, {0x3, 0x0, @dev}, 0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0_to_hsr\x00'}) 06:41:19 executing program 5: bpf$ITER_CREATE(0x1e, 0x0, 0x0) 06:41:19 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000000)=0x774, 0x4) 06:41:19 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x18, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0xbd) 06:41:19 executing program 3: bpf$MAP_DELETE_BATCH(0x1b, &(0x7f00000001c0)={0x0, 0x0, 0x0, &(0x7f0000000280)="10"}, 0x38) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x2, &(0x7f0000000200)={0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfeab}, 0xa8) 06:41:19 executing program 5: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000080)=@framed, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 1001.969447][T30322] device team0 left promiscuous mode 06:41:19 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x1, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:41:19 executing program 4: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x0, 0x0) 06:41:19 executing program 2: bpf$ITER_CREATE(0x8, 0x0, 0x0) [ 1002.018218][T30322] device team_slave_0 left promiscuous mode 06:41:19 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$AUDIT_ADD_RULE(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000000e80)={&(0x7f0000000a00)={0x420}, 0x420}}, 0x0) recvmsg(r0, &(0x7f0000000800)={0x0, 0x0, 0x0}, 0x0) [ 1002.067688][T30322] device team_slave_1 left promiscuous mode [ 1002.097605][T30322] bridge0: port 3(team0) entered disabled state [ 1002.123284][T30322] team0: Cannot enslave team device to itself [ 1002.139419][T30325] bridge0: port 3(team0) entered blocking state [ 1002.150501][T30325] bridge0: port 3(team0) entered disabled state [ 1002.290210][T30325] device team0 entered promiscuous mode [ 1002.312400][T30325] device team_slave_0 entered promiscuous mode [ 1002.337831][T30325] device team_slave_1 entered promiscuous mode [ 1002.385626][T30325] bridge0: port 3(team0) entered blocking state [ 1002.392519][T30325] bridge0: port 3(team0) entered forwarding state 06:41:20 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) poll(&(0x7f0000000000)=[{r0}, {r1, 0x45}], 0x2, 0x4) 06:41:20 executing program 0: r0 = epoll_create(0x4000000) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r0, &(0x7f0000000040)) 06:41:20 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0xb6c, 0x1}, 0x40) 06:41:20 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000180)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x2, 0x0, {0x0, 0x1000000}}]}}, &(0x7f00000001c0)=""/162, 0x32, 0xa2, 0x1}, 0x20) 06:41:20 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = epoll_create(0x400) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000002680)) 06:41:20 executing program 0: r0 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_ifreq(r0, 0x8929, &(0x7f0000000000)={'vlan0\x00', @ifru_ivalue}) 06:41:20 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x8915, &(0x7f0000000200)={0x0, {0x2, 0x0, @private}, {0x2, 0x0, @remote}, {0x2, 0x0, @dev}}) 06:41:20 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000040)='team\x00', 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000800)=ANY=[@ANYBLOB="ec020000", @ANYRES16=r1, @ANYBLOB="01000054", @ANYRES32=0x0, @ANYBLOB="040002"], 0x2ec}}, 0x0) [ 1002.612152][T30353] device team0 left promiscuous mode 06:41:20 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001500)={&(0x7f00000013c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xa, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x6}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x30, 0x5f]}}, &(0x7f0000001440)=""/152, 0x3e, 0x98, 0x1}, 0x20) 06:41:20 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000001a00)=[{{&(0x7f0000000000)=@l2={0x1f, 0x0, @fixed}, 0x80, 0x0}}], 0x1, 0x0) [ 1002.667523][T30353] device team_slave_0 left promiscuous mode [ 1002.698001][T30353] device team_slave_1 left promiscuous mode [ 1002.724056][T30353] bridge0: port 3(team0) entered disabled state [ 1002.743184][T30360] netlink: 728 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1002.757994][T30353] team0: Cannot enslave team device to itself 06:41:20 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 1002.790407][T30354] bridge0: port 3(team0) entered blocking state [ 1002.795188][T30366] netlink: 728 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1002.811600][T30354] bridge0: port 3(team0) entered disabled state [ 1002.858718][T30354] device team0 entered promiscuous mode [ 1002.884800][T30354] device team_slave_0 entered promiscuous mode [ 1002.925506][T30354] device team_slave_1 entered promiscuous mode [ 1002.945375][T30354] bridge0: port 3(team0) entered blocking state [ 1002.951853][T30354] bridge0: port 3(team0) entered forwarding state 06:41:20 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:20 executing program 2: pipe(&(0x7f0000000400)={0xffffffffffffffff}) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) 06:41:20 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x31, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) 06:41:20 executing program 3: bpf$BPF_BTF_GET_FD_BY_ID(0x23, 0x0, 0x0) 06:41:20 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000200)={0x0, {0x2, 0x0, @private}, {0x3, 0x0, @remote}, {0x2, 0x0, @dev}, 0x4, 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)='veth0_to_hsr\x00'}) 06:41:20 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) vmsplice(r0, &(0x7f0000003880)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) [ 1003.158449][T30381] device team0 left promiscuous mode 06:41:20 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000015c0)={&(0x7f0000000440)=ANY=[], &(0x7f00000005c0)=""/4096, 0x163, 0x1000, 0x1}, 0x20) 06:41:20 executing program 2: r0 = socket(0x11, 0x3, 0x0) sendmmsg$unix(r0, &(0x7f0000002440)=[{&(0x7f0000000000)=@abs, 0x2000006e, 0x0}], 0x1, 0x0) 06:41:20 executing program 0: r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) sendmsg$TCPDIAG_GETSOCK(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f00000001c0)={0xec4, 0x12, 0x0, 0x0, 0x0, {}, [@INET_DIAG_REQ_BYTECODE={0xe75, 0x1, "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"}]}, 0xec4}}, 0x0) 06:41:20 executing program 4: bpf$ITER_CREATE(0x1b, 0x0, 0x0) [ 1003.183487][T30381] device team_slave_0 left promiscuous mode 06:41:20 executing program 5: pipe(&(0x7f0000000400)={0xffffffffffffffff}) read$alg(r0, 0x0, 0x0) [ 1003.233855][T30381] device team_slave_1 left promiscuous mode [ 1003.257437][T30381] bridge0: port 3(team0) entered disabled state [ 1003.285626][T30381] team0: Cannot enslave team device to itself [ 1003.311633][T30384] bridge0: port 3(team0) entered blocking state [ 1003.323692][T30384] bridge0: port 3(team0) entered disabled state 06:41:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x9, &(0x7f0000000000), 0x4) [ 1003.361037][T30384] device team0 entered promiscuous mode [ 1003.390331][T30384] device team_slave_0 entered promiscuous mode [ 1003.447236][T30384] device team_slave_1 entered promiscuous mode [ 1003.476584][T30384] bridge0: port 3(team0) entered blocking state [ 1003.482978][T30384] bridge0: port 3(team0) entered forwarding state 06:41:21 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:21 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x1e, &(0x7f0000000000), 0x4) 06:41:21 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x1a, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, [], 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x1}, 0x40) 06:41:21 executing program 2: r0 = mq_open(&(0x7f0000000000)='-!\xf1\x00', 0x0, 0x0, 0x0) mq_notify(r0, 0x0) 06:41:21 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x0, @dev}}}, 0x88) 06:41:21 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xe, 0x0, &(0x7f00000000c0)) 06:41:21 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x1600bd77, 0x0, 0x0) 06:41:21 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f000000ca40)={0x0, 0x2, &(0x7f000000b940)=@raw=[@map], &(0x7f000000b980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:41:21 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2, &(0x7f0000000000)={0x0, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @loopback}}}, 0x108) [ 1003.708784][T30409] validate_nla: 6 callbacks suppressed [ 1003.708803][T30409] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1003.748676][T30409] device team0 left promiscuous mode 06:41:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 06:41:21 executing program 5: r0 = socket$inet(0x2, 0x3, 0x1) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x40012020) [ 1003.761988][T30409] device team_slave_0 left promiscuous mode [ 1003.801430][T30409] device team_slave_1 left promiscuous mode [ 1003.816976][T30409] bridge0: port 3(team0) entered disabled state [ 1003.836963][T30409] team0: Cannot enslave team device to itself [ 1003.863428][T30410] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1003.882648][T30410] bridge0: port 3(team0) entered blocking state 06:41:21 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000140)='SEG6\x00', 0xffffffffffffffff) sendmsg$SEG6_CMD_SET_TUNSRC(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=ANY=[@ANYBLOB='p\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010028bd70010fdbdf250300007204"], 0x70}}, 0x0) [ 1003.909821][T30410] bridge0: port 3(team0) entered disabled state [ 1003.940303][T30410] device team0 entered promiscuous mode [ 1003.963306][T30410] device team_slave_0 entered promiscuous mode [ 1003.998118][T30410] device team_slave_1 entered promiscuous mode [ 1004.014454][T30410] bridge0: port 3(team0) entered blocking state [ 1004.020803][T30410] bridge0: port 3(team0) entered forwarding state 06:41:21 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:21 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000980)={'batadv0\x00', 0x0}) sendmmsg$inet(r0, &(0x7f00000035c0)=[{{&(0x7f0000000000)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x10}}, 0x10, &(0x7f0000000180)=[{&(0x7f0000000040)="a9de23c71511345762c37070992f74225aec5118d0e5d7d9241f05a58c98a3e3fd260e2447c647af16db3392f990d9", 0x2f}, {&(0x7f0000000080)="f88b0309ffbbf5b6ef08c2acd9e94b5a8f648bbe57143dbf4157f85b43341cbbeaff622bd5a11a3fbcdb53deeb8e3f4ad9119a1365c062a87d2269dd4c02da21fec38602e5831efa59e560979792aab52ee9b78ad0480ca8a4a8dbb12c65f9fd0a2af6fc361b7c5cff910de9aff2494bae2f2f74418c07b9b454692b87c284f63d839c964f9a17851ab12333acfa12113fa65f14a58f88d853451d0e6df0401002d5f6e22fca31842fd9335c27e6ea431f974edea50797c7d94dfda78c382845300abaf6ec3ab0faacf71f2bf387a08c3e9293e9c0e3bc2ccd67b2025adfbb", 0xdf}], 0x2, &(0x7f00000049c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @empty, @remote}}}], 0x20}}, {{0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000280)="6598e17be704ed0df6ac9b5949e138c1", 0x10}, {&(0x7f00000002c0)="493980495b2cb91a44c61abb712702a509c32d4234c21e877d7acc6b7d3f040f88874df9883b49eaab2b3d41d375ba28ce0fb10e42172a121991ce56bc768456c91d3beb6999af9212fc3c3cbebc3121a362c452c2abdc2acb11422b6006bf9842de43ebd15703a118b65dcfe243f3e30f170c119aab9feb71f3096b6dd63e43eee32b7ca88808107f8a29bac022e86b12925f3a2f1a04f6f27f261090ac882e9e743f6ee7061cec07f64af8e28af9c177ae0007b8af84f96b5209d38b5ffcc93ff0c7bdd98e858d7ec4922d7048ef18db3e", 0xd2}], 0x2}}, {{0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000500)="a1fcdacbfe6379fec741e5f5dff5385519c203e265360d08e954cf1e0f01eef66c1079d8c88c81497ca135", 0x2b}, {&(0x7f0000000540)="adecddcfd4c77b326a629cdce9ae3e66fd5b1800d73eb05b340be39103163fdb39705736b0668102e93b2f2335e3572d5dcd27cebaad91e5ad1bfb54bdc6dd048fe7531545866363b391677a0322434f8946f791c79f46657d9f01c1c1ccd2300037de7bb3278b3cb27e39c05048945659eccf0d44eb890d1e009eb597140c362160fc7983dd8975ada17e299982681375b99db227ec6a4cb3794c1e", 0x9c}, {&(0x7f0000000600)="35e2e34a806312bf8a", 0x9}, {&(0x7f0000000640)="ce51892711383cd66ea5abf80f5a71bdbea39358579dd9fd0ff8617481b04c090b56cc2ff5c186f01d22c70f536828f2b98cd5c8e6ebdfc54d9cc53df16ce46b9d8028e3c320b4fea2ca1462ef5fc7c80b3c3b30a2612926861570cb48b291da2929645e09dc1bd4e4ebc0ce727d634526d6ab25ec670514c784d1aa03640897438dcc5630a2f74ae6bb3ee4469416ab78124dbe96d969b5601f3f517d91b92c376b888e16ba1f332f721d68a2f4e94fe606172587f8153af420d871c9723d584a01d21bb6eec6", 0xc7}, {&(0x7f0000000740)="a2f2efb60ec4", 0x6}, {&(0x7f0000000780)="7a75228cb73a3c7106926d154ab509f517ae9166ae624eb0ad5b5a7c421489b0bb3156b912a2c60bc1bd3d0fa338759b5d530667ebd7b256e20502fadf3d196e62ca8618c7a6b3ebaf3d3be8052bc11688761f543e531bf442a9829ae17cebe3f4ee0a3965f2dc443d48cd11c02bf4b2069dee5318c5f3940fdafcc4b19dfb7525", 0x81}, {&(0x7f0000000840)="aa1787dd3296ee61383ac03114b7ddc5465c3085deecf1b7280e1541e2f927a13afbdb88cc2882f2fc37e0a58af4180902ee92823523012c4a7d396dc18e85bcb94dc82174f14e7e6b7b96224fad8c45792f39e8cbd2c70d5b62f700243c0297ee08f6ee50d20590c53995457e23e311151232d133a6d555ce5b6141ad552746fd8ebb87a5db2ae631f9771fafd742495a71e8cd57b4ae686a087be7faa796e47bf3e9b11461ecc2f74636cdff44774e4ada410c713e5d3ed0650547cc5d8be5e29eff3e9294843cbb2f85aec4bbb755260b923cf8cd3dda9d9d40ce4da9d61ccec131a56af04b01c37aff54f76aa8a8ec8cde4790", 0xf5}, {&(0x7f0000000940)="2f138cfee8e88038d47bd7b31f29cec493032622875d7106644f", 0x1a}, {&(0x7f00000013c0)="8d07ac20dcce1889b291dbd43fbea4068f38fac27fdb4436a47f17be5dc2ebdc355075ab890ca98b75d3dd569eb4d074a1076ccacaa61c30e242845e83622a11d3b91789a8b6c7c5b0d6b3cc8ea004307d64a13685c755090158d77cdac9c560cd364ab79ce4bb32e528f7d99ae3dcd498ae6c995c28b771504c712cb9cca0ce3af2d65e444735b58840f8aa7ab0394be96edba0d6900afdb4c6c913ee115254084a3ca8", 0xa4}], 0x9}}], 0x3, 0x8000) 06:41:21 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000015c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb010018"], &(0x7f00000005c0)=""/4096, 0x163, 0x1000, 0x1}, 0x20) 06:41:21 executing program 4: bpf$BPF_MAP_FREEZE(0x16, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:41:21 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, r0, 0x0) [ 1004.070082][T30423] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. 06:41:21 executing program 2: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000010c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000001100), 0x4) [ 1004.154763][T30431] netlink: 88 bytes leftover after parsing attributes in process `syz-executor.5'. 06:41:21 executing program 0: bpf$ITER_CREATE(0x13, 0x0, 0x0) 06:41:21 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0xb, 0x0, 0x0, 0xffffff7f}, 0x40) 06:41:21 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000001000)={0x12, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) [ 1004.250759][T30436] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1004.284419][T30436] device team0 left promiscuous mode 06:41:21 executing program 5: perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x2000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1004.296873][T30436] device team_slave_0 left promiscuous mode [ 1004.320465][T30436] device team_slave_1 left promiscuous mode [ 1004.343384][T30436] bridge0: port 3(team0) entered disabled state [ 1004.379188][T30436] team0: Cannot enslave team device to itself [ 1004.407899][T30437] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)="2e000000100081aee4050cecff0e00fa378b25db4cb904e473730e55cff26d1b0e001200090001005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) 06:41:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188430f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0x2efbf}, 0x0) [ 1004.429210][T30437] bridge0: port 3(team0) entered blocking state [ 1004.470166][T30437] bridge0: port 3(team0) entered disabled state [ 1004.503150][T30437] device team0 entered promiscuous mode [ 1004.536041][T30437] device team_slave_0 entered promiscuous mode [ 1004.561583][T30437] device team_slave_1 entered promiscuous mode [ 1004.581129][T30437] bridge0: port 3(team0) entered blocking state [ 1004.587535][T30437] bridge0: port 3(team0) entered forwarding state [ 1004.640951][T30452] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1004.654408][T30452] team0: Cannot enslave team device to itself [ 1004.660603][T30454] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1004.677794][T30454] bridge0: port 3(team0) entered blocking state 06:41:22 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:22 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r0) 06:41:22 executing program 5: bpf$ITER_CREATE(0x21, &(0x7f0000000280), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x1}, 0x8, 0x10, 0x0}, 0x78) socketpair(0x1d, 0x0, 0x0, &(0x7f0000000000)) 06:41:22 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x2402, 0x0) [ 1004.700312][T30454] bridge0: port 3(team0) entered disabled state [ 1004.724543][T30454] device team0 entered promiscuous mode [ 1004.762997][T30454] device team_slave_0 entered promiscuous mode [ 1004.788344][T30454] device team_slave_1 entered promiscuous mode [ 1004.796552][T30454] bridge0: port 3(team0) entered blocking state [ 1004.802941][T30454] bridge0: port 3(team0) entered forwarding state [ 1004.813117][T30465] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1004.825758][T30465] device team0 left promiscuous mode [ 1004.831361][T30465] device team_slave_0 left promiscuous mode [ 1004.850651][T30465] device team_slave_1 left promiscuous mode 06:41:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f00000000c0)="2e000000100081aee4050cecff0e00fa378b25db4cb904e473730e55cff26d1b0e001200090001005e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) 06:41:22 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) 06:41:22 executing program 0: bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0xff, 0x0, 0x0, 0x1, 0x726ef2c43b2deaf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x67}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x18000000000002a0, 0x2d1, 0x0, &(0x7f00000000c0)="b9ff0300000d698cb89e40f008001fffffff00004000632f77", 0x0, 0x100, 0x6000000000000000, 0xfffffffffffffe6c}, 0x28) [ 1004.859149][T30460] can: request_module (can-proto-0) failed. [ 1004.874659][T30465] bridge0: port 3(team0) entered disabled state [ 1004.906430][T30465] team0: Cannot enslave team device to itself [ 1004.919808][T30467] can: request_module (can-proto-0) failed. [ 1004.929891][T30452] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1004.948586][T30452] device team0 left promiscuous mode 06:41:22 executing program 5: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b80)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000680)=[{0x0}, {0x0}, {&(0x7f00000005c0)="a1efb10da04c12f1a8c39adfe12b2b0412d0cc7f5011f78742a446b799342375f7dec600cde00e2e93473d75cf8e32770c6ab3f814731e0d397d09ad8859da1f5955716bf5411d818c09b3bbb5075c6260f3ffc09604c5b8787d22", 0x5b}], 0x3, 0x0, 0x80}, 0x24000800) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="b702000000000000bfa30000000000000703000000feffff7a0af0ff1100000079a4f0ff00000000b706000000000081ad64020000000000450404000100ff0f1704000001130a00b7040000050000006a0af2fe00000000850000001a000000b700000000000000950000000000000000e154cd844a14eeabb140172c26b1914b26c933f7ffffffffffffff55bb2007ee51050512b5b42128aa090a79507df79f298129da48b55004cd4bf901115e17392ac66ad029d1c000006146001e04aeacea799a22a2fa798b5adc43eb27d53319d0ad229e5752548300000000dbc2777df150b7cdd77b85b941092314fd085f028f2ed1a4535550614e09d6378198a6097a67081d337af2abd55a87ac0394b2f92ffab7d153d62058d0a413b217369c8eb6712f3024b7041b1df65b3e1b9bf115646d14ce53d13d0ccacdefc5f9094fa737c28b994a8512c816fdcceaede3faedc51d29a47fc813ce3d32cfc7a53ac271d6d6f4ea6bf97f2f33e2ea2e3b4300bcb3fdc4b4861004eefbda7f54f82a804d4a69bf9bc5fa77ee293fbd165a5a68488e40b030166565a097b1b44b451de736bb6d43db8db03d4b7745fef1d04ec633dee254a6d491b8496da787e8f8f92eb6f0e8c7db3503680e5e5971ff4bf23242a1f2c28159f09943b1b0452d1b72183aacf4a84f9130b775dd4e9e3070756f97ad791fa909ac06b57479321a0574fb304bc2a1681989328c8ddc20ea011bf5742e0ef94234db8b20ce3f9f16cb7fc20fb4791ec85821d0c48fb657c29b309c73f0977e7cde65a82b94c461d7962b0d2277a84af326f37f3e2c25a61ec45c3af97a4aff3fc8c108755f75ca13fb7c8bbd8b6e7dac1aba4b20dc61e058a4dfa7e85a8bdf1d41a2d8bda74d66f47cc180f82c5f573c6d294d3665016ac59dda0fde0745db06753a7ac7fe13cab6692422a46e9ffe2d4a2d32f7528751313694bf5700b20ef0c248ddd3da32396a614cacad4aff2066bb5d4045c9585638c2153a6eee01738b0c10671f4f619b7dcb98a6273b8c5f1e24d9f679e4fbe948dfb4cc4a389469608241730459f0123fd39206000000000000eb55d000abcdb040f6266e548b01623258a141bd587cc9dad46de56ef907b059b90b8aa49afb9a79ae5498f6589880ed6e657b9c670012be05e7de0940313c5870786554df26236ebced9390cb6941b8375d936a7d2120eca291963eb2d537d87cbb54e588ee5d6944ee4de5c183c960119451c31539ec7d86bad7b22009f786a1a4388d31e014df6790e1d7f0cda06a9fa87d64cb77872a0aa9a104e16bb1a2bacf13464ca03aff14b9aa4bd9539f5096412b92012e095b84c20243ff98df3347f0e399d1b9f27e3c33269c0e153b28b2d4410572bc45b9d3fa02208d304d455c363000000000223201780200c6ed79547dbf8b497adda77f52f2cd1d0000002000000001c800000000000000000000000928ee53595a779d243a48cea769470424d28804c026ab7f4a5c81921f0128dfd70b438af60b060000000000000056642b49b747f3bf2c01808b6d7d748308eea09fc361b4735efbf3411718d6ee7aebf9ef40662d7836d252c566f5ee938a836804ed3a1079b0282a12043408cd61b687dcff910700000000000000456f7d2a42bd13da2022f23daec61854f640f701db0276652f6c74f20675eb781925441578e93046aaddea394cd8fff71c2710a7ea8ae0dc214e1cc275b26adfa892e6de9200000000e50e5bafecea4d4134f9d006c8d6883eca5c9c58c9e93311ab50fe82d5a96b09c68c71de2fea65559eb00e76e9d0ada209bcbb5c252b28a60ca770663da451790cc36000906d189fad98c308e39bd5ffb6151d79c1cee1cdfba05e2bbf9ec5499f79650f2e33bc3633be3f00000015762e5f5a3a0bc33fdbe28a5ffc83f2f085185cc92fe7f7919309d6adab4b7e508e5bf024ed8f8a005f2bbf96c89739f5d81e750d50515a59a3ad09e8802e8f4f535437dc0fc9d5f99a73145dfcedad69da9cd4375c624600e78f4458542b14f29611f95d4a31838eeb20c20bb82aa31771cd379ec83554cea5e6539db7384e1f58d81f2f2653c4d9818708e27c89b552d310ab16bce9c764c714c9402c21d181aae59efb28d4f91652f6750b6ec962802c0320f8059195729d60c534ee8e8ff0755b67fe4c25edb85bcff24c757aa8090000000000008c420eb4304f66e3a37aaf000000c42a570f0e9dd5fd545470f862f8c3c14fa9e2d1e877b0d8ca84c03f859e85e6158f9184bc61a9a284db80e4636c25b96174327d82761c26e329555f9290af40000000009a0000749efd3763655500344bae34347f5ab0d534b8d63e4ca3b671f2de1cdf519192c6b59a601fd419a5c16e2055b850580994484305d7a1759782e4c571ee855a47bc00edf5e9020c09ab004321610b857e8717764b633b21cb32f0e03280e09758bd445ab91d20baca005452b79d7b574a247f1d2fe45b3c4e93da3d51de647c10dd49944dc87c92332af00f191b66b6a6f732a91f0a2e9120be61e58c79d497247d278888901d44bf77ff246605a644e9e3d769db497c3960dfde12182334caee994adc38a436367a54b9e182b78e9a0ceb9a2c4f63902c1ad1a7c5a08d0920a23c2a86abbdf357849a651733e57f3101987602688888ccb85c86b4f8ffffff5f000000002c331fca0e541b7ca2119ff0d61c5224550346115b43f8b1894c8fa8a14dc4810f61ae96c18cc71300000000000021000000000000000000008ac427c9a46157a3609b6fd9843ee19ec647249a9375de5858818f3c4a4fa6ce46f4d42b07199de8b99231ace58c77a23b0000e49666c464d35ca9b50f3ed3b3dc8c17a23692759ccf5a205311b7ab22532697b861dfb54609fd88e6043bd52ae84c1bb0c8a6c769f952283a1f4e3842edb3d42c68a2102fa1296dfff4a979369b0e8ebc62887aa46e820a98e353047dbf0686d147357024eb3cb94f0489cb5ba0a56aa046b4dc521a3d9356b4b8b5917c4c8604000040e80063bde261fd00000000007271e28ef6806bc8e139c49b91c76b0d3958f7f05b47d3e519f1634e8fbd8d31330d89069f965ca2ff93060ff073b3a113e47edf76f7d1b8b90bc0df4cfb0b9c8c80158b44ecae9420654f7016b0aac117087406d343e27b372d6027ab2aec8f2bcad7fe6bb932bc5751d2974e95455a277f9a9aeb29aa185d7fe74b25a3b472bc7bbdd2ac5a1ea608e8137ace03361607cc1a84be659355629ab13ad49008c3fcfa2423439aaf3e36cbf537801d3b384d63b95a3607961d5b59da48a0155e8e42cc13c702cc40c89cf86c2021d72f9f4ab1b0e0a755a5a39593c93871ff7eb5ecadb64837a2d887236cedaa5152e3d5864e57581b61f2b0960600000000000000265f091e7bce17d20604c5ab751773a5cf2ed6c94682ebf13548209b8a719a7abc06ed03832bf274707c7c970edc20d2cb639ecd58709b05a2009720c797103346a6901913618738679d4e0af53eae997eecfa0dc3dcec19d3d901ee75c8710470d9eb6f62c5c721883f15448fbade7716f159af1c8dab05a933746c16b6e93294b561c6715a32a394ed1e6c014e0c931bfa52c58c6f34d64e758a7a7f618c2356eeef60fe9667eddfe47dcbcc55257215c8ae719dc1c232fc6699ef83f85887d04a543030b4328ab48744ac23ff56fd2da52eb9f92eefddd2d92d73ac1b111ea8b1e1fec36a3579879acfe366d393f1fa9cbe08d9ba57a443643e9cd2519c88e91a5e458e66ea26822d27a45e0a9c10a127fed19e36b5264660665dfdbeab3ec99495639bc57155d4dd919a95eb4c25a08cb6e1a9b4d6813a0fd07a4ad9df661ab8b86a932db0df838b178540d88be2983200703864a3b9e1482cb479dad6d34d211b05267eb1355520e9ec0c5014b0832f7fb35782fdbfcbf5e23a7f5d51ea480371748d18d8e10608ab8261fe058d1732f28814a9981d84a04a2bb36c89bdd245e3293a14df1ac567300000514f103abd387d6ef2d9d94508ac0f6135c8921279573e9ef585980789a92b9848906f545559d32112b5040f0776703363249ca98499efbb9e7362e4999594c1086d8954e9469db01d85fb0b9b3148663e9ea2e755f96c2986712d25a9a32565e947d03c42215118426d5451c262985bd571c363d260faea1db53e4ff3427c90aefa2662a1c2b28b0e020e872bda1d39da508de5dbc37d03ee056b2579a1d16799589a265ba6ae3ece8887c5daca8ade81ab9fc79a69822c9fba4500b1f68ebd695a5163007f2f9ef8b3c6b1b13340671f1ffc483528000000000000b9a4d370302b12101dab71d3e31160a40250ef0cbfffded601dce47f40f96e4646787cef5ad6ad4ee2d3876f9cf50e45d021a81ba62340c4c352581163c48938000000000000a8268a8247adcd7165421170bfdf5df908f207498ccfed607b10c54a68ef02194a231060b0bb2a0ef1a496db598a95838d842d777684f9c827979a3b2a61cd5e3efa1a2f3f57ee55237d7e56595e5d9e0c6bf104d3a04b23f9090000000000000068e5e368381f28327c1e24d740612930680742cb8925bb3d377a9d02654a0fef31d2ffd02cbe197cd718ae25458975dc762d29b843069c2ea1ed94c713570286e5478e01409b844e16f1a74c025f05caf5322736aabb89970c0ae3c55a54974da7ebe936692b1e982908703989dc439f33b81551c2b0b11dfa2dfbf4d5005ec5f05c6e556fe62f09484dd64d3b8c2d7914ab5550816ed0f7105cc4051f7c7030e6fc5fcbf1d5113f9a01455f5a8cfe8ddf1ad331841835f34980297cbdfb53d4c602695ae0a14094c24218dcb6aa801754bb7055b7379588a5a5644f4ad79d00007a26562ecb3ab190ddee3969617fac62fce14ebaba623bf0d3056dd4f5988af578d43625b4b632b3142e2aad5b0b8f2db873d56e2a3b5128d80544e6c1c94071ed1d15da95d79d4855160100000000000000000000036df55667d3f71bf5b7d8c4842a00531706131ccc9c47ba3f02d8944832ef5074e83ceef26f1eaa8f3143c11db41a73b9cd533e0bcba82c4a73b45747a572825ee275c94b3b39b9d1024ac6786e577af3b2f31c67c5e9afed80c7554177ee2d868b9bea91ae643eb293d42df8ec45a440811eab9a98baf15658fdf29cd9ff676bcdd4b463cd628c3d64f30fdce35f2060829870055e702fc0ad5045050992a848b928c1ba45e6d22fd4c274d4e29d06da1c80573bdd897cf57367d95f9a3e91a6602c51acbc1ee073644db1da9f1ceef0f9c126c2be2f6887d9ce2f"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x2, 0x0, 0x7f, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r2, r0}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={r3, r2, 0x4, r2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r3}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) [ 1004.968651][T30452] device team_slave_0 left promiscuous mode [ 1004.997097][T30452] device team_slave_1 left promiscuous mode [ 1005.029798][T30452] bridge0: port 3(team0) entered disabled state [ 1005.057244][T30452] team0: Cannot enslave team device to itself 06:41:22 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000004880)={0x0, 0x0, &(0x7f00000046c0)=[{&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000002340)="543cc6d7461541f7919b8ed22e3eb4a19b70cef99959a234c3e09ae4fa87abeded25740e0940b62c94aa2e96308f68e97770f0fa505d7dfc8f393296ea9854e8f2d07701baf03abea9001ceefe70828a35", 0x51}, {&(0x7f00000023c0)="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", 0xfa}, {&(0x7f00000024c0)="f6c02cf610c9c7a751c7792c832719eba4a68b778f32a0f3e4870f6428200408d05db6f22faf3c42cbc304da034ff04601de2886744029", 0x37}, {&(0x7f0000002500)="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", 0x1000}, {&(0x7f0000003500)="13dbd2c70e306653ffaf33dd299bcea4e481c4bc4bfe799e02446475d8b610845308f08de7d609f23f5bcdc52a11fad7c8950e33b2c750b9534a19d2a453276a8ede438918e3a7540f241d393406c80a49bb2c71e65d5b1344ea6ef1f4603928b802e631ade16fb03f9503e8bd6b46af613a79f96885e789f9104832ca2e8d69c0d6aa7d4df0410d82561d", 0x8b}, {&(0x7f00000035c0)="306c573b3282901730c0d57f7e9b001dbfbbe48a0ad741c85503e08bf20b8c0f925e1814f2bc0263e4a819c0d528bb22079f71edfd3b53d88f5faeb2057d5113174ebd87be942e930c3b8f099ff846c62dec765e45d67537a5ff51f425f95c00ab4967d8a5819597631743f51e629bcf7064b90722cf61a6a864b2916a5266a36ad794", 0x83}, {&(0x7f0000003680)="95ca8ed576760beb52d3024f340b1efe11b5fd7305268773e42e62648ed13d75f9f44949a94b9cc6383b4781be75e64898942c1ef034fce5b5dd63a0bef12274879139688e11c830f7e6ecf4e4e0b87853d7c2d361d39ce624f82a6f758ebd9bcf41a525c7e52adc5da2fae211792eeae4def9bb9da822fcf2e50251f791a1290ab9bdc6a4e9cd4a515a541c4b76255615d9a3a9cbbfd9ec59bae086a0bac9e9dc0848f08f12789025f36212e992bc2044ac29a43762586899eeaad56cd11851d3084ffcf99a386a4277ca7a63bd05e5b727ec5cdb7219bed0b696f15fcf3a1cac67548b5559e4831183bc80ff1711bd9eb79159ecb3645bd6c3b88a6d92b5785fce6035b2656928abf535967db3f7f157e47077161eb108597160b28a646659f08979f2f425683333d816e3f8fd535cb356528e86bbd6ba467d78b3e9681bdb90b60e5db5807d60f6b469777c90b930a5ede43818c2eff2ccc58ad176a99d0376cc76c417c548749c357d7d77661ba572d934e58194ab55ed5879c3771fade0b234974c05b77ac7501950902f3a1bba0cb10dccebc123025119659ed877e80bb471ede7933ab1ce4d92e3988886eb77ca4cb9878692fb35fc6ba2c34c628c24a62c3623b48094229727586aab164f65421515d2521696d2ed73e322b5954095fce7e8c2db5a0e19dc8f717b7b69a67be5016a341748647092a3e1d595f2d41421835faa1ac1db207dde6329776ace0951ee2e0ee8b8e2bb3cc343f31d3c482684631fff80b516f7cf875ed710cf3adc909588cbe71a1ec434df227dbc9e7fe9f3166e9583a41e7189b6e131ba0b377d82391bc0ee20d3e403618cfe61a99e4efb34c35baf23ae41c6ce15bfdd95a7aeb974407beb9f392da2ff990b4fb5db149abb22de301d5be39035d938385e684574de538881029c2fa5b4ba0e8251afa24b451a9bdeb4f21ae83e0e4a7e90ef3be376444ebb3021d5c6770158264622bbb87072806db16f58d8f74eb43d7b4d70039fe7d3cbd77d87089a784ffc4d40591effdbbabc2061e72d42902e98daec566fa091b482b54667d4bc151235445283842df2fa478fd98a64f4b5cb68511219c04a28970d722a740e27b3cffa8fbca211a0ea27a920232532063da6b12221ff4d71c0fb729a74e6ae6578bda64bece643e420dd24cb9d3048f1602195ce5b1da085705a49e8fff53441404ec47083974ce26ece2558487ed939f709b2589bf5336babd979602c08b326819f2343ee9737336734a053d36d06b9e39209a3118f6bec49a99a07d8a16009e8c2a0543af8fc823c0809fe6293e40f2b369e3c825590307e325ecda7bedf730f84f31b936607593a5c1403a4be0a44f578bf42ec9494ed55f31519075db052bac5d4ea5bffa49aeced8b469fcda0582ba88a17084c0a2bccc77cdf23b20192e168a680e6a0c75d8724ef338493f9b7559e9821bb1dd03eb5798d43c4d5f507b8022ef476b845f76edc17a295c29b67925fe64af5feb727733d3e3ff210981528f33cf1b81ee636339c5580b4507620e0f3274cc6d2e8ae193725893c30d32ac6f51369e27da1ff308b1c24087cd3976ab7b99379d4857af15686081384411d2d1545fa7f2058536b2c8e9058fb8f11fd926f5e207e2dbfff4e4fbf18074c28379f31888c05a6d982cd4db8786158423ba3cdd8d1bc3218432a28dce266f5700d8ce03c8a7d89548b2d560c0f6d8cf532ec1a9aca4dda48d526fb4e3147bda44f442e9a57874fb7cc861171fd98928a8af2233c30d0def7236def287545815a66adfa3aba539224c7aa7b6ef90bf010dc60f895bbca160cac425510084a0bfa107ce5badc748e42be222afc9c9dcc44bbf57d7b6479582dca39b494299d5c14b68fad26a313fe93e12f5d9f261f532844c1ce284828be78ebb5519be7880d8c3216387ad04bffdaa961c7ff13a02588f52e462682a3c8c9963dfd479917a48667654775358b7570a29a77a92d468b7fc4de3766f9cc91184eddc60277076007cfa3dd5c4563624e9d231aedef60f9ad4acc6d8da62c8b1633cbb54dadada29990001351701e9fa1e66883715bbb9fed7abfe57b31bee9342d058e8214c2930e95553008320180417d7579cfbb3701a03658e73f29c2739860668eea125ea17b4d2b465d352d531a002c6b52bb5a54ad9105e97c8f4b8411572578232cd97e0095d07b8cfbc3235168c046f9cf128f0073d0bed24e7162e436d43b31594df086098fe0d97a0914441a567f5462c9f587bc41a6b573ae3fca5a5d0f805228b23490ea42b4c80f85459ddae8d52fe040632bcb38f497a089b45336a48bd409a7dd8b2323bddfc89a36a5aedf9209357e37e54eaf3c74ecb2e9aee0d96abac55cb47200d0f085e003c4b4a35e7a53ee2741fbf6f0a42e2d127c86c3ad571dc28bbfa25e354f0a472cbba150efbeca80440d514a938d26f69890f86d7097f59cd9cc02c0ba649b8a125561bc96e77da3d491a004b4508660c17f90cc3492d6085f384068e07345cf9bf566ae1f064b6ba0dd1e1b04181a6745964528084db9b1cb6239714174fa189f103fad328790b9ceb1edaf6b45d9d60cf878640f77418cb6de44a26a16599e282e6b484538c9ecd77b792dcb11aa590137b10a7ef599e4245c35b67b610806d30775d6cc088c43388f948880fe7fdf1c3188f2ebf1203adb51df1185146925e348d77e324029a14d63d3099f883637f5656f5a42082f664935c692755350728094190c80008a0eeda075402818184358ee7a063f4503617b5a583370c1ef2d07bcdd4dc2c1f7424b80eee984b8f3d210c3f99f9788d66f07ac7399c0c9189c663a2b6f179ddd811b9dab3927b4312da2603327bf0eeedeaba3357d60f9b4e9ae5fa3aaba24f3d0b5a904adf587a0d0e6cfc11cfbccb3ee0531dd326d7436b9082cffc89a6309589e46221fed7333e34dcd15cd2f464924c763071db79d475a18896ef134caae422ded372ce194d8cd378994f93258966b6725a6c08b003efd7301631d5d3950ed91b6611f330aac8d172b2dedf9f8e20b43cd6010147cc1a33185f2cfecba03af3b4f219ee4d486cb09191c12af8c8d192857f2b3e21a924b7c10bbefaea5d225ee06766d47e8028f3ddaf1288dd2283c437e8bb7f5f0289e89f6c962dc6f2644c4a6259028086179e25af282d997ca9f20d7a412a664818d08b671d931a1bd55a6edfa23d534b6ca86141b04d9d2633a358e9d7b2aac9535f2570491a213fc1620a69a25228e26c76634235101d8e77e9057083afdffcecc8b8820b1dac54df8fb567b70bf936acf4a019a6f608f00e225a006dc8489fe4539ae8aacb5adea1db56768bb6e3efd09daa856a3840bd20e7a6d5518a0276474c39d37b3ff7dc437488640abd9a6688494b82a6c6a16ea1c4fcb28a3932d224c9d57d85f7489b2b0bc317ccb56ee52ce9ca9ea01462d47ba8e80f18cb43d72aff97462624b79786594a185bdc48d7393822d1a39e54789f78123bdf2cf50efd697b2b1bd31191561ccd8070bb574d045cf11e8b553fcaa0296a3b8aba5912e44c1b9d924c202381803f3e0439add9b77f27811b4e26107078b6d7f6f7625a7365e9f209b0464e050daaacec59442efee246c5e43d7a574777078da0be712bc2d834381e612f91b32ff7f418cf2f0d1df908527b73ab13555a56fef3c3ad730d10a7570b10d3e101c80d0da2d90b6b7a1a56cd649baa38b95c1eae5c9b42228ac687e5310c778db88b87f1b4a9f41f74a4384b93380b36cc96826b8ad20105f70b19381c4d0746e896271ea1617c7117019b32508a6bead7a14c34f34689e486a570a9b1eccf57074a7c5acd3208d0aa9388e6e94bae2e5df8a3b6210bd038be695e64a787336351aaee242f0fc7cdd0701c49faab61325592e2ce81b87771701cac2e0d46f57ace552b7429c7f2b5c385edecc89b0501c606ff5a6c35e2c281887ae68bf59b486f60d01dbc75879b5e51150c7ad6d2da123cf6662c4b6bde178e4edcf3ab3fdea381e96080213488b9f8875c55a7ddc993b0aa491e7f0747dda96015e5959f706db429f92c571f0a2b6e625794a84707845aa1d4c04d925eba9f8aafd785cb7b9ac3c5c100758daea8ee08ccf55e9aef76bdfc0b9184a6e0e83d2633594f9ceac6820e49777418adfaa724b02e154d1579429684e6f9f150c4a1ea35fdab590db63e27d7ebd7366a72213aeae1f299e03ebe2fddd4dfa8501cd4770426d127f192e66cbe63bb725871f9fc053b58e5e5285e5d686d61e1fc87b5ed924143469c3e18babf73f09da45b3aab4c42701b7123b654444f7daf2da56acc041170229b6b102f5b26b50d1c0aa45a2e74d07e2ac0819caf4aa18484f4d97c20ef8c7838e6dfbd67117388602b08a", 0xc31}], 0x8}, 0x0) [ 1005.076651][T30454] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 1005.105681][T30454] bridge0: port 3(team0) entered blocking state [ 1005.166155][T30454] bridge0: port 3(team0) entered disabled state 06:41:22 executing program 0: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x3}}, 0x10, 0x0}, 0x0) [ 1005.231024][T30454] device team0 entered promiscuous mode [ 1005.252895][T30454] device team_slave_0 entered promiscuous mode [ 1005.271133][T30454] device team_slave_1 entered promiscuous mode 06:41:22 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x26, 0x0, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f0000000280)=""/131, 0x26, 0x83, 0x1}, 0x20) [ 1005.289072][T30454] bridge0: port 3(team0) entered blocking state [ 1005.295551][T30454] bridge0: port 3(team0) entered forwarding state [ 1005.338539][T30466] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1005.354970][T30466] bridge0: port 3(team0) entered blocking state 06:41:23 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x2, &(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}) [ 1005.387229][T30466] bridge0: port 3(team0) entered disabled state [ 1005.421697][T30466] device team0 entered promiscuous mode [ 1005.448800][T30466] device team_slave_0 entered promiscuous mode [ 1005.468033][T30466] device team_slave_1 entered promiscuous mode [ 1005.479223][T30466] bridge0: port 3(team0) entered blocking state [ 1005.485640][T30466] bridge0: port 3(team0) entered forwarding state 06:41:23 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:23 executing program 5: write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000004c0)='./cgroup/syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001b80)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x0) sendmsg$inet(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000680)=[{0x0}, {0x0}, {&(0x7f00000005c0)="a1efb10da04c12f1a8c39adfe12b2b0412d0cc7f5011f78742a446b799342375f7dec600cde00e2e93473d75cf8e32770c6ab3f814731e0d397d09ad8859da1f5955716bf5411d818c09b3bbb5075c6260f3ffc09604c5b8787d22", 0x5b}], 0x3, 0x0, 0x80}, 0x24000800) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x8, 0xe, &(0x7f00000013c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair(0x2, 0x0, 0x7f, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000040)={r2, r0}, 0x10) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000180)={r3, r2, 0x4, r2}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f00000001c0)={r3}, 0x8) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) 06:41:23 executing program 0: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0xc0045878, 0x0) 06:41:23 executing program 3: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:41:23 executing program 4: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x2, {0xa, 0x4e21, 0x0, @mcast2, 0xfffff001}}}, 0x80, 0x0}, 0x4000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB], 0xe) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$inet(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000008c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="14000000000000000000000002000000790c00000001000000f8ffffff000000003c00000000000000000000000700006048e52841c100440811db326437c6891f207f000001e0000002ac1414bb00000000ffffffffac1414bb6401010294040100000000000014000000000000000000000002000000f9040000000000001100000000000000000000000100000001000000000000000d89cefa4a826e6cdcc3ea54844c1fd891e084c81fbae84fa558c4376806ea58c71622f2ba08954602804f94645cf5af967168d0a5e37c04"], 0xa0}, 0x15) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') 06:41:23 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x2102) sendmsg(r1, &(0x7f0000004880)={0x0, 0x0, 0x0}, 0x0) 06:41:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:41:23 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x88, 0x0, 0x0, 0x0) [ 1005.740075][T30499] device team0 left promiscuous mode [ 1005.752444][T30499] device team_slave_0 left promiscuous mode [ 1005.768974][T30499] device team_slave_1 left promiscuous mode 06:41:23 executing program 5: perf_event_open(&(0x7f0000000100)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0xa, 0x5, 0x0) sendmsg(r0, &(0x7f00000006c0)={&(0x7f0000000100)=@in={0xa, 0x0, @local={0xa, 0x2c0}}, 0xffd6, &(0x7f0000000640), 0x16, &(0x7f0000001280)=ANY=[@ANYBLOB="200000000000000084000000070000007fd25f85b6cef8ec70058da6f964c968fc5c732fc75abd128fcfaaf00b21e2f1473f8abd214817663cd10d15429dda30fae62f4c9071c2f14f947a0a20fa35ad22caca7e46af2037a324b4b28087446f871025c34811229edcff2294da6b1593c2d57a79c83f6d0f20197e55dbf9a4e092d9286f6576c73554ac692ea2729eb540cfc42cb1da1ad716bb9c0d81533be2433d7c7fc5e2e910ce61cb05e96a71a9db9bbe180ffc5ed13f1be70eadd080d80d96ab61f99e92e4a33151edfbc837246e32b2bb380ff4f3ed923cafe0ec6cb96ed8c59e994b2023d35696e94497ffbade63322654b7c419140fa2cc5f497781196e8a309d6c7e5ded8e2cd14b4f3e50f252be78f1dbb571d72bbc6bea63064193e32afc3eabb22613791d5fe36426df82813ddd87fc651851143c5444de081beb17217f22664e3223e5950c3b1eb73479c72f8533350d5e3f2f703793e2f711cb99d615c9e84cdf87c62343c742d30eff06ecff7a029efa51d248eeec4f1edeae6c9f94ea8838b7eaf62a1e7ea54161845a1c305d55eb90b52b6c50f9b2704a7325f584e0b870b81091b65be693214a081fc3c6d141fe80cc0821efdadcd12d7aed8593f0937a56ba6cb5ea5921ededb61a2f5c88ac3c8328265fbbb9a19f3ad5511d0feab233cd053910d252074a0522f4cebdf2d67736a94a27c75d60ee6c15065b077683f11d3729ff6249996f19d12ffef919625c6bb0e6880dd7be505f5e6087e4c5fee3206c487478696388d6b04d244f665b8f0302d8aa0149aa60fe0cd3eaefccaf43657734d6aa6b1f88df13e4730981afde763126ee14053d5db13639896bb3c96c180b5b160608a8aa7c7a396f586b76328d98a4c8157d16bfc66c78616a63e35e5cebd766bbc94f80982592aed20afe2ad50f231b3da25f5385801de7db4c3be6f5973869586c8abff4548837f62c2a6d2e5d9fad0fb31eb2f3b1de093bfdca7694a046ff48aa3aa1c4f9722c47d20ac22e045431553384c05e570c2ff2cafcfe41bbae615a12f354944c89e05a550b784b6e9bf4b3fb8380a2a974ff08017b5ade519b0f3e3afcc1088083d93a5ed7d5522575d2a9f17b51270dbed6a54834fdec3437bfa7117adb77af87464cca17cdf7da24b75c34449007203d2d914dd479c8ee6bce4417edc5a18ed9eea7aa9eaef285eab1b617145ce79931e27dec3af7de6de1dfc6dcabfa58054ec689941dc7735acba738276567198d81b635607071a792ad9be89fbf0168d7f4ee135dd6386afd00000000006a58c581d3f48ec97961e94da258601f7a3f97e5123caed929ca99560cd775ee265944a4f19ffb7e0e57b49ef90a7f285f9352b16aa23515868d76f7353c9f8a0adf42c780af293d5fc89965369cb4fbaec2b8e6b70b5a8501bea04f0e286d3b6e503d45219dea6dc8"], 0x20}, 0xf0ff7f) [ 1005.789296][T30499] bridge0: port 3(team0) entered disabled state [ 1005.856875][T30499] team0: Cannot enslave team device to itself [ 1005.889521][T30506] bridge0: port 3(team0) entered blocking state 06:41:23 executing program 3: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0xc0189436, 0x0) 06:41:23 executing program 0: r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, &(0x7f0000000800)=""/166, 0x26, 0xa6, 0x1}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={r0, 0x10, &(0x7f0000000280)={0x0, 0x0, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_lsm={0x1d, 0x3, &(0x7f0000000240)=@framed, &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, r1}, 0x78) [ 1005.902580][T30506] bridge0: port 3(team0) entered disabled state 06:41:23 executing program 2: bpf$BPF_BTF_LOAD(0x10, &(0x7f0000000340)={0x0, &(0x7f0000000280)=""/131, 0x0, 0x83}, 0x20) [ 1005.960202][T30506] device team0 entered promiscuous mode [ 1005.974624][T30506] device team_slave_0 entered promiscuous mode [ 1005.998543][T30506] device team_slave_1 entered promiscuous mode [ 1006.061986][T30506] bridge0: port 3(team0) entered blocking state [ 1006.068433][T30506] bridge0: port 3(team0) entered forwarding state 06:41:23 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:23 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0x0, 0x1, r0, 0x0) 06:41:23 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) 06:41:23 executing program 3: openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0xc, 0x6d, 0x8000000000000002, 0x0, 0x1}, 0x40) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305829, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f000000b180)={0x14}, 0x40) perf_event_open(&(0x7f0000000300)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000440), &(0x7f0000000540), 0x800, r0}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000006c0), &(0x7f00000008c0), 0xfff, r0}, 0x38) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0xff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x4480, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x8, 0x0, 0x26718bde, 0x0, 0x0, 0x1, 0x3e1}, 0x0, 0x6, 0xffffffffffffffff, 0x0) [ 1006.475934][T30533] device team0 left promiscuous mode [ 1006.481274][T30533] device team_slave_0 left promiscuous mode [ 1006.530854][T30533] device team_slave_1 left promiscuous mode [ 1006.557267][T30533] bridge0: port 3(team0) entered disabled state [ 1006.625228][T30533] team0: Cannot enslave team device to itself [ 1006.631481][T30536] bridge0: port 3(team0) entered blocking state [ 1006.641039][T30536] bridge0: port 3(team0) entered disabled state [ 1006.680656][T30536] device team0 entered promiscuous mode [ 1006.693412][T30536] device team_slave_0 entered promiscuous mode [ 1006.728170][T30536] device team_slave_1 entered promiscuous mode [ 1006.758181][T30536] bridge0: port 3(team0) entered blocking state [ 1006.764574][T30536] bridge0: port 3(team0) entered forwarding state 06:41:24 executing program 4: ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x2, 0x70, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) socket$kcm(0x2c, 0x3, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a0, &(0x7f0000000000)='&@[\x00') openat$cgroup_type(0xffffffffffffffff, 0x0, 0x2, 0x0) socketpair(0x1e, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x0}) setsockopt$sock_attach_bpf(r1, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x2, {0xa, 0x4e21, 0x0, @mcast2, 0xfffff001}}}, 0x80, 0x0}, 0x4000) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x3e, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) write$cgroup_int(r2, 0x0, 0x0) openat$cgroup_ro(r2, &(0x7f0000000300)='io.stat\x00', 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000480)=ANY=[@ANYBLOB], 0xe) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$kcm(0xa, 0x922000000003, 0x11) sendmsg$inet(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000008c0), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="14000000000000000000000002000000790c00000001000000f8ffffff000000003c00000000000000000000000700006048e52841c100440811db326437c6891f207f000001e0000002ac1414bb00000000ffffffffac1414bb6401010294040100000000000014000000000000000000000002000000f9040000000000001100000000000000000000000100000001000000000000000d89cefa4a826e6cdcc3ea54844c1fd891e084c81fbae84fa558c4376806ea58c71622f2ba08954602804f94645cf5af967168d0a5e37c04"], 0xa0}, 0x15) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x89a1, &(0x7f0000000680)='&@[\x00') 06:41:24 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000008200)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000300)="c5", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x40) 06:41:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ff01e97628a88a4b37032f1ef8b8046a3237ad1fe10f70354891383c49eb9ae77505ea79fc8f6c673e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2818206ce270d76191b43ab4cbdd4dbcccdc644fe65e7bd90a5fc16387bcb5e1e028d7d2a33c78cb8fe48ddcf6adfc9417bd42909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9538eb067b21111dbaa58b19a52f3f12880128d08eb477ad349c2214bc7f8378b7e5b5415f3dae167ef056655c6b66beaf92e416313dfe58e88fbfa825114227c2f6cfd1448ca37902a5678af7277e6cde25737b058ba3ca60696bc1d4df56b6f3c1b5904def348912e1fefe8164c3341b91913718593085d2a9a260663c11f5484cad2de673f9a1fcac868ff6cb20122f76531881165f4d46e1a23ce0dc462ff47e1fb4a8e2a1f6e3b8134031eb29e068c831dc2d825b82749063a85bf6c1bcf4c00008e4900000000000000bf97843daf190000009e66460322524081f961f3a6bec7b84976ae5fc7a8d29dc65277d3a47422bcf49b6ac1c6d0d57dd3e55dc62e58b25a34d1a482652315813e92188263a93f13dde4dd81dfe32af06f6f3fcd73789cc69925a3211955290f85e42dabf19d40f717edd7361ad3801f6642046376000000000000005581a3b65fc336f7011e6810cdc9295e03b2bac1e1362562fdf7521783ca9fb1e66ac0a2e9deb41ee5f9eb573278f8f4f6115afa42170fb2be7b3318e5dc441f6281054a4ee916a57bb4023a4e94ce847bf61eb36773ac1a2415f73602457494cfdc019aa0074a2c668c1c56d0c13ad5cc781223e902a5baf892347734c10a5f07654661c17c77eb33637be6c4a4199fae8e780efbc74d9e361d80cbed4af4de00"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) 06:41:24 executing program 5: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@ptr]}}, &(0x7f0000000280)=""/131, 0x26, 0x83, 0x1}, 0x20) 06:41:24 executing program 3: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r0, &(0x7f0000000580)={&(0x7f00000004c0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x1}}, 0x10, 0x0}, 0x0) 06:41:24 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1006.980292][T30557] device team0 left promiscuous mode [ 1007.006154][T30557] device team_slave_0 left promiscuous mode [ 1007.036351][T30557] device team_slave_1 left promiscuous mode 06:41:24 executing program 2: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 06:41:24 executing program 3: syz_open_dev$evdev(0x0, 0x1, 0x62140) syz_open_dev$evdev(&(0x7f0000001540)='/dev/input/event#\x00', 0x1ff, 0x4000) 06:41:24 executing program 5: syz_usb_connect$uac1(0x0, 0x71, &(0x7f00000002c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000000600)={0x0, 0x0, 0x164, 0x0}) [ 1007.068446][T30557] bridge0: port 3(team0) entered disabled state [ 1007.107629][T30557] team0: Cannot enslave team device to itself [ 1007.142826][T30562] bridge0: port 3(team0) entered blocking state [ 1007.155709][T30562] bridge0: port 3(team0) entered disabled state [ 1007.195220][T30562] device team0 entered promiscuous mode [ 1007.227831][T30562] device team_slave_0 entered promiscuous mode 06:41:24 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ff01e97628a88a4b37032f1ef8b8046a3237ad1fe10f70354891383c49eb9ae77505ea79fc8f6c673e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2818206ce270d76191b43ab4cbdd4dbcccdc644fe65e7bd90a5fc16387bcb5e1e028d7d2a33c78cb8fe48ddcf6adfc9417bd42909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9538eb067b21111dbaa58b19a52f3f12880128d08eb477ad349c2214bc7f8378b7e5b5415f3dae167ef056655c6b66beaf92e416313dfe58e88fbfa825114227c2f6cfd1448ca37902a5678af7277e6cde25737b058ba3ca60696bc1d4df56b6f3c1b5904def348912e1fefe8164c3341b91913718593085d2a9a260663c11f5484cad2de673f9a1fcac868ff6cb20122f76531881165f4d46e1a23ce0dc462ff47e1fb4a8e2a1f6e3b8134031eb29e068c831dc2d825b82749063a85bf6c1bcf4c00008e4900000000000000bf97843daf190000009e66460322524081f961f3a6bec7b84976ae5fc7a8d29dc65277d3a47422bcf49b6ac1c6d0d57dd3e55dc62e58b25a34d1a482652315813e92188263a93f13dde4dd81dfe32af06f6f3fcd73789cc69925a3211955290f85e42dabf19d40f717edd7361ad3801f6642046376000000000000005581a3b65fc336f7011e6810cdc9295e03b2bac1e1362562fdf7521783ca9fb1e66ac0a2e9deb41ee5f9eb573278f8f4f6115afa42170fb2be7b3318e5dc441f6281054a4ee916a57bb4023a4e94ce847bf61eb36773ac1a2415f73602457494cfdc019aa0074a2c668c1c56d0c13ad5cc781223e902a5baf892347734c10a5f07654661c17c77eb33637be6c4a4199fae8e780efbc74d9e361d80cbed4af4de00"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) [ 1007.256765][T30562] device team_slave_1 entered promiscuous mode 06:41:25 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x0, 0x0) ioctl$EVIOCGVERSION(r0, 0x80044501, &(0x7f0000000780)=""/227) [ 1007.298882][T30562] bridge0: port 3(team0) entered blocking state [ 1007.305454][T30562] bridge0: port 3(team0) entered forwarding state 06:41:25 executing program 3: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000300)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x258}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x400}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) [ 1007.523426][ T9587] usb 6-1: new high-speed USB device number 9 using dummy_hcd 06:41:25 executing program 4: r0 = syz_usb_connect$uac1(0x0, 0x71, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x4, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, 0x0) syz_usb_control_io(r0, &(0x7f00000003c0)={0x2c, 0x0, &(0x7f00000000c0)={0x0, 0x3, 0x4, @string={0x4, 0x3, "e758"}}, 0x0, 0x0, 0x0}, 0x0) 06:41:25 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:25 executing program 2: r0 = syz_usb_connect$cdc_ncm(0x0, 0x73, &(0x7f0000000300)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x61, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@obex={0x5}]}, {{0x9, 0x5, 0x81, 0x3, 0x258}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x400}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 06:41:25 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x172, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) [ 1007.727106][T30592] device team0 left promiscuous mode [ 1007.740060][T30592] device team_slave_0 left promiscuous mode [ 1007.748234][T30592] device team_slave_1 left promiscuous mode [ 1007.754261][T29698] usb 4-1: new high-speed USB device number 6 using dummy_hcd [ 1007.765219][T30592] bridge0: port 3(team0) entered disabled state [ 1007.775937][T30592] team0: Cannot enslave team device to itself [ 1007.793632][ T9587] usb 6-1: Using ep0 maxpacket: 8 [ 1007.800604][T30592] bridge0: port 3(team0) entered blocking state [ 1007.807373][T30592] bridge0: port 3(team0) entered disabled state [ 1007.815962][T30592] device team0 entered promiscuous mode [ 1007.821834][T30592] device team_slave_0 entered promiscuous mode [ 1007.828569][T30592] device team_slave_1 entered promiscuous mode [ 1007.836612][T30592] bridge0: port 3(team0) entered blocking state [ 1007.843108][T30592] bridge0: port 3(team0) entered forwarding state 06:41:25 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) 06:41:25 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1007.953457][ T9587] usb 6-1: unable to get BOS descriptor or descriptor too short [ 1007.963529][ T9738] usb 3-1: new high-speed USB device number 7 using dummy_hcd 06:41:25 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 1007.993785][T29698] usb 4-1: Using ep0 maxpacket: 8 [ 1008.003250][ T9717] usb 5-1: new high-speed USB device number 19 using dummy_hcd [ 1008.036030][T30601] device team0 left promiscuous mode [ 1008.048587][T30601] device team_slave_0 left promiscuous mode [ 1008.055130][ T9587] usb 6-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 1008.064985][T30601] device team_slave_1 left promiscuous mode [ 1008.071217][ T9587] usb 6-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 1008.084007][T30601] bridge0: port 3(team0) entered disabled state [ 1008.091526][ T9587] usb 6-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1008.113726][T29698] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1008.126976][T30601] team0: Cannot enslave team device to itself 06:41:25 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) [ 1008.137059][T30605] bridge0: port 3(team0) entered blocking state [ 1008.150126][T29698] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1008.164013][T30605] bridge0: port 3(team0) entered disabled state [ 1008.197799][T29698] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1008.208692][ T9738] usb 3-1: Using ep0 maxpacket: 8 [ 1008.242638][T30605] device team0 entered promiscuous mode [ 1008.283626][ T9717] usb 5-1: Using ep0 maxpacket: 16 [ 1008.301372][T29698] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 1008.312662][T30605] device team_slave_0 entered promiscuous mode [ 1008.313726][ T9587] usb 6-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1008.325089][T30605] device team_slave_1 entered promiscuous mode [ 1008.355465][ T9587] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1008.378705][T30605] bridge0: port 3(team0) entered blocking state [ 1008.385863][T30605] bridge0: port 3(team0) entered forwarding state [ 1008.386953][ T9587] usb 6-1: Product: syz [ 1008.396871][ T9738] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1008.411167][ T9738] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1008.423653][ T9717] usb 5-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 1008.432359][ T9717] usb 5-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 1008.457697][ T9587] usb 6-1: Manufacturer: syz [ 1008.468340][ T9587] usb 6-1: SerialNumber: syz [ 1008.477128][ T9717] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1008.495896][T29698] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1008.506509][T29698] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1008.516977][T29698] usb 4-1: Product: syz [ 1008.535239][T29698] usb 4-1: Manufacturer: syz [ 1008.542254][T29698] usb 4-1: SerialNumber: syz [ 1008.593665][ T9738] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1008.608683][ T9738] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1008.619668][ T9738] usb 3-1: Product: syz [ 1008.635097][ T9738] usb 3-1: Manufacturer: syz [ 1008.639858][ T9738] usb 3-1: SerialNumber: syz [ 1008.683496][ T9717] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1008.692568][ T9717] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1008.713853][ T9717] usb 5-1: Product: syz [ 1008.721448][ T9717] usb 5-1: Manufacturer: syz [ 1008.736295][ T9717] usb 5-1: SerialNumber: syz [ 1008.803514][ T9587] usb 6-1: 0:2 : does not exist [ 1008.806043][T30581] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1008.821092][ T9587] usb 6-1: USB disconnect, device number 9 [ 1008.888717][T30589] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1009.083310][T29698] cdc_ncm 4-1:1.0: bind() failure [ 1009.123575][T29698] cdc_ncm: probe of 4-1:1.1 failed with error -71 [ 1009.163816][ T9738] cdc_ncm 3-1:1.0: bind() failure [ 1009.178240][T29698] cdc_mbim: probe of 4-1:1.1 failed with error -71 [ 1009.244356][ T9738] cdc_ncm: probe of 3-1:1.1 failed with error -71 [ 1009.274818][T29698] usbtest: probe of 4-1:1.1 failed with error -71 [ 1009.283276][ T9738] cdc_mbim: probe of 3-1:1.1 failed with error -71 [ 1009.303297][ T9717] usb 5-1: 0:2 : does not exist [ 1009.309027][T29698] usb 4-1: USB disconnect, device number 6 [ 1009.333497][ T9738] usbtest: probe of 3-1:1.1 failed with error -71 [ 1009.353943][ T9717] usb 5-1: USB disconnect, device number 19 [ 1009.391419][ T9738] usb 3-1: USB disconnect, device number 7 [ 1009.513383][ T9730] usb 6-1: new high-speed USB device number 10 using dummy_hcd [ 1009.753164][ T9730] usb 6-1: Using ep0 maxpacket: 8 [ 1009.935091][ T9730] usb 6-1: unable to get BOS descriptor or descriptor too short [ 1009.953294][T29698] usb 4-1: new high-speed USB device number 7 using dummy_hcd [ 1009.993353][ T9738] usb 3-1: new high-speed USB device number 8 using dummy_hcd [ 1010.013219][ T9717] usb 5-1: new high-speed USB device number 20 using dummy_hcd [ 1010.045069][ T9730] usb 6-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 1010.054039][ T9730] usb 6-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 1010.068132][ T9730] usb 6-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1010.193121][T29698] usb 4-1: Using ep0 maxpacket: 8 06:41:27 executing program 5: syz_usb_connect$uac1(0x0, 0x71, &(0x7f00000002c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f, 0x3, 0x1, 0x0, 0x0, 0x0, {{}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000000600)={0x0, 0x0, 0x164, 0x0}) 06:41:27 executing program 0: bpf$PROG_LOAD(0x5, 0x0, 0x0) 06:41:27 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1010.233591][ T9738] usb 3-1: Using ep0 maxpacket: 8 [ 1010.263107][ T9717] usb 5-1: Using ep0 maxpacket: 16 [ 1010.273482][ T9730] usb 6-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1010.287608][ T9730] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1010.311937][ T9730] usb 6-1: Product: syz [ 1010.331780][T29698] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1010.332830][ T9730] usb 6-1: Manufacturer: syz [ 1010.350666][T30678] validate_nla: 10 callbacks suppressed [ 1010.350685][T30678] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1010.353848][T29698] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1010.358692][T30678] device team0 left promiscuous mode [ 1010.383313][ T9717] usb 5-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 1010.383432][ T9738] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1010.392009][ T9717] usb 5-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 1010.392036][ T9717] usb 5-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1010.412699][T29698] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1010.421486][T30678] device team_slave_0 left promiscuous mode [ 1010.450145][T30678] device team_slave_1 left promiscuous mode [ 1010.458553][T30678] bridge0: port 3(team0) entered disabled state [ 1010.459701][T29698] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 1010.473525][ T9730] usb 6-1: can't set config #1, error -71 [ 1010.477297][ T9738] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1010.494820][ T9730] usb 6-1: USB disconnect, device number 10 [ 1010.518966][T30678] team0: Cannot enslave team device to itself [ 1010.526726][T30679] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1010.557758][T30679] bridge0: port 3(team0) entered blocking state 06:41:28 executing program 3: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000300)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x258}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x400}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) [ 1010.597622][T30679] bridge0: port 3(team0) entered disabled state [ 1010.623311][ T9717] usb 5-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1010.646097][ T9717] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1010.663866][ T9738] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1010.682232][ T9738] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1010.685397][T30679] device team0 entered promiscuous mode [ 1010.703451][ T9717] usb 5-1: Product: syz [ 1010.712365][ T9738] usb 3-1: Product: syz [ 1010.728818][ T9717] usb 5-1: Manufacturer: syz [ 1010.735814][ T9738] usb 3-1: Manufacturer: syz [ 1010.738688][T30679] device team_slave_0 entered promiscuous mode [ 1010.744126][T29698] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1010.754127][ T9717] usb 5-1: SerialNumber: syz [ 1010.771692][ T9738] usb 3-1: SerialNumber: syz [ 1010.780616][T29698] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 06:41:28 executing program 4: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000300)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x400}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 06:41:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) 06:41:28 executing program 2: r0 = syz_usb_connect$cdc_ncm(0x0, 0x73, &(0x7f0000000300)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x61, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}, [@obex={0x5}]}, {{0x9, 0x5, 0x81, 0x3, 0x258}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x400}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) [ 1010.798986][T30679] device team_slave_1 entered promiscuous mode [ 1010.813821][ T9738] usb 3-1: can't set config #1, error -71 [ 1010.833449][ T9717] usb 5-1: can't set config #1, error -71 [ 1010.836237][T29698] usb 4-1: can't set config #1, error -71 [ 1010.847071][ T9738] usb 3-1: USB disconnect, device number 8 [ 1010.863668][ T9717] usb 5-1: USB disconnect, device number 20 [ 1010.874266][T30679] bridge0: port 3(team0) entered blocking state [ 1010.875737][T29698] usb 4-1: USB disconnect, device number 7 [ 1010.881195][T30679] bridge0: port 3(team0) entered forwarding state 06:41:28 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) [ 1010.983272][ T9730] usb 6-1: new high-speed USB device number 11 using dummy_hcd 06:41:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000040)}, 0x24) [ 1011.092916][T30719] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1011.111141][T30719] device team0 left promiscuous mode [ 1011.120706][T30719] device team_slave_0 left promiscuous mode [ 1011.137348][T30719] device team_slave_1 left promiscuous mode [ 1011.155310][T30719] bridge0: port 3(team0) entered disabled state [ 1011.171161][T30719] team0: Cannot enslave team device to itself 06:41:28 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1011.204155][T30721] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1011.239083][T30721] bridge0: port 3(team0) entered blocking state [ 1011.253192][ T9730] usb 6-1: Using ep0 maxpacket: 8 [ 1011.264633][T29698] usb 4-1: new high-speed USB device number 8 using dummy_hcd [ 1011.282507][T30721] bridge0: port 3(team0) entered disabled state [ 1011.357097][T30721] device team0 entered promiscuous mode [ 1011.364089][T30721] device team_slave_0 entered promiscuous mode [ 1011.373929][T30721] device team_slave_1 entered promiscuous mode [ 1011.374538][ T9738] usb 3-1: new high-speed USB device number 9 using dummy_hcd [ 1011.388594][T30721] bridge0: port 3(team0) entered blocking state [ 1011.395425][T30721] bridge0: port 3(team0) entered forwarding state 06:41:29 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1011.405373][ T9717] usb 5-1: new high-speed USB device number 21 using dummy_hcd [ 1011.443082][ T9730] usb 6-1: unable to get BOS descriptor or descriptor too short [ 1011.508935][T29698] usb 4-1: Using ep0 maxpacket: 8 [ 1011.543363][ T9730] usb 6-1: config 1 contains an unexpected descriptor of type 0x1, skipping [ 1011.559343][ T9730] usb 6-1: config 1 has an invalid descriptor of length 1, skipping remainder of the config [ 1011.584378][ T9730] usb 6-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1011.637558][T29698] usb 4-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1011.648771][ T9738] usb 3-1: Using ep0 maxpacket: 8 [ 1011.673191][ T9717] usb 5-1: Using ep0 maxpacket: 8 [ 1011.678656][T29698] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1011.713323][T29698] usb 4-1: config 1 interface 1 altsetting 1 endpoint 0x3 has invalid wMaxPacketSize 0 [ 1011.728769][T29698] usb 4-1: config 1 interface 1 altsetting 1 bulk endpoint 0x3 has invalid maxpacket 0 [ 1011.773257][ T9738] usb 3-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1011.793506][ T9730] usb 6-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1011.797299][ T9738] usb 3-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1011.807042][ T9730] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1011.821553][ T9717] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1011.841074][ T9717] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1011.862645][ T9730] usb 6-1: Product: syz [ 1011.869738][ T9717] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1011.911874][ T9730] usb 6-1: Manufacturer: syz [ 1011.933532][T29698] usb 4-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1011.936664][ T9730] usb 6-1: SerialNumber: syz [ 1011.942600][T29698] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1011.942631][T29698] usb 4-1: Product: syz [ 1011.942653][T29698] usb 4-1: Manufacturer: syz [ 1012.003306][ T9738] usb 3-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1012.029797][ T9738] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1012.075173][ T9738] usb 3-1: Product: syz [ 1012.086241][T29698] usb 4-1: SerialNumber: syz [ 1012.095939][ T9738] usb 3-1: Manufacturer: syz [ 1012.112723][ T9738] usb 3-1: SerialNumber: syz [ 1012.143436][ T9717] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1012.152500][ T9717] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1012.180728][ T9717] usb 5-1: Product: syz [ 1012.187179][ T9717] usb 5-1: Manufacturer: syz [ 1012.202271][ T9717] usb 5-1: SerialNumber: syz [ 1012.333299][ T9730] usb 6-1: 0:2 : does not exist [ 1012.372576][ T9730] usb 6-1: USB disconnect, device number 11 [ 1012.401954][T30713] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1012.425859][T30692] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1012.469672][T30712] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1012.674137][ T9738] cdc_ncm 3-1:1.0: bind() failure [ 1012.683203][T29698] cdc_ncm 4-1:1.0: bind() failure [ 1012.715116][ T9738] cdc_ncm: probe of 3-1:1.1 failed with error -71 [ 1012.721874][T29698] cdc_ncm: probe of 4-1:1.1 failed with error -71 [ 1012.753240][ T9717] cdc_ncm 5-1:1.0: bind() failure [ 1012.763224][T29698] cdc_mbim: probe of 4-1:1.1 failed with error -71 [ 1012.769996][ T9738] cdc_mbim: probe of 3-1:1.1 failed with error -71 [ 1012.790803][ T9717] cdc_ncm: probe of 5-1:1.1 failed with error -71 [ 1012.793286][ T9738] usbtest: probe of 3-1:1.1 failed with error -71 [ 1012.803977][T29698] usbtest: probe of 4-1:1.1 failed with error -71 06:41:30 executing program 5: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000300)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}, {{0x9, 0x5, 0x81, 0x3, 0x258}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x400}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 06:41:30 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:30 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1012.823223][ T9717] cdc_mbim: probe of 5-1:1.1 failed with error -71 [ 1012.824401][T29698] usb 4-1: USB disconnect, device number 8 [ 1012.844244][ T9717] usbtest: probe of 5-1:1.1 failed with error -71 [ 1012.845400][ T9738] usb 3-1: USB disconnect, device number 9 [ 1012.897720][ T9717] usb 5-1: USB disconnect, device number 21 [ 1012.969733][T30784] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1013.002458][T30784] device team0 left promiscuous mode [ 1013.017212][T30784] device team_slave_0 left promiscuous mode [ 1013.023833][T30784] device team_slave_1 left promiscuous mode [ 1013.031849][T30784] bridge0: port 3(team0) entered disabled state [ 1013.040882][T30784] team0: Cannot enslave team device to itself [ 1013.048133][T30794] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1013.065576][T30794] bridge0: port 3(team0) entered blocking state [ 1013.075396][T30794] bridge0: port 3(team0) entered disabled state [ 1013.121132][T30794] device team0 entered promiscuous mode [ 1013.136947][T30794] device team_slave_0 entered promiscuous mode [ 1013.147655][T30794] device team_slave_1 entered promiscuous mode [ 1013.227456][T30794] bridge0: port 3(team0) entered blocking state [ 1013.234538][T30794] bridge0: port 3(team0) entered forwarding state 06:41:30 executing program 3: syz_usb_connect(0x0, 0x2d, &(0x7f0000000240)={{0x12, 0x1, 0x0, 0x7c, 0x36, 0x31, 0x8, 0x458, 0x7004, 0xf6fb, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0xb8, 0x41, 0xd8, 0x0, [], [{{0x9, 0x5, 0xa}}]}}]}}]}}, 0x0) [ 1013.282884][ T9665] usb 6-1: new high-speed USB device number 12 using dummy_hcd [ 1013.536113][ T9717] usb 5-1: new high-speed USB device number 22 using dummy_hcd [ 1013.542910][ T9665] usb 6-1: Using ep0 maxpacket: 8 [ 1013.633031][ T9587] usb 4-1: new high-speed USB device number 9 using dummy_hcd [ 1013.669952][ T9665] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1013.701212][ T9665] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1013.822904][ T9717] usb 5-1: Using ep0 maxpacket: 8 [ 1013.882993][ T9665] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1013.892116][ T9665] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1013.900342][ T9665] usb 6-1: Product: syz [ 1013.903036][ T9587] usb 4-1: Using ep0 maxpacket: 8 [ 1013.904686][ T9665] usb 6-1: Manufacturer: syz [ 1013.914334][ T9665] usb 6-1: SerialNumber: syz [ 1013.963263][ T9717] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1013.981096][ T9717] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1013.993299][ T9717] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1014.032973][ T9587] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 1014.156237][T30792] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1014.173227][ T9717] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1014.182391][ T9717] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1014.191484][ T9717] usb 5-1: Product: syz [ 1014.196063][ T9587] usb 4-1: New USB device found, idVendor=0458, idProduct=7004, bcdDevice=f6.fb [ 1014.205773][ T9717] usb 5-1: Manufacturer: syz [ 1014.210367][ T9717] usb 5-1: SerialNumber: syz [ 1014.216813][ T9587] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1014.226627][ T9587] usb 4-1: Product: syz [ 1014.230806][ T9587] usb 4-1: Manufacturer: syz [ 1014.238499][ T9587] usb 4-1: SerialNumber: syz [ 1014.247502][ T9587] usb 4-1: config 0 descriptor?? 06:41:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:31 executing program 2: syz_open_dev$hiddev(&(0x7f0000002240)='/dev/usb/hiddev#\x00', 0x0, 0x20400) 06:41:31 executing program 4: r0 = syz_usb_connect$cdc_ncm(0x0, 0x6e, &(0x7f0000000300)={{0x12, 0x1, 0x0, 0x2, 0x0, 0x0, 0x8, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5c, 0x2, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x5}, {0x5}, {0xd}, {0x6}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x400}}, {{0x9, 0x5, 0x3, 0x2, 0x200}}}}}}}]}}, 0x0) syz_usb_control_io$cdc_ncm(r0, 0x0, 0x0) 06:41:31 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1014.286878][ T9587] gspca_main: spca561-2.14.0 probing 0458:7004 [ 1014.323097][ T9717] usb 5-1: can't set config #1, error -71 [ 1014.342574][ T9717] usb 5-1: USB disconnect, device number 22 [ 1014.391847][T30825] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1014.413123][ T9665] cdc_ncm 6-1:1.0: bind() failure 06:41:32 executing program 2: syz_usb_connect$uac1(0x0, 0x77, &(0x7f00000002c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x65, 0x3, 0x1, 0x0, 0x0, 0x0, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x8, 0x1}, [@mixer_unit={0x6, 0x24, 0x4, 0x0, 0x6, 'v'}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000000600)={0x0, 0x0, 0x164, &(0x7f00000003c0)=ANY=[@ANYBLOB="050f640105c81002"]}) [ 1014.453055][ T9665] cdc_ncm: probe of 6-1:1.1 failed with error -71 [ 1014.456203][T30825] device team0 left promiscuous mode 06:41:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1014.502975][ T9665] cdc_mbim: probe of 6-1:1.1 failed with error -71 [ 1014.538161][T30825] device team_slave_0 left promiscuous mode [ 1014.545399][ T9665] usbtest: probe of 6-1:1.1 failed with error -71 [ 1014.564411][T30825] device team_slave_1 left promiscuous mode [ 1014.565839][ T9665] usb 6-1: USB disconnect, device number 12 [ 1014.584179][ T9587] spca561: probe of 4-1:0.0 failed with error -22 [ 1014.604169][ T9587] usb 4-1: USB disconnect, device number 9 [ 1014.608385][T30825] bridge0: port 3(team0) entered disabled state [ 1014.644218][T30825] team0: Cannot enslave team device to itself [ 1014.668505][T30834] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1014.688997][T30834] bridge0: port 3(team0) entered blocking state [ 1014.713820][T30834] bridge0: port 3(team0) entered disabled state 06:41:32 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1014.832972][ T9717] usb 5-1: new high-speed USB device number 23 using dummy_hcd [ 1014.833924][T30834] device team0 entered promiscuous mode [ 1014.846782][T30834] device team_slave_0 entered promiscuous mode [ 1014.870631][T30834] device team_slave_1 entered promiscuous mode [ 1014.914340][T30834] bridge0: port 3(team0) entered blocking state [ 1014.921378][T30834] bridge0: port 3(team0) entered forwarding state [ 1014.974070][ T9730] usb 3-1: new high-speed USB device number 10 using dummy_hcd [ 1015.112899][ T9717] usb 5-1: Using ep0 maxpacket: 8 [ 1015.152908][ T9665] usb 6-1: new high-speed USB device number 13 using dummy_hcd [ 1015.263390][ T9730] usb 3-1: Using ep0 maxpacket: 8 [ 1015.303223][ T9717] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1015.314689][ T9587] usb 4-1: new high-speed USB device number 10 using dummy_hcd [ 1015.333099][ T9717] usb 5-1: config 1 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 1015.359757][ T9717] usb 5-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1015.403397][ T9730] usb 3-1: descriptor type invalid, skip [ 1015.409065][ T9730] usb 3-1: descriptor type invalid, skip [ 1015.412747][ T9665] usb 6-1: Using ep0 maxpacket: 8 [ 1015.418406][ T9730] usb 3-1: descriptor type invalid, skip [ 1015.463180][ T9730] usb 3-1: descriptor type invalid, skip [ 1015.543720][ T9717] usb 5-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1015.552891][ T9730] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1015.563104][ T9717] usb 5-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1015.571146][ T9717] usb 5-1: Product: syz [ 1015.573971][ T9665] usb 6-1: config 1 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 1015.578615][ T9587] usb 4-1: Using ep0 maxpacket: 8 [ 1015.591598][ T9730] usb 3-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1015.593984][ T9665] usb 6-1: config 1 interface 1 altsetting 1 bulk endpoint 0x82 has invalid maxpacket 1024 [ 1015.603435][ T9730] usb 3-1: too many endpoints for config 1 interface 0 altsetting 6: 118, using maximum allowed: 30 [ 1015.623646][ T9717] usb 5-1: Manufacturer: syz [ 1015.628287][ T9717] usb 5-1: SerialNumber: syz [ 1015.636076][ T9730] usb 3-1: config 1 interface 0 altsetting 6 has 0 endpoint descriptors, different from the interface descriptor's value: 118 [ 1015.651636][ T9730] usb 3-1: config 1 interface 0 has no altsetting 1 [ 1015.723202][ T9587] usb 4-1: config 0 interface 0 altsetting 0 endpoint 0xA has invalid wMaxPacketSize 0 [ 1015.773446][ T9665] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 1015.782506][ T9665] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1015.798619][ T9665] usb 6-1: Product: syz [ 1015.803484][ T9665] usb 6-1: Manufacturer: syz [ 1015.808207][ T9665] usb 6-1: SerialNumber: syz [ 1015.843026][ T9730] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1015.852099][ T9730] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1015.862131][ T9730] usb 3-1: Product: syz [ 1015.870039][ T9730] usb 3-1: Manufacturer: syz [ 1015.882359][ T9730] usb 3-1: SerialNumber: syz [ 1015.891775][T30835] raw-gadget gadget: fail, usb_ep_enable returned -22 [ 1015.963032][ T9587] usb 4-1: New USB device found, idVendor=0458, idProduct=7004, bcdDevice=f6.fb [ 1015.978898][ T9587] usb 4-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1015.988877][ T9587] usb 4-1: Product: syz [ 1015.994931][ T9587] usb 4-1: Manufacturer: syz [ 1015.999648][ T9587] usb 4-1: SerialNumber: syz 06:41:33 executing program 5: syz_usb_connect$uac1(0x2, 0x78, &(0x7f00000002c0)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x8, 0x1d6b, 0x101, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x66, 0x3, 0x1, 0x0, 0x0, 0x2, {{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, {{0xa, 0x24, 0x1, 0x8}, [@mixer_unit={0x7, 0x24, 0x4, 0x0, 0x6, 'v0'}]}}, {}, {0x9, 0x4, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}, {}, {0x9, 0x4, 0x2, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, {}, {{0x9, 0x5, 0x82, 0x9, 0x0, 0x0, 0x0, 0x0, {0x7}}}}}}}]}}, &(0x7f0000000600)={0xa, &(0x7f0000000380)={0xa}, 0x164, &(0x7f00000003c0)=ANY=[@ANYBLOB="050f640105c81002"], 0x1, [{0x0, 0x0}]}) [ 1016.015368][ T9587] usb 4-1: config 0 descriptor?? 06:41:33 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:33 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1016.062719][ T9665] cdc_ncm 6-1:1.0: bind() failure [ 1016.064723][ T9587] gspca_main: spca561-2.14.0 probing 0458:7004 [ 1016.081549][ T9665] cdc_ncm 6-1:1.1: bind() failure [ 1016.118506][ T9665] usb 6-1: USB disconnect, device number 13 [ 1016.132929][ T9717] cdc_ncm 5-1:1.0: bind() failure [ 1016.152494][T30886] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1016.162962][ T9717] cdc_ncm: probe of 5-1:1.1 failed with error -71 [ 1016.184683][T30886] device team0 left promiscuous mode [ 1016.206847][T30886] device team_slave_0 left promiscuous mode [ 1016.222870][ T9717] cdc_mbim: probe of 5-1:1.1 failed with error -71 [ 1016.224595][T30886] device team_slave_1 left promiscuous mode [ 1016.238041][T30886] bridge0: port 3(team0) entered disabled state [ 1016.247486][T30886] team0: Cannot enslave team device to itself [ 1016.252737][ T9717] usbtest: probe of 5-1:1.1 failed with error -71 [ 1016.260106][T30895] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1016.272292][ T9730] usb 3-1: 0:2 : does not exist [ 1016.281365][ T9717] usb 5-1: USB disconnect, device number 23 06:41:34 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x4e24, @multicast2=0xe0000001}, 0x10, 0x0, 0x0, &(0x7f0000000340)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @private}}}], 0x20}, 0x0) 06:41:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1016.320568][ T9730] usb 3-1: USB disconnect, device number 10 [ 1016.331924][T30895] bridge0: port 3(team0) entered blocking state [ 1016.364965][ T9587] spca561: probe of 4-1:0.0 failed with error -22 [ 1016.381981][ T9587] usb 4-1: USB disconnect, device number 10 [ 1016.402385][T30895] bridge0: port 3(team0) entered disabled state 06:41:34 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1016.518454][T30895] device team0 entered promiscuous mode [ 1016.535030][T30895] device team_slave_0 entered promiscuous mode [ 1016.547648][T30895] device team_slave_1 entered promiscuous mode [ 1016.566101][T30895] bridge0: port 3(team0) entered blocking state [ 1016.572888][T30895] bridge0: port 3(team0) entered forwarding state [ 1016.573968][ T9665] usb 6-1: new full-speed USB device number 14 using dummy_hcd 06:41:34 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}], 0x2}, 0x0) 06:41:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@func_proto]}}, &(0x7f0000000100)=""/184, 0x26, 0xb8, 0x1}, 0x20) [ 1016.953473][ T9665] usb 6-1: descriptor type invalid, skip [ 1016.959154][ T9665] usb 6-1: descriptor type invalid, skip [ 1016.966834][ T9738] usb 3-1: new high-speed USB device number 11 using dummy_hcd [ 1016.974779][ T9665] usb 6-1: descriptor type invalid, skip [ 1016.980427][ T9665] usb 6-1: descriptor type invalid, skip [ 1017.042797][ T9665] usb 6-1: not running at top speed; connect to a high speed hub [ 1017.132713][ T9665] usb 6-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1017.143163][ T9665] usb 6-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1017.152154][ T9665] usb 6-1: too many endpoints for config 1 interface 0 altsetting 6: 118, using maximum allowed: 30 [ 1017.166720][ T9665] usb 6-1: config 1 interface 0 altsetting 6 has 0 endpoint descriptors, different from the interface descriptor's value: 118 [ 1017.180865][ T9665] usb 6-1: config 1 interface 0 has no altsetting 1 [ 1017.222731][ T9738] usb 3-1: Using ep0 maxpacket: 8 [ 1017.342769][ T9738] usb 3-1: descriptor type invalid, skip [ 1017.348444][ T9738] usb 3-1: descriptor type invalid, skip [ 1017.402668][ T9738] usb 3-1: descriptor type invalid, skip [ 1017.408368][ T9738] usb 3-1: descriptor type invalid, skip [ 1017.422752][ T9665] usb 6-1: string descriptor 0 read error: -22 [ 1017.428998][ T9665] usb 6-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1017.442117][ T9665] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1017.496000][ T9665] usb 6-1: 0:2 : does not exist [ 1017.512954][ T9738] usb 3-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1017.538162][ T9738] usb 3-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1017.549880][ T9738] usb 3-1: too many endpoints for config 1 interface 0 altsetting 6: 118, using maximum allowed: 30 [ 1017.562334][ T9738] usb 3-1: config 1 interface 0 altsetting 6 has 0 endpoint descriptors, different from the interface descriptor's value: 118 [ 1017.578133][ T9738] usb 3-1: config 1 interface 0 has no altsetting 1 [ 1017.702876][ T9665] usb 6-1: USB disconnect, device number 14 06:41:35 executing program 2: r0 = fsopen(&(0x7f0000000080)='sysfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 06:41:35 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:35 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:35 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000013c0)={0x0, 0x0, &(0x7f0000001380)={&(0x7f0000001540)=ANY=[@ANYBLOB="6c11000063a804"], 0x116c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000440)='ethtool\x00', r0) [ 1017.822774][ T9738] usb 3-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 [ 1017.831864][ T9738] usb 3-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1017.849928][T30966] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1017.879520][ T9738] usb 3-1: Product: syz [ 1017.882646][T30966] device team0 left promiscuous mode [ 1017.898621][T30966] device team_slave_0 left promiscuous mode [ 1017.922692][ T9738] usb 3-1: can't set config #1, error -71 [ 1017.936727][ T9738] usb 3-1: USB disconnect, device number 11 [ 1017.938587][T30966] device team_slave_1 left promiscuous mode [ 1017.984533][T30966] bridge0: port 3(team0) entered disabled state [ 1017.995629][T30966] team0: Cannot enslave team device to itself [ 1018.002220][T30970] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1018.030663][T30970] bridge0: port 3(team0) entered blocking state [ 1018.042322][T30970] bridge0: port 3(team0) entered disabled state [ 1018.061157][T30970] device team0 entered promiscuous mode [ 1018.071571][T30970] device team_slave_0 entered promiscuous mode [ 1018.087563][T30970] device team_slave_1 entered promiscuous mode [ 1018.102925][T30970] bridge0: port 3(team0) entered blocking state [ 1018.109271][T30970] bridge0: port 3(team0) entered forwarding state [ 1018.512522][ T9738] usb 6-1: new full-speed USB device number 15 using dummy_hcd [ 1018.892782][ T9738] usb 6-1: descriptor type invalid, skip [ 1018.899133][ T9738] usb 6-1: descriptor type invalid, skip [ 1018.906679][ T9738] usb 6-1: descriptor type invalid, skip [ 1018.914806][ T9738] usb 6-1: descriptor type invalid, skip [ 1018.952542][ T9738] usb 6-1: not running at top speed; connect to a high speed hub [ 1019.032615][ T9738] usb 6-1: config 1 has an invalid descriptor of length 0, skipping remainder of the config [ 1019.042816][ T9738] usb 6-1: config 1 has 1 interface, different from the descriptor's value: 3 [ 1019.051668][ T9738] usb 6-1: too many endpoints for config 1 interface 0 altsetting 6: 118, using maximum allowed: 30 [ 1019.065174][ T9738] usb 6-1: config 1 interface 0 altsetting 6 has 0 endpoint descriptors, different from the interface descriptor's value: 118 [ 1019.079282][ T9738] usb 6-1: config 1 interface 0 has no altsetting 1 06:41:36 executing program 5: io_setup(0x3ff, &(0x7f0000000040)=0x0) io_getevents(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x0, 0x989680}) 06:41:36 executing program 4: r0 = socket$alg(0x26, 0x5, 0x0) sendmsg$NL80211_CMD_ABORT_SCAN(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:41:36 executing program 3: io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x7, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) getresgid(0x0, 0x0, &(0x7f0000000180)) getresgid(&(0x7f00000001c0), 0x0, &(0x7f0000000240)) syz_mount_image$tmpfs(&(0x7f0000000280)='tmpfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000006c0)='tmpfs\x00', &(0x7f0000000700)='./file0\x00', 0x7, 0x4, &(0x7f0000000c80)=[{&(0x7f0000000740)}, {0x0, 0x0, 0x3}, {0x0}, {0x0}], 0x1020, &(0x7f0000000d40)={[{@huge_advise='huge=advise'}]}) io_setup(0xbc6, &(0x7f0000000e40)) openat$pfkey(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:41:36 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:36 executing program 2: syz_mount_image$tmpfs(&(0x7f0000000c00)='tmpfs\x00', &(0x7f0000000c40)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0)={[], [{@measure='measure'}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) 06:41:36 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 1019.202573][ T9738] usb 6-1: string descriptor 0 read error: -71 [ 1019.209691][ T9738] usb 6-1: New USB device found, idVendor=1d6b, idProduct=0101, bcdDevice= 0.40 06:41:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ff01e97628a88a4b37032f1ef8b8046a3237ad1fe10f70354891383c49eb9ae77505ea79fc8f6c673e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2818206ce270d76191b43ab4cbdd4dbcccdc644fe65e7bd90a5fc16387bcb5e1e028d7d2a33c78cb8fe48ddcf6adfc9417bd42909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9538eb067b21111dbaa58b19a52f3f12880128d08eb477ad349c2214bc7f8378b7e5b5415f3dae167ef056655c6b66beaf92e416313dfe58e88fbfa825114227c2f6cfd1448ca37902a5678af7277e6cde25737b058ba3ca60696bc1d4df56b6f3c1b5904def348912e1fefe8164c3341b91913718593085d2a9a260663c11f5484cad2de673f9a1fcac868ff6cb20122f76531881165f4d46e1a23ce0dc462ff47e1fb"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1019.268473][T30992] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1019.272862][T30990] tmpfs: Unknown parameter 'measure' [ 1019.284863][ T9738] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 1019.298247][T30992] device team0 left promiscuous mode [ 1019.298879][T30990] tmpfs: Unknown parameter 'measure' [ 1019.308660][T30992] device team_slave_0 left promiscuous mode 06:41:37 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x42400, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x3) 06:41:37 executing program 2: accept(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f00000000c0)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000001140)=[{0x0}], 0x100060, &(0x7f0000001180)={[{@nolazytime='nolazytime'}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@subj_role={'subj_role'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) getresuid(&(0x7f0000001340), 0x0, &(0x7f00000013c0)) getgroups(0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000001500)='ext3\x00', &(0x7f0000001540)='./file0\x00', 0xffffffffffffffff) mount(&(0x7f0000001580)=@md0='/dev/md0\x00', &(0x7f00000015c0)='./file0\x00', 0x0, 0x0, 0x0) getgroups(0x0, 0x0) statx(r0, &(0x7f0000001740)='./file0\x00', 0x6600, 0x7ff, &(0x7f0000001780)) getgroups(0x4, &(0x7f0000001880)=[0x0, 0x0, 0xffffffffffffffff, 0x0]) mount$bpf(0x0, &(0x7f00000018c0)='./file0\x00', &(0x7f0000001900)='bpf\x00', 0x108044, 0x0) accept(0xffffffffffffffff, &(0x7f00000019c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x0) mkdir(0x0, 0x1) syz_mount_image$ext4(&(0x7f0000001ac0)='ext3\x00', &(0x7f0000001b00)='./file0\x00', 0x373, 0x1, &(0x7f0000001bc0)=[{&(0x7f0000001b40)}], 0x2, &(0x7f0000001c00)={[], [{@smackfsroot={'smackfsroot', 0x3d, '{%$:}+s\xd7'}}, {@seclabel='seclabel'}]}) accept(0xffffffffffffffff, 0x0, &(0x7f0000002200)) [ 1019.350812][T30992] device team_slave_1 left promiscuous mode [ 1019.362494][ T9738] usb 6-1: can't set config #1, error -71 [ 1019.374397][ T9738] usb 6-1: USB disconnect, device number 15 [ 1019.400903][T30992] bridge0: port 3(team0) entered disabled state 06:41:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1019.442141][T30992] team0: Cannot enslave team device to itself [ 1019.459097][T30995] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1019.499142][T31005] loop2: detected capacity change from 0 to 1 [ 1019.500172][T30995] bridge0: port 3(team0) entered blocking state [ 1019.506943][T31005] EXT4-fs (loop2): unable to read superblock [ 1019.542692][T30995] bridge0: port 3(team0) entered disabled state [ 1019.550526][T30995] device team0 entered promiscuous mode [ 1019.561785][T30995] device team_slave_0 entered promiscuous mode 06:41:37 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a00)={0x58, 0x1, 0x9, 0x801, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x44, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, {0x14, 0x4, @ipv4={[], [], @remote}}}}, @CTA_TUPLE_ZONE={0x6}]}]}, 0x58}}, 0x0) 06:41:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8917, &(0x7f0000000280)={'tunl0\x00', 0x0}) [ 1019.601773][T30995] device team_slave_1 entered promiscuous mode [ 1019.612027][T30995] bridge0: port 3(team0) entered blocking state [ 1019.618518][T30995] bridge0: port 3(team0) entered forwarding state [ 1019.674949][T31024] loop2: detected capacity change from 0 to 1 06:41:37 executing program 4: syz_mount_image$squashfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$squashfs(&(0x7f0000000000)='squashfs\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x1, &(0x7f0000000300)) 06:41:37 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:37 executing program 2: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x1, 0x4001) 06:41:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:37 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x1b, 0x0, 0x0) 06:41:37 executing program 5: perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1019.943059][T31047] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1019.971674][T31047] device team0 left promiscuous mode 06:41:37 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x40) [ 1019.996653][T31047] device team_slave_0 left promiscuous mode [ 1020.027868][T31047] device team_slave_1 left promiscuous mode [ 1020.062336][T31047] bridge0: port 3(team0) entered disabled state 06:41:37 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ff01e97628a88a4b37032f1ef8b8046a3237ad1fe10f70354891383c49eb9ae77505ea79fc8f6c673e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2818206ce270d76191b43ab4cbdd4dbcccdc644fe65e7bd90a5fc16387bcb5e1e028d7d2a33c78cb8fe48ddcf6adfc9417bd42909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9538eb067b21111dbaa58b19a52f3f12880128d08eb477ad349c2214bc7f8378b7e5b5415f3dae167ef056655c6b66beaf92e416313dfe58e88fbfa825114227c2f6cfd1448ca37902a5678af7277e6cde25737b058ba3ca60696bc1d4df56b6f3c1b5904def348912e1fefe8164c3341b91913718593085d2a9a260663c11f5484cad2de673f9a1fcac868ff6cb20122f76531881165f4d46e1a23ce0dc462ff47e1fb4a8e2a1f6e3b8134031eb29e068c831dc2d825b82749063a85bf6c1bcf4c00008e4900000000000000bf97843daf190000009e66460322524081f961f3a6bec7b84976ae5fc7a8d29dc65277d3a47422bcf49b6ac1c6d0d57dd3e55dc62e58b25a34d1a482652315813e92188263a93f13dde4dd81dfe32af06f6f3fcd73789cc69925a3211955290f85e42dabf19d40f717edd7361ad3801f6642046376000000000000005581a3"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:37 executing program 2: openat$proc_mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/asound/card2/oss_mixer\x00', 0x701, 0x0) 06:41:37 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x11, 0xb, &(0x7f0000000040)=0xfffffffc, 0x4) [ 1020.103658][T31047] team0: Cannot enslave team device to itself [ 1020.134791][T31052] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:37 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000100)=@mangle={'mangle\x00', 0x1f, 0x6, 0x1468, 0x1e8, 0x0, 0x0, 0x12b8, 0x1368, 0x1440, 0x1440, 0x1440, 0x1440, 0x1440, 0x6, 0x0, {[{{@uncond, 0x0, 0xe0, 0x108, 0x0, {}, [@common=@socket0={{0x20, 'socket\x00'}}, @common=@osf={{0x50, 'osf\x00'}, {'syz1\x00'}}]}, @ECN={0x28, 'ECN\x00'}}, {{@ip={@remote, @multicast2, 0x0, 0x0, 'ip6gre0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00'}}, {{@uncond, 0x0, 0x10a0, 0x10d0, 0x0, {}, [@common=@unspec=@cgroup1={{0x1030, 'cgroup\x00'}, {0x0, 0x0, 0x0, 0x0, './cgroup.net/syz1\x00'}}]}, @TPROXY={0x30, 'TPROXY\x00'}}, {{@uncond, 0x0, 0x70, 0xb0}, @common=@inet=@TCPOPTSTRIP={0x40, 'TCPOPTSTRIP\x00'}}, {{@uncond, 0x0, 0x70, 0xb0}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv6=@private1}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x14c8) [ 1020.151944][T31052] bridge0: port 3(team0) entered blocking state [ 1020.182581][T31052] bridge0: port 3(team0) entered disabled state [ 1020.214160][T31052] device team0 entered promiscuous mode 06:41:37 executing program 4: r0 = socket(0x28, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, 0x0) [ 1020.248123][T31052] device team_slave_0 entered promiscuous mode [ 1020.283010][T31052] device team_slave_1 entered promiscuous mode 06:41:38 executing program 3: r0 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0x80085504, &(0x7f0000000040)=@usbdevfs_connect) socket$inet6_udp(0xa, 0x2, 0x0) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) [ 1020.307263][T31052] bridge0: port 3(team0) entered blocking state [ 1020.313670][T31052] bridge0: port 3(team0) entered forwarding state 06:41:38 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:38 executing program 5: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x0, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x2003, 0x0) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x2a4800, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f0000007100)={&(0x7f0000007000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f00000070c0)={&(0x7f0000000080)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="040028bd7000fbdbdf25070000000000c0e3ffffff00e6000005002d00000000000600280000000000000000000000000000f3ff00000000"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) 06:41:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_int(r0, 0x29, 0x22, &(0x7f0000000100), 0x4) 06:41:38 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000000)=0x1, 0x4) sendmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000140)=@l2tp6={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}, 0x80, 0x0}}], 0x1, 0x0) [ 1020.426948][T31073] usb usb9: usbfs: process 31073 (syz-executor.3) did not claim interface 0 before use [ 1020.484330][T31073] usb usb9: usbfs: process 31073 (syz-executor.3) did not claim interface 0 before use 06:41:38 executing program 2: sendmsg$NL802154_CMD_SET_TX_POWER(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000600)={'wpan4\x00'}) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r1, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f0000000680)={0x1c, 0x0, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@NL802154_ATTR_IFINDEX={0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x91}, 0x4000) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) [ 1020.557357][T31083] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:38 executing program 3: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getpeername(r0, 0x0, &(0x7f00000000c0)) 06:41:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1020.599636][T31083] device team0 left promiscuous mode [ 1020.629707][T31083] device team_slave_0 left promiscuous mode [ 1020.646474][T31083] device team_slave_1 left promiscuous mode [ 1020.661905][T31083] bridge0: port 3(team0) entered disabled state 06:41:38 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendto$inet6(r0, &(0x7f0000006900)="89e1340e7d020e3beb4a482d5d57bdbac8920e5cd76d8d85e7ca0fda65b9d14312d43bd49227c56bc89ff26a48eeb1bd2418ba40fe1b4387aa3d8ccb688e83e5f83f378cda2aa78feb20501593b678b40f4634b09550bd95e4ec9077f3e009587f7c2919d9aea74c3d06133611236ecb45c050283820a25023b8f669aa13825783fa185f1c41817a8c659d6a83a1ad0c8f6a703d1ef8a53455ae4340391cfc48d4e9971e461fa83fb926725b2af0c47b071385c4a0c971f36c40195203ec93e53240f5e081bdda53f19c921dc9f0e842e0ea88f338339350cb0e44484feb9d0c50e7e2", 0xe3, 0x801, &(0x7f0000006a00)={0xa, 0x0, 0x0, @local}, 0xfc94) [ 1020.681849][T31083] team0: Cannot enslave team device to itself 06:41:38 executing program 2: r0 = socket$inet6(0xa, 0x80000, 0x1) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200)='ethtool\x00', 0xffffffffffffffff) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000580)={'batadv_slave_1\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(r2, 0x8916, &(0x7f00000005c0)={@private2, 0x0, r3}) pipe2(&(0x7f0000000200)={0xffffffffffffffff}, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r4, 0x89f3, 0x0) setsockopt$inet_MCAST_MSFILTER(r4, 0x0, 0x30, &(0x7f0000000440)={0x800, {{0x2, 0x5, @multicast1}}, 0x1, 0x1, [{{0x2, 0x4e22, @loopback}}]}, 0x110) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89fb, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'syztnl1\x00', 0x0, 0x4, 0x4, 0x80, 0x4, 0x8, @local, @empty, 0x80, 0x700, 0x7f, 0xfffffc00}}) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xa0, r1, 0x20, 0x70bd2a, 0x25dfdbfc, {}, [@HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x8000}, 0x8801) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'ip_vti0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0xe3461d8b5e762bcb, 0x8000, 0x81, 0xfffffffc, {{0x1d, 0x4, 0x0, 0x6, 0x74, 0x64, 0x0, 0x2, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x14}, @broadcast, {[@ssrr={0x89, 0x1b, 0xf0, [@rand_addr=0x64010100, @private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x2e}, @multicast1, @loopback]}, @lsrr={0x83, 0x2b, 0xd0, [@local, @loopback, @remote, @empty, @multicast2, @dev={0xac, 0x14, 0x14, 0x37}, @multicast1, @remote, @private=0xa010100, @remote]}, @cipso={0x86, 0x18, 0x4, [{0x2, 0x9, "b808dfd6bc59c2"}, {0x2, 0x9, "c8400b4b5a1eb9"}]}, @end]}}}}}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000180)={'ip6gre0\x00', &(0x7f0000000100)={'ip6tnl0\x00', r6, 0x29, 0xa0, 0xf9, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, @local, 0x1, 0x7, 0x5, 0x10001}}) prctl$PR_SET_SECCOMP(0x34, 0x2, 0x0) socket(0x1d, 0x80000, 0x8) [ 1020.730744][T31088] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1020.757122][T31088] bridge0: port 3(team0) entered blocking state 06:41:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:38 executing program 3: add_key$fscrypt_v1(&(0x7f0000000080)='logon\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) request_key(&(0x7f0000000180)='pkcs7_test\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000140)='\x00', 0x0) [ 1020.811608][T31088] bridge0: port 3(team0) entered disabled state [ 1020.935856][T31088] device team0 entered promiscuous mode [ 1020.960170][T31088] device team_slave_0 entered promiscuous mode [ 1020.991332][T31088] device team_slave_1 entered promiscuous mode [ 1021.039444][T31088] bridge0: port 3(team0) entered blocking state [ 1021.046490][T31088] bridge0: port 3(team0) entered forwarding state 06:41:38 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:38 executing program 4: mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) add_key$fscrypt_provisioning(&(0x7f00000001c0)='fscrypt-provisioning\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x18, 0xfffffffffffffff8) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, @perf_bp={0x0}, 0x500, 0x2, 0xfffffffc, 0x4, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000100)=@urb_type_bulk={0x3, {}, 0x0, 0x24, &(0x7f0000000ac0)="02df0f67a63f61afe90ccbd34292294e783c4df58b2b3023f76e2477618dc8d5c8b4d8933613bc9b89a3b63361d68aa6134fbe2d8e4eb43e", 0x38, 0xee32, 0xffff, 0x8, 0x9, 0x8, &(0x7f0000000bc0)}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f00000000c0)=@urb_type_bulk={0x3, {}, 0x4, 0x20, &(0x7f00000002c0)="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", 0x7f9, 0x1, 0x0, 0x400, 0xffff, 0x0, 0x0}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) syz_genetlink_get_family_id$smc(&(0x7f0000000080)='SMC_PNETID\x00', 0xffffffffffffffff) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000001000)={0x0, 0x31, 0x3, 0x800, 0x0, 0x9, 0x0}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000140)=@usbdevfs_connect={0x10001}) 06:41:38 executing program 5: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$IOCTL_START_ACCEL_DEV(r0, 0x40096102, 0x0) 06:41:38 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:38 executing program 3: socketpair(0x2c, 0x0, 0x0, &(0x7f00000003c0)) 06:41:38 executing program 2: socketpair(0x21, 0x0, 0x0, &(0x7f0000005d00)) [ 1021.285559][T31123] QAT: failed to copy from user cfg_data. 06:41:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:39 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/snapshot\x00', 0x2a4800, 0x0) ioctl$SNAPSHOT_GET_IMAGE_SIZE(r0, 0x8008330e, 0x0) [ 1021.348871][T31126] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:39 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000380)={0x0, @in={0x2, 0x0, @loopback}, @sco={0x1f, @fixed}, @in={0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)='veth0_to_bridge\x00', 0x200, 0x3, 0x3}) [ 1021.411323][T31126] device team0 left promiscuous mode [ 1021.441120][T31126] device team_slave_0 left promiscuous mode 06:41:39 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_opts(r0, 0x29, 0x37, &(0x7f00000001c0)=@fragment, 0x8) setsockopt$inet6_opts(r0, 0x29, 0x39, 0x0, 0x0) [ 1021.476605][T31126] device team_slave_1 left promiscuous mode [ 1021.504980][T31126] bridge0: port 3(team0) entered disabled state 06:41:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ff01e97628a88a4b37032f1ef8b8046a3237ad1fe10f70354891383c49eb9ae77505ea79fc8f6c673e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2818206ce270d76191b43ab4cbdd4dbcccdc644fe65e7bd90a5fc16387bcb5e1e028d7d2a33c78cb8fe48ddcf6adfc9417bd42909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9538eb067b21111dbaa58b19a52f3f12880128d08eb477ad349c2214bc7f8378b7e5b5415f3dae167ef056655c6b66beaf92e416313dfe58e88fbfa825114227c2f6cfd1448ca37902a5678af7277e6cde25737b058ba3ca60696bc1d4df56b6f3c1b5904def348912e1fefe8164c3341b91913718593085d2a9a260663c11f5484cad2de673f9a1fcac868ff6cb20122f76531881165f4d46e1a23ce0dc462ff47e1fb4a8e2a1f6e3b8134031eb29e068c831dc2d825b82749063a85bf6c1bcf4c00008e4900000000000000bf97843daf190000009e66460322524081f961f3a6bec7b84976ae5fc7a8d29dc65277d3a47422bcf49b6ac1c6d0d57dd3e55dc62e58b25a34d1a482652315813e92188263a93f13dde4dd81dfe32af06f6f3fcd73789cc69925a3211955290f85e42dabf19d40f717edd7361ad3801f6642046376000000000000005581a3b65fc336f7011e6810cdc9295e03b2bac1e1362562fdf7521783ca9fb1e66ac0a2e9deb41ee5f9eb573278f8f4f6115afa42170fb2be7b3318e5dc441f6281054a4ee916a57bb4023a4e94ce847bf61eb36773ac1a2415f73602457494cfdc019aa0074a2c668c1c56d0c13ad5cc781223e902a5baf892347734c10a5f07"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:39 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000200)=""/185, &(0x7f0000000140)=0xb9) [ 1021.563829][T31126] team0: Cannot enslave team device to itself [ 1021.592928][T31128] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1021.631125][T31128] bridge0: port 3(team0) entered blocking state [ 1021.653845][T31121] hub 9-0:1.0: USB hub found [ 1021.661424][T31128] bridge0: port 3(team0) entered disabled state [ 1021.681065][T31121] hub 9-0:1.0: 8 ports detected [ 1021.862479][T31128] device team0 entered promiscuous mode [ 1021.925184][T31128] device team_slave_0 entered promiscuous mode [ 1021.950387][T31128] device team_slave_1 entered promiscuous mode [ 1021.984953][T31128] bridge0: port 3(team0) entered blocking state [ 1021.991718][T31128] bridge0: port 3(team0) entered forwarding state 06:41:39 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:39 executing program 2: setrlimit(0x0, &(0x7f0000000000)={0x0, 0xffffffff}) 06:41:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ff01e97628a88a4b37032f1ef8b8046a3237ad1fe10f70354891383c49eb9ae77505ea79fc8f6c673e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2818206ce270d76191b43ab4cbdd4dbcccdc644fe65e7bd90a5fc16387bcb5e1e028d7d2a33c78cb8fe48ddcf6adfc9417bd42909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9538eb067b21111dbaa58b19a52f3f12880128d08eb477ad349c2214bc7f8378b7e5b5415f3dae167ef056655c6b66beaf92e416313dfe58e88fbfa825114227c2f6cfd1448ca37902a5678af7277e6cde25737b058ba3ca60696bc1d4df56b6f3c1b5904def348912e1fefe8164c3341b91913718593085d2a9a260663c11f5484cad2de673f9a1fcac868ff6cb20122f76531881165f4d46e1a23ce0dc462ff47e1fb4a8e2a1f6e3b8134031eb29e068c831dc2d825b82749063a85bf6c1bcf4c00008e4900000000000000bf97843daf190000009e66460322524081f961f3a6bec7b84976ae5fc7a8d29dc65277d3a47422bcf49b6ac1c6d0d57dd3e55dc62e58b25a34d1a482652315813e92188263a93f13dde4dd81dfe32af06f6f3fcd73789cc69925a3211955290f85e42dabf19d40f717edd7361ad3801f6642046376000000000000005581a3b65fc336f7011e6810cdc9295e03b2bac1e1362562fdf7521783ca9fb1e66ac0a2e9deb41ee5f9eb573278f8f4f6115afa42170fb2be7b3318e5dc441f6281054a4ee916a57bb4023a4e94ce847bf61eb36773ac1a2415f73602457494cfdc019aa0074a2c668c1c56d0c13ad5cc781223e902a5baf892347734c10a5f07"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:39 executing program 3: epoll_create(0x3b79) 06:41:39 executing program 4: mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) add_key$fscrypt_provisioning(&(0x7f00000001c0)='fscrypt-provisioning\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x18, 0xfffffffffffffff8) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, @perf_bp={0x0}, 0x500, 0x2, 0xfffffffc, 0x4, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000100)=@urb_type_bulk={0x3, {}, 0x0, 0x24, &(0x7f0000000ac0)="02df0f67a63f61afe90ccbd34292294e783c4df58b2b3023f76e2477618dc8d5c8b4d8933613bc9b89a3b63361d68aa6134fbe2d8e4eb43e", 0x38, 0xee32, 0xffff, 0x8, 0x9, 0x8, &(0x7f0000000bc0)}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f00000000c0)=@urb_type_bulk={0x3, {}, 0x4, 0x20, &(0x7f00000002c0)="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", 0x7f9, 0x1, 0x0, 0x400, 0xffff, 0x0, 0x0}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) syz_genetlink_get_family_id$smc(&(0x7f0000000080)='SMC_PNETID\x00', 0xffffffffffffffff) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000001000)={0x0, 0x31, 0x3, 0x800, 0x0, 0x9, 0x0}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000140)=@usbdevfs_connect={0x10001}) 06:41:39 executing program 5: r0 = epoll_create(0x7) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)={0x30000002}) 06:41:39 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000080)=[{0x6}]}) 06:41:39 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000180)={0x3, &(0x7f0000000140)=[{0x1, 0xdc, 0x81, 0x4}, {0x1, 0x81, 0x4, 0x400}, {0x3}]}) [ 1022.185280][T31161] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1022.222070][T31161] device team0 left promiscuous mode 06:41:39 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1022.263058][T31161] device team_slave_0 left promiscuous mode [ 1022.298581][T31161] device team_slave_1 left promiscuous mode 06:41:40 executing program 5: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x285}, 0x40) [ 1022.321471][T31161] bridge0: port 3(team0) entered disabled state [ 1022.353946][T31161] team0: Cannot enslave team device to itself 06:41:40 executing program 4: mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) add_key$fscrypt_provisioning(&(0x7f00000001c0)='fscrypt-provisioning\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x18, 0xfffffffffffffff8) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, @perf_bp={0x0}, 0x500, 0x2, 0xfffffffc, 0x4, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000100)=@urb_type_bulk={0x3, {}, 0x0, 0x24, &(0x7f0000000ac0)="02df0f67a63f61afe90ccbd34292294e783c4df58b2b3023f76e2477618dc8d5c8b4d8933613bc9b89a3b63361d68aa6134fbe2d8e4eb43e", 0x38, 0xee32, 0xffff, 0x8, 0x9, 0x8, &(0x7f0000000bc0)}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f00000000c0)=@urb_type_bulk={0x3, {}, 0x4, 0x20, &(0x7f00000002c0)="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", 0x7f9, 0x1, 0x0, 0x400, 0xffff, 0x0, 0x0}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) syz_genetlink_get_family_id$smc(&(0x7f0000000080)='SMC_PNETID\x00', 0xffffffffffffffff) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000001000)={0x0, 0x31, 0x3, 0x800, 0x0, 0x9, 0x0}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000140)=@usbdevfs_connect={0x10001}) 06:41:40 executing program 2: r0 = openat$bsg(0xffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff4000/0xa000)=nil, 0xa000, 0x0, 0x40010, r0, 0x8000000) [ 1022.385389][T31165] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1022.418134][T31165] bridge0: port 3(team0) entered blocking state [ 1022.450430][T31165] bridge0: port 3(team0) entered disabled state [ 1022.467187][ T36] audit: type=1326 audit(1614753700.135:38): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=system_u:system_r:kernel_t:s0 pid=31167 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=202 compat=0 ip=0x465ef9 code=0x0 [ 1022.584815][T31177] hub 9-0:1.0: USB hub found [ 1022.600531][T31165] device team0 entered promiscuous mode [ 1022.613953][T31177] hub 9-0:1.0: 8 ports detected [ 1022.616195][T31165] device team_slave_0 entered promiscuous mode [ 1022.668736][T31165] device team_slave_1 entered promiscuous mode [ 1022.746604][T31165] bridge0: port 3(team0) entered blocking state [ 1022.753494][T31165] bridge0: port 3(team0) entered forwarding state 06:41:40 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ff01e97628a88a4b37032f1ef8b8046a3237ad1fe10f70354891383c49eb9ae77505ea79fc8f6c673e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2818206ce270d76191b43ab4cbdd4dbcccdc644fe65e7bd90a5fc16387bcb5e1e028d7d2a33c78cb8fe48ddcf6adfc9417bd42909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9538eb067b21111dbaa58b19a52f3f12880128d08eb477ad349c2214bc7f8378b7e5b5415f3dae167ef056655c6b66beaf92e416313dfe58e88fbfa825114227c2f6cfd1448ca37902a5678af7277e6cde25737b058ba3ca60696bc1d4df56b6f3c1b5904def348912e1fefe8164c3341b91913718593085d2a9a260663c11f5484cad2de673f9a1fcac868ff6cb20122f76531881165f4d46e1a23ce0dc462ff47e1fb4a8e2a1f6e3b8134031eb29e068c831dc2d825b82749063a85bf6c1bcf4c00008e4900000000000000bf97843daf190000009e66460322524081f961f3a6bec7b84976ae5fc7a8d29dc65277d3a47422bcf49b6ac1c6d0d57dd3e55dc62e58b25a34d1a482652315813e92188263a93f13dde4dd81dfe32af06f6f3fcd73789cc69925a3211955290f85e42dabf19d40f717edd7361ad3801f6642046376000000000000005581a3b65fc336f7011e6810cdc9295e03b2bac1e1362562fdf7521783ca9fb1e66ac0a2e9deb41ee5f9eb573278f8f4f6115afa42170fb2be7b3318e5dc441f6281054a4ee916a57bb4023a4e94ce847bf61eb36773ac1a2415f73602457494cfdc019aa0074a2c668c1c56d0c13ad5cc781223e902a5baf892347734c10a5f07654661c17c77eb33637be6c4a4199fae8e780efbc7"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:40 executing program 5: setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f00000000c0)=@req3, 0xfffffffffffffef5) 06:41:40 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001100)={0x0, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x74) 06:41:40 executing program 2: socketpair(0x25, 0x3, 0x1447, &(0x7f0000000200)) 06:41:40 executing program 4: mremap(&(0x7f0000005000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) add_key$fscrypt_provisioning(&(0x7f00000001c0)='fscrypt-provisioning\x00', &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x18, 0xfffffffffffffff8) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1001, 0x0, @perf_bp={0x0}, 0x500, 0x2, 0xfffffffc, 0x4, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbfs(&(0x7f0000000180)='/dev/bus/usb/00#/00#\x00', 0x77, 0x1) ioctl$USBDEVFS_SUBMITURB(r0, 0x8038550a, &(0x7f0000000100)=@urb_type_bulk={0x3, {}, 0x0, 0x24, &(0x7f0000000ac0)="02df0f67a63f61afe90ccbd34292294e783c4df58b2b3023f76e2477618dc8d5c8b4d8933613bc9b89a3b63361d68aa6134fbe2d8e4eb43e", 0x38, 0xee32, 0xffff, 0x8, 0x9, 0x8, &(0x7f0000000bc0)}) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000380)) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$USBDEVFS_SUBMITURB(0xffffffffffffffff, 0x8038550a, &(0x7f00000000c0)=@urb_type_bulk={0x3, {}, 0x4, 0x20, &(0x7f00000002c0)="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", 0x7f9, 0x1, 0x0, 0x400, 0xffff, 0x0, 0x0}) mlock2(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1}, 0x1c) syz_genetlink_get_family_id$smc(&(0x7f0000000080)='SMC_PNETID\x00', 0xffffffffffffffff) ioctl$USBDEVFS_CONTROL(0xffffffffffffffff, 0xc0185500, &(0x7f0000001000)={0x0, 0x31, 0x3, 0x800, 0x0, 0x9, 0x0}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000140)=@usbdevfs_connect={0x10001}) 06:41:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:40 executing program 3: r0 = openat$vcs(0xffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x80003, 0x0) read$FUSE(r0, 0x0, 0x0) 06:41:40 executing program 5: r0 = openat$bsg(0xffffff9c, &(0x7f0000000080)='/dev/bsg\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000000)='nl80211\x00', r0) 06:41:40 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x8, &(0x7f0000000000)=@gcm_128={{}, "9bae36ff2bb8f46a", "dfc4f22df913b21cf83146d47dd57b15", "8daa96f8", "89fd1f3f5a03d1f3"}, 0x28) [ 1023.003659][T31195] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1023.052239][T31195] device team0 left promiscuous mode [ 1023.073655][T31195] device team_slave_0 left promiscuous mode [ 1023.094546][T31195] device team_slave_1 left promiscuous mode 06:41:40 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:40 executing program 3: migrate_pages(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)) [ 1023.139445][T31195] bridge0: port 3(team0) entered disabled state [ 1023.211795][T31195] team0: Cannot enslave team device to itself 06:41:41 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:41 executing program 5: syz_mount_image$msdos(&(0x7f0000000340)='msdos\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x0, &(0x7f0000000480), 0xd1, &(0x7f00000004c0)={[{@fat=@errors_continue='errors=continue'}, {@fat=@nfs='nfs'}]}) 06:41:41 executing program 2: r0 = socket$unix(0x1, 0x5, 0x0) sendmmsg$unix(r0, 0x0, 0x0, 0x20000080) 06:41:41 executing program 4: r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) r1 = dup(r0) write$FUSE_GETXATTR(r1, 0x0, 0x0) 06:41:41 executing program 3: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000280)='ns/user\x00') dup3(r0, r1, 0x0) write(r1, 0x0, 0x0) 06:41:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1023.441730][T31218] FAT-fs (loop5): bogus number of reserved sectors [ 1023.445831][T31224] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1023.456890][T31224] team0: Cannot enslave team device to itself 06:41:41 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 06:41:41 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_tcp_int(r0, 0x6, 0x24, &(0x7f00000004c0), &(0x7f0000000500)=0x4) 06:41:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ff01e97628a88a4b37032f1ef8b8046a3237ad1fe10f70354891383c49eb9ae77505ea79fc8f6c673e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2818206ce270d76191b43ab4cbdd4dbcccdc644fe65e7bd90a5fc16387bcb5e1e028d7d2a33c78cb8fe48ddcf6adfc9417bd42909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9538eb067b21111dbaa58b19a52f3f12880128d08eb477ad349c2214bc7f8378b7e5b5415f3dae167ef056655c6b66beaf92e416313dfe58e88fbfa825114227c2f6cfd1448ca37902a5678af7277e6cde25737b058ba3ca60696bc1d4df56b6f3c1b5904def348912e1fefe8164c3341b91913718593085d2a9a260663c11f5484cad2de673f9a1fcac868ff6cb20122f76531881165f4d46e1a23ce0dc462ff47e1fb4a8e2a1f6e3b8134031eb29e068c831dc2d825b82749063a85bf6c1bcf4c00008e4900000000000000bf97843daf190000009e66460322524081f961f3a6bec7b84976ae5fc7a8d29dc65277d3a47422bcf49b6ac1c6d0d57dd3e55dc62e58b25a34d1a482652315813e92188263a93f13dde4dd81dfe32af06f6f3fcd73789cc69925a3211955290f85e42dabf19d40f717edd7361ad3801f6642046376000000000000005581a3b65fc336f7011e6810cdc9295e03b2bac1e1362562fdf7521783ca9fb1e66ac0a2e9deb41ee5f9eb573278f8f4f6115afa42170fb2be7b3318e5dc441f6281054a4ee916a57bb4023a4e94ce847bf61eb36773ac1a2415f73602457494cfdc019aa0074a2c668c1c56d0c13ad5cc781223e902a5baf892347734c10a5f07654661c17c77eb33637be6c4a4199fae8e780efbc74d9e361d80cbed4af4de00"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1023.490464][T31218] FAT-fs (loop5): Can't find a valid FAT filesystem 06:41:41 executing program 3: pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = syz_open_procfs$userns(0x0, &(0x7f0000000280)='ns/user\x00') dup3(r0, r1, 0x0) writev(r1, 0x0, 0x0) 06:41:41 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) bind$unix(r1, &(0x7f0000366000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r1, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x2b) r2 = accept$packet(r1, 0x0, 0x0) writev(r2, 0x0, 0x0) [ 1023.595248][T31218] FAT-fs (loop5): bogus number of reserved sectors [ 1023.603620][T31218] FAT-fs (loop5): Can't find a valid FAT filesystem 06:41:41 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r0, &(0x7f0000002bc0)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/65, 0x41}], 0x1}}], 0x1, 0x0, &(0x7f0000000500)={0x0, 0x3938700}) 06:41:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000040), 0x0, 0x40, 0x0, 0x5c) [ 1023.683458][T31240] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1023.712231][T31240] team0: Cannot enslave team device to itself 06:41:41 executing program 3: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x55b302, 0x0) 06:41:41 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, "d8bb1b71c8385125789a6ca93be9121212653a"}) 06:41:41 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, 0x0, 0x0) 06:41:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:41 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r0, 0x8933, 0x0) [ 1023.953558][T31259] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:41 executing program 3: prlimit64(0x0, 0x0, &(0x7f00000000c0)={0x3, 0x5}, 0x0) 06:41:41 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) [ 1023.996811][T31259] team0: Cannot enslave team device to itself 06:41:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000000a40)=[{0x0, 0x0, 0x0}], 0x1, 0x4000) 06:41:41 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, 0x0, 0x0) 06:41:41 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg(r0, &(0x7f0000006940)=[{{0x0, 0x0, &(0x7f0000001480)=[{&(0x7f0000000100)=""/115, 0x73}], 0x1}}], 0x1, 0x0, 0x0) [ 1024.190702][T31272] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1024.235574][T31272] team0: Cannot enslave team device to itself 06:41:42 executing program 5: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0xc0, 0x0) 06:41:42 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @private2}, 0x1c) 06:41:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ff01e97628a88a4b37032f1ef8b8046a3237ad1fe10f70354891383c49eb9ae77505ea79fc8f6c673e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2818206ce270d76191b43ab4cbdd4dbcccdc644fe65e7bd90a5fc16387bcb5e1e028d7d2a33c78cb8fe48ddcf6adfc9417bd42909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9538eb067b21111dbaa58b19a52f3f12880128d08eb477ad349c2214bc7f8378b7e5b5415f3dae167ef056655c6b66beaf92e416313dfe58e88fbfa825114227c2f6cfd1448ca37902a5678af7277e6cde25737b058ba3ca60696bc1d4df56b6f3c1b5904def348912e1fefe8164c3341b91913718593085d2a9a260663c11f5484cad2de673f9a1fcac868ff6cb20122f76531881165f4d46e1a23ce0dc462ff47e1fb4a8e2a1f6e3b8134031eb29e068c831dc2d825b82749063a85bf6c1bcf4c00008e4900000000000000bf97843daf190000009e66460322524081f961f3a6bec7b84976ae5fc7a8d29dc65277d3a47422bcf49b6ac1c6d0d57dd3e55dc62e58b25a34d1a482652315813e92188263a93f13dde4dd81dfe32af06f6f3fcd73789cc69925a3211955290f85e42dabf19d40f717edd7361ad3801f6642046376000000000000005581a3b65fc336f7011e6810cdc9295e03b2bac1e1362562fdf7521783ca9fb1e66ac0a2e9deb41ee5f9eb573278f8f4f6115afa42170fb2be7b3318e5dc441f6281054a4ee916a57bb4023a4e94ce847bf61eb36773ac1a2415f73602457494cfdc019aa0074a2c668c1c56d0c13ad5cc781223e902a5baf892347734c10a5f07654661c17c77eb33637be6c4a4199fae8e780efbc74d9e361d80cbed4af4de000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:42 executing program 2: open$dir(&(0x7f0000001380)='./file0\x00', 0xf666ab76fb945167, 0x0) 06:41:42 executing program 4: semget$private(0x0, 0x5, 0x102) 06:41:42 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, 0x0, 0x0) [ 1024.787612][ T36] audit: type=1800 audit(1614753702.455:39): pid=31288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=14508 res=0 errno=0 [ 1024.818506][T31292] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ff01e97628a88a4b37032f1ef8b8046a3237ad1fe10f70354891383c49eb9ae77505ea79fc8f6c673e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2818206ce270d76191b43ab4cbdd4dbcccdc644fe65e7bd90a5fc16387bcb5e1e028d7d2a33c78cb8fe48ddcf6adfc9417bd42909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9538eb067b21111dbaa58b19a52f3f12880128d08eb477ad349c2214bc7f8378b7e5b5415f3dae167ef056655c6b66beaf92e416313dfe58e88fbfa825114227c2f6cfd1448ca37902a5678af7277e6cde25737b058ba3ca60696bc1d4df56b6f3c1b5904def348912e1fefe8164c3341b91913718593085d2a9a260663c11f5484cad2de673f9a1fcac868ff6cb20122f76531881165f4d46e1a23ce0dc462ff47e1fb4a8e2a1f6e3b8134031eb29e068c831dc2d825b82749063a85bf6c1bcf4c00008e4900000000000000bf97843daf190000009e66460322524081f961f3a6bec7b84976ae5fc7a8d29dc65277d3a47422bcf49b6ac1c6d0d57dd3e55dc62e58b25a34d1a482652315813e92188263a93f13dde4dd81dfe32af06f6f3fcd73789cc69925a3211955290f85e42dabf19d40f717edd7361ad3801f6642046376000000000000005581a3b65fc336f7011e6810cdc9295e03b2bac1e1362562fdf7521783ca9fb1e66ac0a2e9deb41ee5f9eb573278f8f4f6115afa42170fb2be7b3318e5dc441f6281054a4ee916a57bb4023a4e94ce847bf61eb36773ac1a2415f73602457494cfdc019aa0074a2c668c1c56d0c13ad5cc781223e902a5baf892347734c10a5f07654661c17c77eb33637be6c4a4199fae8e780efbc74d9e361d80cbed4af4de000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:42 executing program 3: r0 = socket$inet(0x2, 0x3, 0x2c) sendmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x4000005) 06:41:42 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000002580)='ns/ipc\x00') 06:41:42 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f00000011c0)={@empty, @empty}, 0xc) [ 1024.863777][T31292] team0: Cannot enslave team device to itself 06:41:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_STOP_NAN(r0, &(0x7f00000001c0)={0xfffffffffffffffd, 0xf, &(0x7f0000000180)={0x0}}, 0x0) 06:41:42 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 1024.934156][ T36] audit: type=1800 audit(1614753702.455:40): pid=31288 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=14508 res=0 errno=0 06:41:42 executing program 3: ioctl$BLKGETSIZE64(0xffffffffffffffff, 0x80081272, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f00000000c0)='NLBL_MGMT\x00', 0xffffffffffffffff) syz_open_dev$ndb(&(0x7f0000000340)='/dev/nbd#\x00', 0x0, 0x40) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000400)='NLBL_MGMT\x00', 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_LISTDEF(r0, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000480)={0x0}}, 0x0) openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000500)='/dev/btrfs-control\x00', 0x44000, 0x0) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000700)='NLBL_MGMT\x00', r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000780)='batadv\x00', 0xffffffffffffffff) 06:41:42 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) connect(r0, &(0x7f0000000140)=@in, 0x80) 06:41:42 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x13, 0x0, 0x0) 06:41:42 executing program 2: r0 = syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, 0x0) [ 1025.139332][T31310] team0: Cannot enslave team device to itself 06:41:42 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x2a000400) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(0xffffffffffffffff, 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x80c01, 0x0) sendto$inet(r0, &(0x7f00000002c0), 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e22, @private}, 0x10) r1 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x0, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = openat$cgroup_procs(r1, &(0x7f0000000180)='cgroup.threads\x00', 0x2, 0x0) writev(r2, &(0x7f00000006c0)=[{&(0x7f0000000000)='0', 0x1}, {0x0}], 0x2) 06:41:43 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 06:41:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xe, 0xffffffffffffffff, 0x6) 06:41:43 executing program 2: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vcsu\x00', 0x40, 0x0) 06:41:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:43 executing program 5: perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdfd6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1025.487337][T31329] team0: Cannot enslave team device to itself 06:41:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x32, 0x0, 0x0) 06:41:43 executing program 2: setsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, &(0x7f0000000080)=[{}], 0xfffffffffffffde7) 06:41:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ff01e97628a88a4b37032f1ef8b8046a3237ad1fe10f70354891383c49eb9ae77505ea79fc8f6c673e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2818206ce270d76191b43ab4cbdd4dbcccdc644fe65e7bd90a5fc16387bcb5e1e028d7d2a33c78cb8fe48ddcf6adfc9417bd42909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9538eb067b21111dbaa58b19a52f3f12880128d08eb477ad349c2214bc7f8378b7e5b5415f3dae167ef056655c6b66beaf92e416313dfe58e88fbfa825114227c2f6cfd1448ca37902a5678af7277e6cde25737b058ba3ca60696bc1d4df56b6f3c1b5904def348912e1fefe8164c3341b91913718593085d2a9a260663c11f5484cad2de673f9a1fcac868ff6cb20122f76531881165f4d46e1a23ce0dc462ff47e1fb4a8e2a1f6e3b8134031eb29e068c831dc2d825b82749063a85bf6c1bcf4c00008e4900000000000000bf97843daf190000009e66460322524081f961f3a6bec7b84976ae5fc7a8d29dc65277d3a47422bcf49b6ac1c6d0d57dd3e55dc62e58b25a34d1a482652315813e92188263a93f13dde4dd81dfe32af06f6f3fcd73789cc69925a3211955290f85e42dabf19d40f717edd7361ad3801f6642046376000000000000005581a3b65fc336f7011e6810cdc9295e03b2bac1e1362562fdf7521783ca9fb1e66ac0a2e9deb41ee5f9eb573278f8f4f6115afa42170fb2be7b3318e5dc441f6281054a4ee916a57bb4023a4e94ce847bf61eb36773ac1a2415f73602457494cfdc019aa0074a2c668c1c56d0c13ad5cc781223e902a5baf892347734c10a5f07654661c17c77eb33637be6c4a4199fae8e780efbc74d9e361d80cbed4af4de000000000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:43 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 06:41:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x10, &(0x7f0000000000)={@empty, @loopback}, 0xc) 06:41:43 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x180, 0x1, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x81, 0x0, 0x0, 0x0, 0x0) 06:41:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1343], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:43 executing program 4: symlink(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@random={'user.', '\x00'}, 0x0, 0x0, 0x0) [ 1025.744985][T31344] team0: Cannot enslave team device to itself 06:41:43 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000007600)={&(0x7f0000004540)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000075c0)={&(0x7f0000004a40)={0x1ec4, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1410, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x8d, 0x4, "518d7283532ff39a3b96aaf3f24728fc0378d95599befad0d2d0d4557e2354abbc92de20f833c75992d335ca273c1b8eeee26029cc619a7aa7e90ea28f8ba30c6df8265eeb7058b90617ac5d2c1211ff92d76c9411ba59eded6521881d546d43390e4208f1e62b28648206942498c624ad55a9fa43beb591e863af25f54aeb6a349abcdb46216ed306"}, @ETHTOOL_A_BITSET_BITS={0x3c, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0xed, 0x4, "f3d7370f2ce0017798d58653a8663902553c6510e9c750579a18bd796d5217126def9b8313072c039d8a3b09dc2d3fb5551ac1023c01d06b2c3eff2a18d578d86433089e5ce561a909b244882a000f89ab907ca6932a54b96c9c37bd62e62404a3c8d238182717d34adecc1aba890c64e70692e3071ebea144f770f2dcd72e9258215682a26606dd018491c73db90027ab4e794de56cfd537e5b309b12d5ba887a997df97f2884327424c9881e761108ecb6a5046da3e8774392f37cf89f87958db30659ae667c8af4bceabdfdd6dda3b183e0b34412cdbb8a8853b84bf579296b00b09da7c8a7529c"}, @ETHTOOL_A_BITSET_MASK={0x1001, 0x5, "319e705c7d7087900c95fad44c30b8a822f7451b599a7fe9257bdf663ebfeeb0e8213a63af834debdf150572a38cc72e5c3312b5dce758633944dfa17fde20d75602642568157297bc460a1dd898206b4f0aac6585fe2063940eeff84d31f7e958c1cb33d51d339c56b3b5d171d6211ba76d42828610618fa16ca656f83b09d153d6bb8af9ec6a6a644fed5408eb60061e7e4f837347f3d269f3460bcbc9cdefcc4a75e98e02e07a5de761fbb4d0fa7c23cecb08c1a81011395093469c131a4dce4720bb4412215685f35580108cb0d6c54793f847f5e43bb9526768f7419ba5606485c0787c1ccc287eceb72fcb9116a468d1997f11f498ca5ba93121a28eed0744c1408ecc00f1543c8fdb478d3d40895793bb48e7a5224de7db1c4220361e3b3a322bd118cb46a49c8bc3493ac4f57c6065698ea597f86feed4c68dcaa89288ad6deb4f3321633353a9b5d128e9f1669c465eed0954e384832b6691f25bfaac9ab26733d675bd2682e138e441092ff985a2ccaa6df2baf0fe19eed3c712872c903492d921291f080fbfbd68652aa45566dde88e9776a573417d2d095e0621085b7f1feea086f2fd82c9bee42ffcd68e282fd79397b5240387e771855f617722b7f920c12d4447ce9c36b74b40dced85e76f388f8ff1ed713f7c61e4f89243b9cc66519a8cec552d962a95fa5063f22802cb8c9e7a00ae946538cedfdb1a0b6389d4ceecfe6c2533dd3163ba9c3b0be7866c467203f0c97a73b2a1e33444e344f6fb7c328b7a989f468663b1d0d43d77e9a1afb5c5d4b604a2726966fabda4a9c0723325182deab0bae34df0f9cb58302f75143eebde63af50e5a609ad021b90d7f9c3cf759960787e5877974a9b7df2f2b60c01b3c09a3906e91ff8d3f1f15033e95150f858d2d0f571bd7b9bf56fba3e45117a31846264e8b03e9c893d80a6ba8c46fe002e32ec7d5e55c52aca562cb4c1051d0f031a00ec7a16f0dc195597595b04f4c6340bd7b9585947a77b08e46539803123bce6b375f22ef254122fc341726924f9f9553d5e94844d45ffb1c1084fd9998d5e564973a2f55fc83f2f3c9dec598f7ef45e95f561ec9fda573eda2f919577fd0fa575c724cd77d4e90a530842b158945a76bdcff3c32d930a092bd7ef427117c734eb06ae7ea44c7534a2fdaa1a2bd292fd35d359a235f811620d7a59f2441ab1f84659ec05ef7ee7d29cf27004e03edd329f3f2c2d3347ed8b72249242ab7497e747549b9a98cd69d6b8241d8725cdfa6437c4c93359bdc86d52b69d77f6e7f0c7c0a5bcff87232d7d1d272a94449b95b8b60d9d8166867ba31ded19794f52e3b3b617e4f048212576f1df1cf5db93cc2a9de1255f58f90b12da39260671e781250af1a72c205a2ea79819f813a15a42c5f573325a941df96796a12900009b9f6d97ba8b9ee35466070d40273e7a1f7f5cd8133286255b9ecd586b747ff144a2f8e57d66e74c00517af5d34f53c3bc44dd41ac7e6f0d53c26ff1c240d1404981cbb53931d8bcc0d6c3d5912889ce5e6df5ca169ca9cf083e9d366d8948942c8126636da2397d500474ece14946f0b03fe5d577bda6a12b8acf590938e308d10857a652e10f62782a31826da0c5cd260d362dceb74c6b6c0be0c059d4d34dfa83ff06aa2e302d1761722dc4eac39023d1a082a4f3acf9527c5ead933b688022ff45099cb3a72f69a10b7a17b1e8eee9b25c320f8f7b3ae39f1768a8ec1ea99b2e063187011d3249eb5c46c48b76fecab9521b7bae23c715c9e8e5dd2a724526bca6ada6b2cfe4d19d9f2122e727002ece8beaf51051c8adab92bcce45454d7e3a8049532a22623eb03627b4706946264f7ab13ed6ae8ec70836df2f53817780a2f85334db71c31f8385b0632c65cb3a9fbe2a4abd7e1dbb7297cb256bc2162db4b6696c0cfb720e387b3b22c718c7898a171bc55a4113d58edea37e77c0430056b5acf944347b8b35ded79cba91776247c5269a150fa36c81550971b012dd955af93ddc4d5c99e1a0adde6b73ffa5dff7b9d2604d64293e7a6eec87b72fdd411c17fa6fa9e22be02518501e981ca65e559e8535c9e7ef1cf5142f0d595c5d86d0fab0cdaa2749a3ba573c852f11eca30066cbfbba5adbfbb63d12e43b815def927af7d77b3647f593e7100f726e0edbdf73b44b2818555f74bb8d3a9b367ae4e284a2cfe65873ed239c72d9c421d81aa8d7616eb2821c6e508b704dbae250c74b596b596bf708bc6ea04fd742f4dbb945986b858e6f8ebd861927da642c006aa73679b6e8a0d383c27fd8f363e5e196898dc99bf2315710dc90e7b0a1b85c6a81709482aca642655084b1f3d23a7c87de98612a6952883efa27a1176dfbdaf82dfdfe5772d2d0793057e732fa7f704a8a2510da861c64d87fd61a67b4082b27055a27749acbb42db3665036cea7df1c26f18eb7164b0eb6b07f218801a0edafb5fbf167442c5f1a4e7782d0d227836bbcfdc86719159354847ab010597c0b70a20610f92be8723c6de402fda7cca52f90151eea847488c353417a4c78f3910d20e80f68f35782f76beed23e238a202c401494314b203c12048c455ef76dbc0721da5e638ce5cb07ca974ffbc3b9ac0a1a67d51a7d330dd1a5547e7a49881b9860f33e1d5573412c5ca83c0f02655bcef5922c8a08b14e7e167f4e1e38b1631b16d3e0f3be556f074603455719e7dface432ae6b303a6e4a9b2fb4057449bb1e7f31cc3d9b2d710bc4ab8bcd7c38367ab75847bcd68f8d4211fc7d52f411ac2500f3911cd6f82a9c53baf9e1807b91b53e211f81b6ada0430b57e5c8f611a736d2d2ebd3ec92d64494871bdc1a78023474dc950776e899e16f57e832e2b0bcde65fad915c3b3f6330162e6240fff5c022975675d5e5527edab5a6cb92c840dc1468a85c8cdb055aedca45f13681e51e6aca61dd94fe274770c9bfc2b9b8110f026f0e13e5894c4f6694012746fe311bd6decd519be67e08244dd7b8b7c21a93f85123e5050c428a1b9b664f1e95763fa0b153f6636abd2b5e7e9e2d8467c493d52976212e37b9f711b8958123f10cc0cf278419375dac3c092b751ff3a6aaf2b06508c1a6339f7ddebea07f7fa500301b7ebb65bad2aeaf825eb86eff97ca3deb1300e305daa134fc1eaefe038d5a736b3ca8f844d2d09072d3a6a9a9adde51225d3a4cc28f813f0c8bd4ab703729985cf33fd542574d0d06b369f89d8f5713032733408d94761c939578ae3b153fa470375d45f31288b750a1cca9a2c3b26625d50e901281282db54fc903a610ca134b3d5419c13dc66052dfe2d60b355ce06e29d0d6205affcc2ee8e6bce531eeccdedee57fb54ebe949711a516bf17b54b4c37ee6010130a44d6747da225722503954a3fdc3c5d9887ce33402dce47a6583e21b7d32beb8a23ea4ba28066266a98951e7c9ad331f8da4fd60e7507ffc18ede651dbce7841e28e57e1b214b9e675ca92dc6a094d700b9d326965517f15e864f4f6090cceee5646a161fb8854544b9870ddbb16e2ab282ace0f0828929cf1bd0993bd4ddabd34500b729284827a8aca45d43fd5079742ae207dc2bf00be9119b69c7199819780947cf7031bc10e6f2888792f0a98668973c6b6aa7ef45e79fb3b9491ab575cc4df3003fe4a15bdf164847dd29fafc9568d3239c4874c094273079fa82d2fe920fb8c48da47d9b68a42e377a4844a9e916c1ad7c14e7f0ffc51c7c6041bae4b1febac573f606a4d7d7d292adc4456291e50a8d30007a764e396c3d96cca741a87652042476afb3560112900f5cd143230aed9a0e6c3877256cf7932252142f816f7e510d5573391b985d9bc6a993558c3276bd36c2f356225fadcd12dbace7612c453965a4ea9e20ff479345d40b7a1a43e30833a41059d929e30d3f09e91811d44b4272147395ea8e4364b2733289d7ec7075c72ccee32a5901ad2eea20eff752e992874bc0f03bf49046df81ec36c90a58002e7fd9865ec205996aa8db5abb64b5db697e2549b952cc5ca19dfd86063f11a9a9e9928fbd016382849fb98c2ba1e4b7df0c8fae58e12a704f4cea2ffba8c312bd1b23c4ae7bcb5177f7ecbac68cac3a5ba72a27957ffc79c26354339c1290876f26b9c90b0dbce132b0556d904724d390e61134998976c04757fa6db20b5634da3fac0c93c43af3763fb7c10f51e3d446f39e1744044bed12d790d2b418812367bc7d288457d03c0be6ccadaa62b6e46f5c451859c7a9ed995f29357f2f5f855723fc90e66f210f7661bf859df48f9588a9ca8ae27e385fa8023bd1f261ba59b77a144514c8f3511199f750a2cd5a9b9702bb364fc376c84db3c13199ca797fe79f3d2f867b43f0e79c60d1ab331077b8b3c52e3fd5dfe14ad8c39ddd6855a65de297e45599ec08318f39c0db06e64ad1f2013b2c516eb77fe5193da70db9b0d3cf1868cfe45ae199e766522943783354793c1ab726f36e52217e4541f2f806d23aed11b74929458477e920819f12d06c107298df53458a1b3dacead6736ab12c05a6a56bda0361532a569c7d6acfd3e957db14b0c1fba53bbae9a0d7c10f5fe93ee49dec6080bc2ecdcc42d17eee05197e51450056ea7df041495e82a4eff6e4d9d28351c5f540aa4090d1abc13383fc06e74292090f205c47b4d2908b9e9df1b110ffe7ea016aa1cc31cd4170b2b7af3ab32fdd6254ca0ab4ff7383198a916e8a68ed95ed909993eaab225def03df24d23d6e1ede1e89c4e3068b159e3b541bd90dae4812e30eeb23e0e56228aac7cad178727298fe9e7b741911bd4b8cad6790e52b842dfe8da190c500808090310ca4cf446d503b3a63762e2f5c715396a32e0f9adcccc06e073d7c39a9f7de51750784a66473a5cad3820def6fa338ccba0ea03f9a32d5ca29c4b9d89cbb2b39cdaba3ff96864a42be3d4a4245308d8cff0d1c79808c2363ad2865b02d840b5af713568a0de8da431f8301685571f65d2bc3376c52bd482d3e45bed995a77870dd060e6c1cd8964ca8a4ae42dd02061dc3a8037b06dcfc75600418b434746fd5919fd864f423c72442429ef5e5c2942a641c533787ad9e60a0d76299e649fde9eda3a2c2a53fdb29e8cd201a51ad645b03116313dd3fdd84fb7478a48f9523c3fdd653f01c80728b112705e3471c726231ef168d3b75fa103862c4bbdf07e713b012d724ff0af64c4162c26edafa0087d049c455cfa14112d6d447c9527ce91c5a784c4f60acae0b36dacb59a20fae2c440cfbda30508be75a1d52d8f655ee0abebb39cc80f8fa55bf330250d6467c0f08d60463e3f177d43a149f6395bd73d1f63b17d3a083ea75952b6db7b3258aed85e4250dd3372e6ecaf8b382f77842626d9e5c06cf9837535aeb30854cf068948673bb7a361039e976ff312bbdace5ef659eccb43cf272383059a4f08533d44914763dc4c584dff5e21e957064c3c7bd98c561638e722b9ea1ea25e54ed630e2c3c026f498aa70756a799edbeb95216051ea64051cdc6029cca05709301e3325851ed64bda2dfb144742e44763f9d4219ce51ef3ff903004d527e657d559a945ae29006d128fa49a36ec85105dded9355a0da7e323de3b15f5ed6f5d679dc0f4e55816845253bb993f27b02d725cc7790dcc8f7e733eeef75b632f0024730345ab93e6cdfa8f869bf6843382e1768778a3d82a61b41f3beb5a5833fbe4f95426f005c5f4a070e1f1b3016517bf81770ff51a8a9981790201e0d8e813263034fc610dddf649a562512804b3cd407"}, @ETHTOOL_A_BITSET_VALUE={0x9, 0x4, "2e826b1417"}, @ETHTOOL_A_BITSET_BITS={0x108, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'syztnl2\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'gretap0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\'{\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'queue_id\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x13, 0x2, '#:(%,-&-$&]%:(\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':@\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x1e, 0x2, 'lb_stats_refresh_interval\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ')^/\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'queue_id\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '}E)&\x00'}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x35, 0x4, "4cd8e81dcd6f15c4829ea4514f610cbf55bcd71a44c625407185e085b347a18b3c11873d529a27d54419229d2d5e9bf51e"}, @ETHTOOL_A_BITSET_VALUE={0xf9, 0x4, "f97345bfc569d8de1a5bd0daf53ab08dd2ca2bb021cf092c2c61757103584501d631406f632e27bef228bc6bab23e51831b2fd6e177c20d35b0e6dda19522410fe9360f948c7ef11e065bfe6718496b1482244f4077f467b15134dc78efdb757d8af2b483e940ed562748656a5b41c85e1b37f02f0f892439c2fb06a5d0a79a5ce7bb408cabdd63eed6bb879c6f67f9d904bbcf5e33d6516c59e687ae78c4ee85dfe195c7ad47009b352b1b26b652668f63bef530b219d087e71d25e608f639b32c990ccfd61d3e7f0f732f4a2b0a5c74edef6bc05fbc9ea8112e8c6fd31096bea941fef8e23688f61b9bf7e4f64cf2c6ff4f1f49d"}]}, @ETHTOOL_A_FEATURES_WANTED={0x3c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x31, 0x4, "383a23823a54a8a4e3d45734b3edfd9274f2027c2f738f89ed5269d3f636471983711138ecdb9b7e9d0bee9835"}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_WANTED={0x10c, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x7d, 0x4, "36349053b6cf56200fa6644518c04c3834d501c385e96671556444c0b0dc9d76be56e6bf11d09d7bb483a75c82e8cb92f0ae259bb6aa70317227e0586ef8e331b84a5a6822e021485f8ae445ec8e56c791997f05b83f5b222e83edfd16743e558f06edbee5c4be1f82fc269408441b5ba4dceaa88e62a48fef"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x81, 0x5, "63676597b2caa54b5dbf90767d6fd7afc3a0c6414051507bcd10d231daeb8c0d99bd8d966cec25481c03d7c5482f5f3003917e0863c59c55763fc0544211560c262b8c1f054e394d8eede6095e0ad4a0852fcd6fc1ea1abd7ca376cae216a6db62d67036430bfbcab827c26099f99af13b7525335e5b809db953ed8714"}]}, @ETHTOOL_A_FEATURES_WANTED={0x958, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x8d, 0x4, "9458d1bdb152c574b193569768adb646ab7994c72d5ec881cd263f3afb60697041ea07078f1afdc9dc29f5abb4c7e9a1c4301e88cade68635a2f938c7b541015e4b5b971e542b37c56cd65fd98119f555af293c7cda7503c87ed6a5e81ac268778d3faf43e2c40d332d0c3b492bf9cf40acf25283c9c37060475851fe8ac92772d0825260afeb64aad"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0x1d, 0x5, "7c1a8c37c0eee0c78905b56f400252ab02377422bad5824735"}, @ETHTOOL_A_BITSET_MASK={0x85, 0x5, "b543ea6d892d92916593cc75df19d47df989edaf68ea6c161ebae36b32f2c497b723701f67b2689c73607bc5ac0027ee4b9c6e684c76e55fd71750840288fcabfaf375972e88f091ab478ba1202bd5d62e1e43284d1866c3b8db0c115af6a84908c70984663f2b39aef5c43abde8b5d436f93570437aece15223f4e32b999bd4cb"}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0x809, 0x5, "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"}]}]}, 0x1ec4}}, 0x0) 06:41:43 executing program 5: syz_mount_image$tmpfs(&(0x7f0000000040)='tmpfs\x00', &(0x7f0000000440)='./file0\x00', 0x0, 0x0, &(0x7f0000000300), 0x0, &(0x7f0000000380)={[{@huge_never='huge=never'}, {@huge_always='huge=always'}, {@mode={'mode'}}, {@gid={'gid', 0x3d, 0xee00}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '.log\x00'}}]}) 06:41:43 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)}, 0x0) 06:41:43 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x180, 0x1, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x81, 0x0, 0x0, 0x0, 0x0) 06:41:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1343], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:43 executing program 2: prctl$PR_SET_MM(0x4, 0x0, &(0x7f0000ffb000/0x2000)=nil) [ 1025.971652][T31358] tmpfs: Unknown parameter 'smackfsfloor' [ 1025.988438][T31361] team0: Cannot enslave team device to itself 06:41:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x4, 0x0, 0x88) [ 1026.073927][T31358] tmpfs: Unknown parameter 'smackfsfloor' 06:41:43 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)}, 0x0) 06:41:43 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x6, &(0x7f0000000000)={@empty, @loopback}, 0xc) 06:41:43 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1343], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:43 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x14, &(0x7f0000000000)={@empty, @loopback}, 0xc) 06:41:43 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r0, 0x0, 0x11, &(0x7f0000000000)={@empty, @loopback}, 0xc) 06:41:43 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x180, 0x1, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x81, 0x0, 0x0, 0x0, 0x0) [ 1026.251449][T31377] team0: Cannot enslave team device to itself 06:41:44 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)}, 0x0) 06:41:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1344], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:44 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x30a80, 0x0) close(r0) 06:41:44 executing program 2: syz_emit_ethernet(0x36, &(0x7f0000000100)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 06:41:44 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0) r0 = geteuid() chown(&(0x7f0000000000)='./file1\x00', r0, 0x0) 06:41:44 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x180, 0x1, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x81, 0x0, 0x0, 0x0, 0x0) [ 1026.479162][T31393] validate_nla: 5 callbacks suppressed [ 1026.479180][T31393] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:44 executing program 2: setpgid(0x0, 0x0) r0 = getpgid(0x0) setpgid(r0, 0x0) 06:41:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1344], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:44 executing program 5: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000240)={{0x0, 0xffffffffffffffff}}) [ 1026.561203][T31393] team0: Cannot enslave team device to itself 06:41:44 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 06:41:44 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001080)='/dev/zero\x00', 0x0, 0x0) dup(r0) 06:41:44 executing program 5: munmap(&(0x7f0000000000/0x1000)=nil, 0x1000) madvise(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) [ 1026.744942][T31414] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ff01e97628a88a4b37032f1ef8b8046a3237ad1fe10f70354891383c49eb9ae77505ea79fc8f6c673e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2818206ce270d76191b43ab4cbdd4dbcccdc644fe65e7bd90a5fc16387bcb5e1e028d7d2a33c78cb8fe48ddcf6adfc9417bd42909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9538eb067b21111dbaa58b19a52f3f12880128d08eb477ad349c2214bc7f8378b7e5b5415f3dae167ef056655c6b66beaf92e416313dfe58e88fbfa825114227c2f6cfd1448ca37902a5678af7277e6cde25737b058ba3ca60696bc1d4df56b6f3c1b5904def348912e1fefe8164c3341b91913718593085d2a9a260663c11f5484cad2de673f9a1fcac868ff6cb20122f76531881165f4d46e1a23ce0dc462ff47e1fb4a8e2a1f6e3b8134031eb29e068c831dc2d825b82749063a85bf6c1bcf4c00008e4900000000000000bf97843daf190000009e66460322524081f961f3a6bec7b84976ae5fc7a8d29dc65277d3a47422bcf49b6ac1c6d0d57dd3e55dc62e58b25a34d1a482652315813e92188263a93f13dde4dd81dfe32af06f6f3fcd73789cc69925a3211955290f85e42dabf19d40f717edd7361ad3801f6642046376000000000000005581a3b65fc336f7011e6810cdc9295e03b2bac1e1362562fdf7521783ca9fb1e66ac0a2e9deb41ee5f9eb573278f8f4f6115afa42170fb2be7b3318e5dc441f6281054a4ee916a57bb4023a4e94ce847bf61eb36773ac1a2415f73602457494cfdc019aa0074a2c668c1c56d0c13ad5cc781223e902a5baf892347734c10a5f07654661c17c77eb33637be6c4a4199fae8e780efbc74d9e361d80cbed4af4de00"/1344], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:44 executing program 2: mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4) 06:41:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0/file0/file0/file0\x00', 0x0, 0x0) [ 1026.788434][T31414] team0: Cannot enslave team device to itself 06:41:44 executing program 4: r0 = syz_open_pts(0xffffffffffffffff, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, r0) 06:41:44 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 06:41:44 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @empty, @val, {@ipv6}}, 0x0) 06:41:44 executing program 3: setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) 06:41:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:44 executing program 2: msgget(0x2, 0x614) [ 1027.019668][T31432] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1027.046393][T31432] team0: Cannot enslave team device to itself 06:41:44 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000100)={@broadcast, @broadcast, @val, {@ipv4}}, 0x0) 06:41:44 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{0x0}], 0x1}, 0x0) 06:41:44 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="b702000003440200bfa30000000000001702000000feffff7a0af0ff01ffffff79a4f0ff00000000b7060000ffffffff3d640200000000005502faff037202000404000001007d60b6030000001000f06a0a00fe390000008500000028000000a7000000000000009500000000000000a81bbfa3982de7b0cc548584c0acb1efc5733ed236e4add6de01800000aaa6912a8b2ce571c4580000f7000000e3a94b574d2eb38a548355f0b886bd8862f95eb46672dab80706dc6370282f001362df1d4fdd860db5808922433e3e0f242a46b3009a54f4077db0ffbd9d5fdb68832e986440ff0a7edfa0cb231ccd00000000000000000000007777e270604930738008000000ed91f33fb382d91ae8e18c9b6c9f0322ec4f1c7cc5869ff45589018000004e2ddf8b86e714229527ca40b24cfd6a02fa0892739507982d90e116bba29bffffba70a4cd8f3ad2db451de058226c4e31a27bf456c04c58bdd0b424ac416e66af9ebcfea905d37cf226312cb81ec843bcea06e7fa5e5b3596301460142f83b4658000000000000000fd0600000000000000d2110c72e1f4682c24a31444855e0807f0b1766ec7ecbd061772daa52a38539295d3fea7a7e669441e1f080000000000000043897f8d9c3c287acba716973eadf1bf9cd0a38edc345415c42d3d2dd356e205585e30a64830a5796cd7ce18b68bc37e061d33357d6a39d33c702576c82a8881663e3776c7a37c5c962e12102f2315bf60c0a3bf07d55b3888418de2b2ad23d25395dd4ccddf247dd2c712e2e2eaf7d4326968122cc5dcaa7ba330963b7093a58a02dba114f75e1ffd5c2912b506bfb93122fc776aadec51a367658100000000000000b148a9000000000000000000000000000000e02739ccd50523d36032d38f5cbeaf95c7d797d6e094c4a3aee025bf43cebde7e7cdbae9b1698e19eb0e6d5244c1ff01e97628a88a4b37032f1ef8b8046a3237ad1fe10f70354891383c49eb9ae77505ea79fc8f6c673e514f2b3e1028cd404a1d8fe6569da0385e65e4d523166c4213abb8dae5b1409317f29572e788af92aedb0287f2818206ce270d76191b43ab4cbdd4dbcccdc644fe65e7bd90a5fc16387bcb5e1e028d7d2a33c78cb8fe48ddcf6adfc9417bd42909ee4307c4197b15797af17845fbc02846d2f8543f65594cb535a9538eb067b21111dbaa58b19a52f3f12880128d08eb477ad349c2214bc7f8378b7e5b5415f3dae167ef056655c6b66beaf92e416313dfe58e88fbfa825114227c2f6cfd1448ca37902a5678af7277e6cde25737b058ba3ca60696bc1d4df56b6f3c1b5904def348912e1fefe8164c3341b91913718593085d2a9a260663c11f5484cad2de673f9a1fcac868ff6cb20122f76531881165f4d46e1a23ce0dc462ff47e1fb4a8e2a1f6e3b8134031eb29e068c831dc2d825b82749063a85bf6c1bcf4c00008e4900000000000000bf97843daf190000009e66460322524081f961f3a6bec7b84976ae5fc7a8d29dc65277d3a47422bcf49b6ac1c6d0d57dd3e55dc62e58b25a34d1a482652315813e92188263a93f13dde4dd81dfe32af06f6f3fcd73789cc69925a3211955290f85e42dabf19d40f717edd7361ad3801f6642046376000000000000005581a3b65fc336f7011e6810cdc9295e03b2bac1e1362562fdf7521783ca9fb1e66ac0a2e9deb41ee5f9eb573278f8f4f6115afa42170fb2be7b3318e5dc441f6281054a4ee916a57bb4023a4e94ce847bf61eb36773ac1a2415f73602457494cfdc019aa0074a2c668c1c56d0c13ad5cc781223e902a5baf892347734c10a5f07654661c17c77eb33637be6c4a4199fae8e780efbc74d9e361d80cbed4af4de00"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:44 executing program 5: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @remote, @val, {@ipv4}}, 0x0) 06:41:44 executing program 3: mlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ff9000/0x3000)=nil, 0x3000) 06:41:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) renameat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000080)='./file0\x00') 06:41:44 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @remote, @val, {@ipv4}}, 0x0) [ 1027.267068][T31447] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1027.301612][T31447] team0: Cannot enslave team device to itself 06:41:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000040), 0x10}, 0x78) 06:41:45 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 06:41:45 executing program 5: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x16, 0x0, &(0x7f0000000080)) 06:41:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000100)="390000001300034700bb65e1c3e4ffff06000000010000004500000025000000190004000400ad000200000000000006040000000000000000", 0x39}], 0x1) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000000000)={@multicast2, @loopback}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f0000000140)=[{&(0x7f00000000c0)="39000000130003470fbb65e1c3e4ffff06000000010000005600000025000000190004000400000007fd17e5ff8e0606040020000000000000", 0x39}], 0x1) 06:41:45 executing program 4: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000240), 0x8) 06:41:45 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_MAX_BURST(r0, 0x84, 0x10, 0x0, &(0x7f0000000080)) 06:41:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) [ 1027.521442][T31464] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1027.553009][T31464] team0: Cannot enslave team device to itself 06:41:45 executing program 5: r0 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="1c0000001200050f0c1000000049b23e9b200a00080001c000000001", 0x1c, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f00000003c0)={0x0, 0xffffffffffffffeb, &(0x7f0000000940)=[{&(0x7f0000005200)=""/4096, 0x1000}, {&(0x7f0000002a00)=""/4100, 0x1004}, {&(0x7f00000019c0)=""/4076, 0xfec}], 0x3}, 0x0) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom$inet6(r0, &(0x7f0000000000)=""/114, 0xfffffffffffffd1b, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="9000000020001f", 0x7, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="58ad000011", 0x5, 0x0, 0x0, 0x0) r1 = socket$inet6(0x10, 0x3, 0x0) sendto$inet6(r1, &(0x7f0000000000)='s', 0x10a73, 0x800, 0x0, 0x4b6ae4f95a5de35b) [ 1027.583184][T31467] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 1027.612385][T31467] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 06:41:45 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 06:41:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 06:41:45 executing program 4: socket$packet(0x11, 0xa, 0x300) 06:41:45 executing program 2: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={0x0, 0x0, 0x30}, 0x10) 06:41:45 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"/1344], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0}, 0x78) 06:41:45 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f00000000c0)=0x10) 06:41:45 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) close(r2) socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x11, 0x3, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=ANY=[@ANYBLOB="440000001000010400"/20, @ANYRES32=r4, @ANYBLOB="0000000000000000240012800b000100627269646765000014000280050019000000000005002d"], 0x44}}, 0x0) write$binfmt_misc(r1, &(0x7f0000000000)=ANY=[], 0xfffffecc) splice(r0, 0x0, r2, 0x0, 0x8001, 0x0) [ 1028.397080][T31479] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1028.411396][T31479] team0: Cannot enslave team device to itself [ 1028.435184][T31490] netlink: 44371 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1028.487179][T31467] netlink: 'syz-executor.3': attribute type 4 has an invalid length. [ 1028.567347][T31477] netlink: 33207 bytes leftover after parsing attributes in process `syz-executor.5'. 06:41:46 executing program 3: r0 = socket$vsock_stream(0x28, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8940, 0x0) 06:41:46 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000300), 0x8) 06:41:46 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)}], 0x1}, 0x0) 06:41:46 executing program 4: r0 = socket$kcm(0x29, 0x5, 0x0) sendmsg$kcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) [ 1029.742381][T31508] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1029.755179][T31508] team0: Cannot enslave team device to itself 06:41:47 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) getsockname(r0, 0x0, &(0x7f0000000180)) 06:41:47 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'ip6tnl0\x00', 0x0, 0x2f, 0x1, 0x80, 0xc09e, 0x8, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80, 0x8000, 0x6, 0x5}}) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcsa\x00', 0x80240, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001b40)='/dev/vcsa\x00', 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r3, 0x89fb, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000480)=@bpf_tracing={0x1a, 0x7, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000400000000000000070000004f400100100000009500200000000000850000008e00000000980000ff0f00009500000028000000"], &(0x7f0000000080)='GPL\x00', 0xffffffff, 0xff8, &(0x7f0000000500)=""/4088, 0x41100, 0x3, [], r1, 0x18, r2, 0x8, &(0x7f00000001c0)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000240)={0x3, 0xd, 0x1000, 0x1}, 0x10, 0xd80a, r3}, 0x78) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x890b, &(0x7f0000000200)) 06:41:47 executing program 2: syz_io_uring_setup(0x69f7, &(0x7f0000003f40), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000003fc0), &(0x7f0000004000)) 06:41:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_CMD_GET_NODES(r0, &(0x7f0000000980)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000940)={0x0}}, 0x0) 06:41:47 executing program 0: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x5000) r0 = shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x5000) shmdt(r0) 06:41:47 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef4100000", 0x17}], 0x1}, 0x0) 06:41:47 executing program 0: sendmsg$TIPC_CMD_SHOW_NAME_TABLE(0xffffffffffffffff, 0x0, 0xe97d4fb9bcac4b7c) 06:41:47 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000011c0)='/dev/vcs#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x1) [ 1030.038739][T31534] team0: Cannot enslave team device to itself 06:41:47 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$bt_hci(r0, 0x0, 0x0, 0x0, 0x0) 06:41:47 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef4100000", 0x17}], 0x1}, 0x0) 06:41:47 executing program 5: openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x400, 0x0) 06:41:47 executing program 4: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyS3\x00', 0x80901, 0x0) 06:41:47 executing program 0: add_key(&(0x7f0000000080)='cifs.idmap\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffd) add_key$fscrypt_v1(&(0x7f0000000240)='logon\x00', &(0x7f0000000280)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f00000002c0)={0x0, "f4c77a0b50a979fb831272a2ba6d799565c5543ae000665cb5d136682e66ab13d3a709f6caa5e45a2b99b35add0a5d21c332a4c6294a13a8c03677c14d8c4134"}, 0x48, 0xffffffffffffffff) 06:41:47 executing program 2: openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x60002, 0x0) [ 1030.224520][T31543] team0: Cannot enslave team device to itself 06:41:47 executing program 3: syz_mount_image$udf(&(0x7f0000000000)='udf\x00', 0x0, 0x0, 0x1, &(0x7f0000001100)=[{0x0, 0x0, 0xe4e3}], 0x0, &(0x7f0000001140)={[], [{@subj_user={'subj_user', 0x3d, '&'}}]}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) 06:41:48 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef4100000", 0x17}], 0x1}, 0x0) 06:41:48 executing program 5: socket$inet(0x2, 0xa, 0x1) 06:41:48 executing program 4: io_setup(0x1f, &(0x7f00000001c0)=0x0) r1 = socket$alg(0x26, 0x5, 0x0) io_submit(r0, 0x1, &(0x7f00000012c0)=[&(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x0, r1, 0x0}]) 06:41:48 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) 06:41:48 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) accept4(r0, 0x0, 0x0, 0x80800) socket$packet(0x11, 0x3, 0x300) [ 1030.447909][T31556] loop3: detected capacity change from 0 to 228 [ 1030.476768][T31558] team0: Cannot enslave team device to itself 06:41:48 executing program 5: syz_mount_image$udf(0x0, 0x0, 0x0, 0x1, &(0x7f0000001100)=[{0x0}], 0x0, 0x0) [ 1030.542302][T31556] loop3: detected capacity change from 0 to 228 06:41:48 executing program 3: add_key$fscrypt_v1(&(0x7f0000000000)='logon\x00', &(0x7f0000000040)={'fscrypt:'}, &(0x7f0000000080)={0x0, "d6c00109133ca7ffbbd1de4c37262a3cce79355e219876427930a0c7713f0beb019156291962d669a4e81f7ba34b0d16cd73ec8fd9dd5526d96b50e50d61f5eb"}, 0x48, 0xfffffffffffffffb) 06:41:48 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a", 0x23}], 0x1}, 0x0) 06:41:48 executing program 2: add_key(&(0x7f0000000140)='dns_resolver\x00', 0x0, &(0x7f00000001c0)="e3a2", 0x2, 0xfffffffffffffffd) 06:41:48 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000080)={'syztnl1\x00', 0x0}) 06:41:48 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000140)='vfat\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x2, &(0x7f00000029c0)=[{0x0, 0x0, 0x100}, {&(0x7f0000000600)="f5b24a70a0c0d369d03bad391a", 0xd, 0x2}], 0x0, &(0x7f0000000780)) 06:41:48 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a", 0x23}], 0x1}, 0x0) [ 1030.752589][T31582] team0: Cannot enslave team device to itself 06:41:48 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="29e104e7d777967df8e31db26da13a77dec627433c725aa3ae3d86938237b18a29f856d4988572c86936f44744109879652117787b58407f"], 0xff86) 06:41:48 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x0, 0x0, 0x9c0}) 06:41:48 executing program 2: socketpair(0xa, 0x0, 0x300000, 0x0) 06:41:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000480)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) r0 = socket$key(0xf, 0x3, 0x2) recvmmsg(r0, &(0x7f0000000680), 0x0, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) write(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) r3 = creat(&(0x7f0000000140)='./bus\x00', 0x0) fcntl$setstatus(r3, 0x4, 0x46000) lseek(r3, 0x4200, 0x0) r4 = creat(&(0x7f0000000200)='./bus\x00', 0x9804872c85e35f6e) io_setup(0x1ff, &(0x7f00000004c0)=0x0) io_submit(r5, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x10000}]) r6 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) sendfile(r3, r6, 0x0, 0x8400fffffffb) [ 1030.937107][T31596] loop0: detected capacity change from 0 to 1 [ 1030.963216][T31602] "struct vt_consize"->v_vlin is ignored. Please report if you need this. 06:41:48 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snd/seq\x00', 0x0) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r0, 0x40505331, &(0x7f0000000040)={{0x0, 0x96}}) [ 1030.985870][T31596] FAT-fs (loop0): bogus number of FAT structure [ 1031.003989][T31598] team0: Cannot enslave team device to itself [ 1031.031126][T31596] FAT-fs (loop0): Can't find a valid FAT filesystem 06:41:48 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a", 0x23}], 0x1}, 0x0) 06:41:48 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f00000011c0)='/dev/vcs#\x00', 0x0, 0x0) lseek(r0, 0x0, 0x0) 06:41:48 executing program 0: openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x400100, 0x0) 06:41:48 executing program 2: nanosleep(&(0x7f0000000300), 0x0) [ 1031.166859][ T36] audit: type=1804 audit(1614753708.825:41): pid=31617 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir412601088/syzkaller.RCPe5o/936/bus" dev="sda1" ino=14512 res=1 errno=0 06:41:49 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001f40)={0xffffffffffffffff}) recvfrom(r0, 0x0, 0x0, 0x40012140, 0x0, 0x0) [ 1031.367901][T31622] team0: Cannot enslave team device to itself 06:41:49 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba", 0x29}], 0x1}, 0x0) 06:41:49 executing program 0: r0 = gettid() process_vm_writev(r0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/117, 0x75}], 0x1, &(0x7f00000006c0)=[{0x0}, {&(0x7f0000000600)=""/164, 0xa4}], 0x2, 0x0) [ 1031.702816][T31631] validate_nla: 6 callbacks suppressed [ 1031.702833][T31631] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1031.702875][T31631] team0: Cannot enslave team device to itself 06:41:49 executing program 3: openat$pfkey(0xffffffffffffff9c, &(0x7f0000001500)='/proc/self/net/pfkey\x00', 0x86200, 0x0) 06:41:49 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba", 0x29}], 0x1}, 0x0) 06:41:49 executing program 2: r0 = socket(0x2, 0x8000a, 0x0) sendmsg$NL80211_CMD_CHANNEL_SWITCH(r0, &(0x7f0000001880)={&(0x7f0000000000), 0xc, &(0x7f0000001840)={0x0}}, 0x0) [ 1031.946470][ T36] audit: type=1804 audit(1614753709.605:42): pid=31635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=ToMToU comm="syz-executor.5" name="/root/syzkaller-testdir412601088/syzkaller.RCPe5o/936/bus" dev="sda1" ino=14512 res=1 errno=0 [ 1032.039383][ T36] audit: type=1804 audit(1614753709.675:43): pid=31635 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.5" name="/root/syzkaller-testdir412601088/syzkaller.RCPe5o/936/bus" dev="sda1" ino=14512 res=1 errno=0 [ 1032.094217][T31641] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1032.120792][T31641] team0: Cannot enslave team device to itself 06:41:49 executing program 5: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x3001, 0x0) write$sequencer(r0, 0x0, 0x8) 06:41:49 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000580)='nl802154\x00', r0) 06:41:49 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="2000000072000902000000000000000007"], 0x20}}, 0x0) 06:41:49 executing program 2: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/input/mice\x00', 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000540)='./file0\x00', &(0x7f0000000580)='fuse\x00', 0x0, &(0x7f0000000680)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x1000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 06:41:49 executing program 3: fanotify_mark(0xffffffffffffffff, 0xc0, 0x0, 0xffffffffffffff9c, 0x0) 06:41:49 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba", 0x29}], 0x1}, 0x0) [ 1032.219645][T31647] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 06:41:50 executing program 4: sched_rr_get_interval(0x0, &(0x7f0000000700)) 06:41:50 executing program 0: syz_open_dev$dri(&(0x7f00000013c0)='/dev/dri/card#\x00', 0x0, 0x80) 06:41:50 executing program 3: getresgid(&(0x7f0000001e40), &(0x7f0000001e80), 0x0) [ 1032.316695][T31655] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1032.377580][T31655] team0: Cannot enslave team device to itself 06:41:50 executing program 2: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={0x0}}, 0x0) 06:41:50 executing program 5: socketpair(0x18, 0x0, 0x5, &(0x7f0000000000)) 06:41:50 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba800000", 0x2c}], 0x1}, 0x0) 06:41:50 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATEPROPBLOB(r0, 0xc01064bd, &(0x7f0000001000)={0x0}) 06:41:50 executing program 3: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) 06:41:50 executing program 0: fchownat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xee01, 0xee01, 0x0) 06:41:50 executing program 2: syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x0, 0x100040) 06:41:50 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001380)='/dev/autofs\x00', 0x0, 0x0) ioctl$DRM_IOCTL_SWITCH_CTX(r0, 0x40086424, 0x0) [ 1032.611254][T31672] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1032.649261][T31672] team0: Cannot enslave team device to itself 06:41:50 executing program 4: r0 = syz_open_dev$dri(&(0x7f0000001f40)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, 0x0) 06:41:50 executing program 3: syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x19ad3709, 0x100040) 06:41:50 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba800000", 0x2c}], 0x1}, 0x0) 06:41:50 executing program 0: socket$l2tp(0x2, 0x2, 0x88) 06:41:50 executing program 2: r0 = syz_open_dev$dri(&(0x7f0000001f40)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_MODE_ATOMIC(r0, 0xc03864bc, &(0x7f0000002080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:41:50 executing program 5: socket$bt_bnep(0x1f, 0x3, 0x4) [ 1032.866765][T31688] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:50 executing program 4: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000740)={&(0x7f0000000680), 0xc, 0x0}, 0x0) [ 1032.925742][T31688] team0: Cannot enslave team device to itself 06:41:50 executing program 3: syz_open_dev$dri(&(0x7f0000001080)='/dev/dri/card#\x00', 0x19ad3709, 0x100040) 06:41:50 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000004700)={0x0, 0x0, &(0x7f00000046c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="704600000d0a010100000000000000000c000000090001"], 0x4670}}, 0x0) 06:41:50 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba800000", 0x2c}], 0x1}, 0x0) 06:41:50 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) sendmsg$L2TP_CMD_TUNNEL_DELETE(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000200)={0x0}}, 0x0) 06:41:50 executing program 5: r0 = socket$l2tp6(0xa, 0x2, 0x73) sendmsg$L2TP_CMD_SESSION_MODIFY(r0, &(0x7f0000000740)={&(0x7f0000000680), 0xc, &(0x7f0000000700)={0x0}}, 0x0) [ 1033.106445][T31701] netlink: 18000 bytes leftover after parsing attributes in process `syz-executor.0'. 06:41:50 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r0, 0x84, 0x2, &(0x7f0000000000)={0x0, 0x4}, 0x8) 06:41:50 executing program 3: fork() r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000001380)='/dev/autofs\x00', 0x0, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x4000, 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000001200)={&(0x7f0000ffd000/0x2000)=nil, 0x2000}, &(0x7f0000001240)=0x10) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 06:41:50 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) dup3(0xffffffffffffffff, r0, 0x80000) dup2(0xffffffffffffffff, r0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000100)="01f59aaffd9ea5146f5c2a") perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ea36376}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000011c0)={r1, r2, r1}, &(0x7f00000001c0)=""/231, 0xe7, 0x0) [ 1033.191533][T31707] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1033.229149][T31707] team0: Cannot enslave team device to itself 06:41:50 executing program 5: syz_open_dev$hiddev(&(0x7f00000000c0)='/dev/usb/hiddev#\x00', 0x0, 0x82000) 06:41:50 executing program 2: openat$vcs(0xffffffffffffff9c, &(0x7f0000000400)='/dev/vcs\x00', 0x2c803, 0x0) 06:41:51 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba80000012", 0x2d}], 0x1}, 0x0) 06:41:51 executing program 4: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000)='/dev/uhid\x00', 0x2, 0x0) write$UHID_DESTROY(r0, &(0x7f0000000040), 0x4) 06:41:51 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000004700)={0x0, 0x0, &(0x7f00000046c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="704600000d0a010100"], 0x4670}, 0x1, 0x0, 0x0, 0x4048000}, 0x0) [ 1033.491016][T31730] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 06:41:51 executing program 3: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_PORT_GET(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f0000001d40)={0x10}, 0x10}}, 0x0) 06:41:51 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={&(0x7f00000001c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe, 0xc, 0x2, [@ptr]}}, &(0x7f0000000280)=""/131, 0x26, 0x83, 0x1}, 0x20) 06:41:51 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCGETS2(r0, 0x80045439, 0x0) [ 1033.556546][T31730] team0: Cannot enslave team device to itself [ 1033.692321][T31735] netlink: 18012 bytes leftover after parsing attributes in process `syz-executor.5'. 06:41:51 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba80000012", 0x2d}], 0x1}, 0x0) 06:41:51 executing program 3: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005400)={0x18, 0x4, &(0x7f0000005200)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}]}, &(0x7f00000052c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:41:51 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x4b49, 0x0) [ 1033.944063][T31742] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1033.992672][T31742] team0: Cannot enslave team device to itself 06:41:51 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) dup3(0xffffffffffffffff, r0, 0x80000) dup2(0xffffffffffffffff, r0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000100)="01f59aaffd9ea5146f5c2a") perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ea36376}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000011c0)={r1, r2, r1}, &(0x7f00000001c0)=""/231, 0xe7, 0x0) 06:41:51 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000640), 0x14) 06:41:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000005400)={0x18, 0x4, &(0x7f00000000c0)=@framed={{}, [@ldst={0x1, 0x0, 0x3}]}, &(0x7f00000052c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:41:51 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000500)={&(0x7f0000000280)={0xa, 0x4e22, 0x0, @dev}, 0x1c, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000380)='z', 0x1}], 0x2}, 0x0) 06:41:51 executing program 4: r0 = socket(0x11, 0x3, 0x0) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000480)={&(0x7f00000000c0), 0xc, &(0x7f0000000440)={0x0}}, 0x0) 06:41:51 executing program 1: bpf$BPF_PROG_DETACH(0x9, &(0x7f00000002c0)={@map}, 0x13a3df4637a1a912) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40086602, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000200)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, 0x80, &(0x7f0000000280)=[{0x0}, {0x0}], 0x2, &(0x7f00000018c0)=""/174, 0xae}, 0x100) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f00000005c0)="2e00000010008188040f80ec59acbc0413a1f84810000000e3bd6efb440e09000e000a001000000002800000121f", 0x2e}], 0x1}, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f0000000000)='threaded\x00', 0x248800) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440009000e000a000d000000ba80000012", 0x2d}], 0x1}, 0x0) 06:41:52 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x17, 0x0, &(0x7f0000000100)) [ 1034.280289][T31760] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 1034.310512][T31760] team0: Cannot enslave team device to itself 06:41:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x54}, [@ldst={0x6, 0x2, 0x6}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 06:41:52 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001100)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000001080)=[@hopopts={{0x18, 0x29, 0x8}}], 0x18}, 0x0) 06:41:52 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) dup3(0xffffffffffffffff, r0, 0x80000) dup2(0xffffffffffffffff, r0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000100)="01f59aaffd9ea5146f5c2a") perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ea36376}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000011c0)={r1, r2, r1}, &(0x7f00000001c0)=""/231, 0xe7, 0x0) 06:41:52 executing program 2: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x3, 0x0, &(0x7f0000000100)) 06:41:52 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r0, &(0x7f0000002c00)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002cc0)=ANY=[], 0x12d0}}], 0x1, 0x0) 06:41:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, &(0x7f0000000000)=@x25={0x9, @remote}, &(0x7f0000000080)=0xfffffe95) 06:41:52 executing program 3: r0 = open(&(0x7f00000000c0)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/crypto\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010044) 06:41:52 executing program 2: r0 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0x0, 0x1) write$cgroup_devices(r0, &(0x7f00000000c0)={'c', ' *:* ', 'rm\x00'}, 0xfffffdef) 06:41:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001100)={&(0x7f0000000000)={0x2, 0x4e20, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000001080)=[@flowinfo={{0x14}}, @hopopts={{0x18}}], 0x30}, 0x0) 06:41:52 executing program 1: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') sendfile(r0, r1, 0x0, 0x800000080004103) 06:41:52 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000001640)={'wg0\x00', 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000ec0)=[{{&(0x7f0000000180)={0x2, 0x4e23, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000580)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r1, @local, @empty}}}], 0x20}}], 0x1, 0x0) 06:41:52 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x1, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0xb00000000065808, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="3c000000130029"], 0x2c}}, 0x0) sendfile(r3, r2, 0x0, 0x100000001) 06:41:52 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001100)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @dev, 0x5}, 0x1c, 0x0, 0x0, &(0x7f0000001080)=[@flowinfo={{0x14}}], 0x18}, 0x0) 06:41:52 executing program 5: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) gettid() r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x58, 0x0, 0x20, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x17}}}}, [@NL80211_ATTR_DURATION={0x8, 0x57, 0x100}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x10001}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x7}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x4}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x70}, @NL80211_ATTR_DURATION={0x8, 0x57, 0x5}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x20044001) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x8918, &(0x7f0000001740)={@mcast1, 0x62}) sendto$packet(0xffffffffffffffff, &(0x7f0000000180)="7617a54dce39704225029d5a3dd7c4f28b73df2a35bb2baeb3445732512f61ad4bf4dad758a3d9b459013d16604bac873d634dc6f70b2725bbc96ad1121c64d7d011688fbb757db32cb0c70184d1c26b36c53f90f910e3625dcdcfe276e3dd1d3f5eea28cd607299497542648d9cdc4202273459e630ee3f864ce32a8fcb63943fa50e942072ae46602fc39b62ca44f99c01edb04566364f499ffb9633e12fcea66df8fb652b96b731635f8ee3b0497080464f502c7f5394e59f1c3ce64d657d4b6958b17965f71486eca89e159e1ae0388c82", 0xd3, 0x4000800, &(0x7f0000000280)={0x11, 0x2, 0x0, 0x1, 0x81, 0x6, @random="a2c68ae8d213"}, 0x14) 06:41:53 executing program 0: r0 = perf_event_open(&(0x7f00000001c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) dup3(0xffffffffffffffff, r0, 0x80000) dup2(0xffffffffffffffff, r0) ioctl$PPPIOCGL2TPSTATS(0xffffffffffffffff, 0x80487436, &(0x7f0000000100)="01f59aaffd9ea5146f5c2a") perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4ea36376}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r1 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) r2 = add_key$user(&(0x7f00000003c0)='user\x00', &(0x7f0000000440)={'syz'}, &(0x7f00000000c0), 0xc9, 0xfffffffffffffffd) keyctl$dh_compute(0x17, &(0x7f00000011c0)={r1, r2, r1}, &(0x7f00000001c0)=""/231, 0xe7, 0x0) 06:41:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001100)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000001080)=[@flowinfo={{0x14, 0x29, 0x5}}], 0x18}, 0x0) [ 1035.320963][ T36] audit: type=1804 audit(1614753712.976:44): pid=31803 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=invalid_pcr cause=open_writers comm="syz-executor.3" name="/root/syzkaller-testdir605339681/syzkaller.pR82Q5/872/cgroup.controllers" dev="sda1" ino=14505 res=1 errno=0 06:41:53 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000000140), 0x4) 06:41:53 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r0, 0x5460, 0x0) [ 1035.377952][T31800] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1035.449435][T31800] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=36168 sclass=netlink_route_socket pid=31800 comm=syz-executor.3 06:41:53 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x5, [@struct={0x2, 0x2, 0x0, 0x4, 0x0, 0x2, [{0x1, 0x1}, {0x4}]}]}, {0x0, [0x5f, 0x61, 0x61]}}, &(0x7f0000000180)=""/173, 0x41, 0xad, 0x1}, 0x20) [ 1035.463036][T31800] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2165 sclass=netlink_route_socket pid=31800 comm=syz-executor.3 [ 1035.497496][T31800] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35660 sclass=netlink_route_socket pid=31800 comm=syz-executor.3 [ 1035.506289][T31800] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=26214 sclass=netlink_route_socket pid=31800 comm=syz-executor.3 [ 1054.102092][ T3252] ieee802154 phy0 wpan0: encryption failed: -22 [ 1054.108431][ T3252] ieee802154 phy1 wpan1: encryption failed: -22 06:42:18 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCGETS2(r0, 0x802c542a, 0x0) 06:42:18 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000000100)) 06:42:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000240)={0xa, 0x4e20, 0x0, @mcast2}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x4a, &(0x7f0000000000)=0x8, 0x4) recvmmsg(r0, &(0x7f0000008880), 0x45b, 0x44000102, 0x0) 06:42:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000002b40)=@updpolicy={0xb8, 0x19, 0x6163, 0x0, 0x0, {{@in6=@mcast2, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) 06:42:18 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x2, 0x0) write$cgroup_devices(r0, &(0x7f00000001c0)={'a', ' *:* ', 'w\x00'}, 0x8) 06:42:18 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x3, [@func={0x1, 0x0, 0x0, 0xc, 0xc00}]}, {0x0, [0x61]}}, &(0x7f0000000100)=""/251, 0x27, 0xfb, 0x1}, 0x20) [ 1060.929086][T31831] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 06:42:18 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000001100)={&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000001080)=[@flowinfo={{0x14}}, @hopopts={{0x18, 0x29, 0x5}}], 0x30}, 0x0) 06:42:18 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DISASSOCIATE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x28, r0, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 06:42:18 executing program 3: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000080)={0x0, 0x0}, 0x8) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000000c0)={r0}, 0x4) 06:42:18 executing program 1: r0 = open(&(0x7f0000000180)='./bus\x00', 0x151042, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000340)='/proc/timer_list\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r2, 0x0) preadv(r2, &(0x7f0000000280), 0x1, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x4000000000010046) 06:42:18 executing program 5: r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000040)=0x1a, 0x4) 06:42:18 executing program 3: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000800)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 06:42:18 executing program 2: r0 = socket(0x11, 0x3, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 06:42:18 executing program 0: socket$rds(0x15, 0x5, 0x0) io_setup(0xb447, &(0x7f0000000140)) 06:42:18 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001700)={'wlan0\x00'}) 06:42:19 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0xb, 0x0, &(0x7f0000000140)) [ 1061.301769][T31849] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1061.381543][T31858] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1061.423233][T31849] syz-executor.4 (31849) used greatest stack depth: 21888 bytes left 06:42:19 executing program 2: socketpair(0x14, 0x0, 0x0, &(0x7f00000000c0)) 06:42:19 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DISASSOCIATE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x28, r0, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 06:42:19 executing program 1: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000005a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:42:19 executing program 5: r0 = socket(0x18, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0xc020660b, 0x0) 06:42:19 executing program 0: r0 = socket$kcm(0x29, 0x5, 0x0) poll(&(0x7f0000002dc0)=[{r0}], 0x1, 0x0) 06:42:19 executing program 2: r0 = socket(0x18, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x89a0, 0x0) [ 1061.637758][T31872] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:42:19 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DISASSOCIATE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x28, r0, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 1061.823804][T31882] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 06:42:19 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f00000025c0)={&(0x7f0000000040)={0xa, 0x4e20, 0x0, @dev}, 0x1c, &(0x7f0000002540)=[{0x0}, {0x0}, {&(0x7f0000000280)='*', 0x1}], 0x3}, 0x0) 06:42:19 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x68, 0x0, 0x0, 0x0, 0x0, {{}, {}, {0x4c, 0x18, {0x0, @media='eth\x00'}}}}, 0x68}}, 0x0) 06:42:19 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000140)=[@exit_looper], 0x2, 0x0, 0x0}) 06:42:19 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) fremovexattr(r0, &(0x7f0000000180)=@random={'security.', '\x00'}) 06:42:19 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f00000007c0)='IPVS\x00', 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_DEST(r0, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000800)={0x28, r1, 0x1, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xb22}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_AF={0x6}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x4000000) 06:42:19 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080)='nl80211\x00', 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DISASSOCIATE(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000200)={0x28, r0, 0x1, 0x0, 0x0, {{0x7e}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) [ 1062.292345][T31895] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1062.329363][T31900] binder: 31897:31900 ioctl c0306201 20000000 returned -14 06:42:20 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000005a40)=[{{&(0x7f0000000000)=@isdn, 0x20000080, 0x0}}], 0x1, 0x0) 06:42:20 executing program 0: r0 = socket(0x18, 0x0, 0x0) connect$netlink(r0, 0x0, 0x0) [ 1062.334869][T31902] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 1062.355844][T31904] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 06:42:20 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x10, 0x0) 06:42:20 executing program 1: sendmsg$TIPC_CMD_GET_NETID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c}, 0x1c}}, 0x0) poll(&(0x7f0000000000), 0x31, 0x0) 06:42:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_RENAME(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x5, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x28}}, 0x0) 06:42:20 executing program 4: fsopen(0x0, 0x0) io_setup(0xb447, &(0x7f0000000140)=0x0) io_submit(r0, 0x0, 0x0) 06:42:20 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000000)='/dev/vcsu#\x00', 0x0, 0x1) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000040)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @private1}, {0xa, 0x0, 0x0, @loopback}}}, 0x48) [ 1062.573253][T31912] binder: 31909:31912 ioctl 10 0 returned -22 06:42:20 executing program 0: r0 = socket(0x25, 0x5, 0x0) connect$nfc_raw(r0, 0x0, 0x0) 06:42:20 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:42:20 executing program 3: r0 = fsopen(&(0x7f0000000000)='xfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000140)='@)*/+,)\\\x00', &(0x7f0000000180)="12", 0x1) 06:42:20 executing program 2: sendmsg$AUDIT_USER_AVC(0xffffffffffffffff, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001500)={&(0x7f00000004c0)={0xb8, 0x453, 0x0, 0x0, 0x0, "3abf0a3f93ea986f391afb9913e2c01d976ef6d9a02a6d7f24e5aa0c0efa04df53be872fa053bad0a7abd5978be4fc6e9b2ec581ebf4a8423320f8b0dd810505cbb66563642d92e95be1fbf411f3b1d0d2e3ff1bd7b7154957d0c97d42a09c1196aaeb5d8acace898dca51f6ee66f1fefa3deef9e51a286db22f44adabea22f2ddd99abe5fad351eeebab3f6d8dffeced11d2eb66385aa9017fc64d33e0154bd3a78a51f9c"}, 0xb8}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 06:42:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) poll(&(0x7f00000002c0)=[{r0, 0x200}], 0x1, 0xfffffffd) 06:42:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="ac02000024000100", @ANYRES32=0x0, @ANYBLOB="01000a000e"], 0x2ac}}, 0x0) 06:42:20 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000005a40)=[{{&(0x7f0000000000)=@isdn={0x2}, 0x80, 0x0}}], 0x1, 0x0) 06:42:20 executing program 1: r0 = socket(0x18, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x8901, 0x0) 06:42:20 executing program 4: fsopen(&(0x7f0000000040)='pipefs\x00', 0x0) 06:42:20 executing program 2: r0 = socket(0x18, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80047453, 0x0) 06:42:20 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@add_del={0x2, &(0x7f0000000040)='bond_slave_1\x00'}) setsockopt$RDS_GET_MR_FOR_DEST(0xffffffffffffffff, 0x114, 0x3, 0x0, 0x0) [ 1062.975283][T31936] netlink: 648 bytes leftover after parsing attributes in process `syz-executor.0'. 06:42:20 executing program 4: r0 = socket(0x18, 0x0, 0x0) connect$pptp(r0, &(0x7f0000000000)={0x18, 0x2, {0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1e) 06:42:20 executing program 1: r0 = socket(0x18, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x8903, 0x0) 06:42:20 executing program 3: r0 = socket(0x18, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x80487436, 0x0) 06:42:20 executing program 0: r0 = openat$mice(0xffffffffffffff9c, &(0x7f0000000000)='/dev/input/mice\x00', 0x20001) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 06:42:20 executing program 2: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x5, 0x0, 0x0) 06:42:20 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000001000)=@get={0x1, &(0x7f0000000000)=""/4096, 0x1}) 06:42:20 executing program 4: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f00000014c0)={&(0x7f0000000100)=@nfc, 0x80, &(0x7f0000001300)=[{&(0x7f0000000080)=""/9, 0x9}, {&(0x7f0000000180)=""/121, 0x79}, {&(0x7f0000000200)=""/211, 0xd3}, {&(0x7f0000000300)=""/4096, 0xfffffe6d}], 0x4, &(0x7f0000001340)=""/159, 0x9f}, 0x2) 06:42:20 executing program 3: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0d6380"], 0x0, 0x0, 0x0}) 06:42:20 executing program 1: r0 = openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x0) read$char_usb(r0, 0x0, 0x0) 06:42:21 executing program 2: fsopen(&(0x7f0000000080)='tmpfs\x00', 0x0) 06:42:21 executing program 0: r0 = socket$phonet(0x23, 0x2, 0x1) bind(r0, 0x0, 0x1e) 06:42:21 executing program 5: r0 = socket(0x18, 0x0, 0x0) getpeername(r0, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000080)=0x80) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, 0x0) [ 1063.415462][T31963] binder: 31958:31963 unknown command 8413965 [ 1063.431879][T31963] binder: 31958:31963 ioctl c0306201 20000000 returned -22 06:42:21 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000001540)={0x0, 0x0, 0x0}, 0x1a143) 06:42:21 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000000680)=[{{&(0x7f0000000000)=@sco={0x1f, @fixed}, 0x0, &(0x7f0000000300)=[{&(0x7f0000000080)="2f912f828855d39e01cb4c0e620954f9c6ede1b894e5a567bb35da02c0417bc9e933889faeb3987c16b43bc573d15eb21ceab79f90602307e75131a378682b1e968d840994"}, {&(0x7f0000000100)="2e1afc92a73ce30569eb487952a7e4fd56d0e25611f20918fe3941920c3d09b93d16d823ff899ae8fa816db2d7099e1b9b6c"}, {&(0x7f0000000140)="a6f4913f5acacb87a722d03b8fe35fbc30791517879e2520cbf7f0fea6b49f7dc8908ebb51a883cd3587606e3f7b565525d726876c736c28b185576fc85404cd85e7678359b313de4807d9f85e6bd589dafcdaef9651e805f2bd2bf3145e0069ccb42d0a5b88624076b018153e984229a21ecece1498b25625b8905d91425c823d43ec5c0a5a39aafc8f25df068d7f22f463"}, {&(0x7f0000000200)="7a2c99873baa963c20ce7e3f444dd27c18e1a7b4c2aeb6d0f22088d91679ce7e5943e27e9174350cc49d1b5b9bae365b31e16cce6555db4b0419b439f3ab92f0780f7869a1c018f401f7a094d445ff080692af7a75e0eb02771d17d1f8c31f43648bfccad90d68de0564f7d4cd3f1a8f83133733ed4446ddb19c3c887c71488393203cf0637cc5387748a505c8d4c5600475b07f452cc8c7de8f72744eca593a2a81f2ed618addf7ca1c84f6395f4762e9d60c72fad8b8cea9c1996dae4f7d15174313a349b299122fc5bdec71cae9198edd055d3d36ee7fcaeaa41b099e97b0d50e36edf638de7d5b2c43e5f0671a2441949142fe617b245c57cd0b"}], 0x0, &(0x7f0000000340)=[@timestamping]}}, {{&(0x7f0000000380)=@tipc, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000400)="14b04b754ecca53942d78b44c1e2167dc370febf8e998c0b547f233dc27300644b08a28c65036400f48d9a32e1c19b7854e13116c605385f929be1f6a7e2133f9447f0c2a4a378365686e929d12f13745b3bd49677812a0468a612ffcd8d28e8f6239296c1cb1e85890b32bf0dd9561d957d9cfdaa1eef827c8d4d049acd36befba69fa0b61acaa61fde34e1b514c1e0ab8d964414173b68"}, {&(0x7f00000004c0)="a948e09feb367385427d72ebf636018951883eafa8fc4d3bdca31e47b334aac5f03f34a344be4e65775ad3b1511b0c78d38d90694616996e29cf2929ddb473060d664bf5e5089e86bf5623e43e30b84ce35f7494a515ed128b60ded8dbb877d64c0a8c257836914c9c59137d67eba9a54d7c8e0cd750a40ddcb8aa4fe27d2f33959efb8d120de94f044d0ebc806e8ae220b7ee0c87a0f69fdfac3381a3454260174bc268503b03980108e68d11760c6a6050ebc491d0097cfc8642bfd4d204bd445ab39be1d9b116209a903564f713390377dc05918ab73b8798b86bb35ace0b3ac69f89d19375689e74c835c17a"}], 0x0, &(0x7f0000000600)=[@mark, @mark, @mark, @txtime]}}], 0x2, 0x0) 06:42:21 executing program 2: r0 = openat$mice(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/input/mice\x00', 0x0) fremovexattr(r0, &(0x7f0000000400)=@known='system.posix_acl_default\x00') 06:42:21 executing program 0: socket$rds(0x15, 0x5, 0x0) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x40e42) 06:42:21 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0xa, 0x0, 0x0) 06:42:21 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000005a40)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, 0x0}}], 0x1, 0x0) 06:42:21 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x14) sendmsg$TIPC_CMD_SET_LINK_PRI(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0}}, 0x0) 06:42:21 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x5, 0x0, 0x300) 06:42:21 executing program 1: io_setup(0xbc6, &(0x7f00000000c0)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100)={[0x40]}, 0x8}) 06:42:21 executing program 5: syz_open_dev$vcsu(0xffffffffffffffff, 0x0, 0x0) 06:42:21 executing program 2: r0 = fsopen(&(0x7f0000000000)='xfs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c) 06:42:21 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000005a40)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, 0x0}}], 0x1, 0x0) 06:42:22 executing program 0: r0 = fsopen(&(0x7f00000009c0)='btrfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000000)='silent\x00', 0x0, 0x0) 06:42:22 executing program 5: r0 = socket(0x18, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x5421, 0x0) 06:42:22 executing program 2: r0 = syz_init_net_socket$nfc_raw(0x27, 0x5, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 06:42:22 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_GET_MAX_PORTS(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x0, 0x0, 0x0, 0x0, {}, ["", ""]}, 0x59}}, 0x0) 06:42:22 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000005a40)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, 0x0}}], 0x1, 0x0) 06:42:22 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r0, 0x114, 0x6, 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) fsopen(&(0x7f00000009c0)='btrfs\x00', 0x0) io_setup(0xb447, &(0x7f0000000140)=0x0) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) io_submit(r2, 0x1, &(0x7f0000000240)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r3, &(0x7f0000000180)="dedeb51edd86d7cf0c1891314bfe86973a9349f428ee4965f20a97eb6105f187c858a79460822723aabfaced5e0a08616558c300f499028cfe179234ebc4fae48ebc491f52c7df3159b2", 0x4a, 0x1, 0x0, 0x1}]) socket$kcm(0x29, 0x2, 0x0) setsockopt$RDS_GET_MR_FOR_DEST(r1, 0x114, 0x7, &(0x7f0000000080)={@rc={0x1f, @none}, {&(0x7f0000000000)=""/9, 0x9}, &(0x7f0000000040), 0x39}, 0xa0) 06:42:22 executing program 4: set_mempolicy(0x0, &(0x7f0000000000)=0x1, 0x9) 06:42:22 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x5452, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000140)=[@exit_looper], 0x0, 0x0, 0x0}) 06:42:22 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x5452, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 06:42:22 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000005a40)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, 0x0}}], 0x1, 0x0) 06:42:22 executing program 2: set_mempolicy(0x0, &(0x7f0000000000), 0x9) 06:42:22 executing program 3: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000005a40)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, 0x0}}], 0x1, 0x0) 06:42:22 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$AUDIT_SIGNAL_INFO(r0, &(0x7f0000000400)={&(0x7f0000000340), 0xc, &(0x7f0000000040)={0x0, 0x8}}, 0x0) 06:42:22 executing program 0: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x541b, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) 06:42:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_crypto(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@get={0xe0, 0x13, 0x1, 0x0, 0x0, {{'essiv(morus1280-sse2,cmac-aes-neon)\x00'}}}, 0xe0}}, 0x0) 06:42:22 executing program 4: socketpair(0x2a, 0x0, 0x0, &(0x7f0000000300)) 06:42:22 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000000)={0x6, 0x0, &(0x7f0000000140)=[@exit_looper], 0x0, 0x0, 0x0}) 06:42:22 executing program 3: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000005a40)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, 0x0}}], 0x1, 0x0) [ 1065.004288][T32035] binder: 32033:32035 ioctl 541b 0 returned -22 [ 1065.058787][T32042] netlink: 192 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1065.078213][T32044] binder: 32039:32044 unknown command 0 [ 1065.091713][T32035] binder: 32033:32035 ioctl 541b 0 returned -22 [ 1065.122619][T32044] binder: 32039:32044 ioctl c0306201 20000000 returned -22 06:42:22 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) connect$pppl2tp(r0, 0x0, 0x0) 06:42:22 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x5, 0x0, 0x0, 0x0, 0x400}, 0x40) 06:42:22 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0x5421, &(0x7f0000000000)={0x4, 0x0, &(0x7f0000000140)=[@exit_looper], 0x0, 0x0, 0x0}) 06:42:22 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff}, 0xc) 06:42:22 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@fwd]}}, &(0x7f00000000c0)=""/148, 0x26, 0x94, 0x1}, 0x20) 06:42:23 executing program 3: sendmmsg$sock(0xffffffffffffffff, &(0x7f0000005a40)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, 0x0}}], 0x1, 0x0) 06:42:23 executing program 4: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$IOCTL_STATUS_ACCEL_DEV(r0, 0x40046103, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "34227e07f7c4b9253a084c18accd0319a56a4c59147f48a5252b41358ed32b53"}) 06:42:23 executing program 2: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$sock(r0, &(0x7f0000002440)=[{{&(0x7f0000000000)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'adiantum(xts-serpent-sse2,camellia)\x00'}, 0x80, 0x0}}], 0x1, 0x0) 06:42:23 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) recvmsg$can_bcm(r0, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x4e6ee282111c63c5) 06:42:23 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000001000)={0x14, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 06:42:23 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000640)='/dev/null\x00', 0x0, 0x0) accept4$packet(r0, 0x0, 0x0, 0x0) 06:42:23 executing program 3: socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000005a40)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, 0x0}}], 0x1, 0x0) 06:42:23 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@in={0x2, 0x4e20, @empty}, 0x80) 06:42:23 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) getpeername(r0, &(0x7f0000000180)=@l2, &(0x7f0000000200)=0xffffffd2) 06:42:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) getsockopt$netlink(r0, 0x10e, 0x4, &(0x7f0000000180)=""/154, &(0x7f00000000c0)=0x9a) 06:42:23 executing program 0: r0 = socket(0x11, 0x3, 0x0) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={0x0}}, 0x0) 06:42:23 executing program 1: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB="30000000acd12b"], 0x30}}, 0x0) sendmsg$AUDIT_SIGNAL_INFO(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 06:42:23 executing program 3: socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000005a40)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, 0x0}}], 0x1, 0x0) 06:42:23 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0xb, 0x0, 0x0) 06:42:23 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='\"', 0x1}], 0x1}, 0x2400c800) 06:42:23 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x14) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00', r0) 06:42:23 executing program 0: fsopen(&(0x7f0000000040)='virtiofs\x00', 0x0) 06:42:23 executing program 2: r0 = socket$kcm(0x29, 0x5, 0x0) fremovexattr(r0, &(0x7f0000000040)=@known='user.incfs.metadata\x00') 06:42:23 executing program 3: socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000005a40)=[{{&(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @multicast1}}, 0x80, 0x0}}], 0x1, 0x0) 06:42:23 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@deltclass={0x30, 0x29, 0x1, 0x0, 0x0, {}, [@tclass_kind_options=@c_qfq={{0x8, 0x1, 'qfq\x00'}, {0x4}}]}, 0x30}}, 0x0) 06:42:23 executing program 5: r0 = fsopen(&(0x7f00000009c0)='btrfs\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000000)='rw\x00', 0x0, 0x0) 06:42:23 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) ioctl$sock_inet_SIOCSIFNETMASK(r0, 0x891c, 0x0) 06:42:23 executing program 0: set_mempolicy(0x2, &(0x7f0000000080)=0x5, 0x9f4) 06:42:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00', 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {}, {0x8}}}, 0x24}}, 0x0) 06:42:23 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) 06:42:23 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [], 0x0, 0xffffffffffffffff, 0x3}, 0x40) 06:42:23 executing program 5: fsopen(&(0x7f0000000000)='nfs\x00', 0x0) 06:42:24 executing program 0: r0 = socket(0x18, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, 0x0, 0x0) 06:42:24 executing program 1: r0 = socket(0x18, 0x0, 0x0) ioctl$PPPIOCGL2TPSTATS(r0, 0x40047459, 0x0) 06:42:24 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) sendmmsg$sock(r0, &(0x7f0000000040)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:42:24 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) 06:42:24 executing program 5: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000280)=@get={0x1, 0x0, 0x8}) 06:42:24 executing program 2: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0189436, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0}) 06:42:24 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) 06:42:24 executing program 4: openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x105001, 0x0) 06:42:24 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc018620c, 0x0) 06:42:24 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, 0x0, 0x0, 0x0) 06:42:24 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100)='nl80211\x00', 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_STATION(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x14, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) 06:42:24 executing program 0: io_setup(0xbc6, &(0x7f00000000c0)) io_setup(0x0, &(0x7f00000000c0)) [ 1066.806568][T32139] binder: 32136:32139 ioctl c018620c 0 returned -14 06:42:24 executing program 2: r0 = syz_open_dev$vivid(&(0x7f0000000000)='/dev/video#\x00', 0x2, 0x2) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000140)={0x0, 0x9, 0x0, "a23ffcb8e2409073511f9978c4b832676c588598ceae189a816645d9ba4d8cf1"}) 06:42:24 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000005a40), 0x0, 0x0) 06:42:24 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f00000000c0)=0x7, 0x4) 06:42:24 executing program 1: syz_open_dev$audion(&(0x7f0000000800)='/dev/audio#\x00', 0x1, 0x101401) 06:42:24 executing program 5: r0 = syz_open_dev$binderN(&(0x7f0000000000)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000012c0)={0x4c, 0x0, &(0x7f00000001c0)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x0, 0x0, 0x0}) 06:42:24 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000005a40), 0x0, 0x0) 06:42:24 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@in={0x2, 0x0, @empty}, 0x80) 06:42:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="ac020000240001002dbd7000fddbdf2500000000", @ANYBLOB="01"], 0x2ac}}, 0x0) 06:42:24 executing program 0: getresgid(&(0x7f0000002180), &(0x7f00000021c0), 0x0) 06:42:24 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) recvfrom$ax25(r0, 0x0, 0x0, 0x22, 0x0, 0x0) 06:42:24 executing program 5: syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3f, 0x6081) 06:42:24 executing program 4: add_key(&(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000140)='logon\x00', &(0x7f0000000180)={'fscrypt:', @desc4='85baa174f0cb1142'}, &(0x7f00000001c0)={0x0, "09f9555c4f77e82f32dad15bb0992b7cafb38d70b35de6fedcaab4b01829124025b685d3dce96369887c8b634f47ca151f406f40b35569af6462a0f58e84a7e7"}, 0x48, 0xfffffffffffffffd) [ 1067.215689][T32162] netlink: 648 bytes leftover after parsing attributes in process `syz-executor.2'. 06:42:24 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000180)={'ip6gre0\x00', 0x0}) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x29, 0x3, 0x5, 0x3, 0x48, @private0={0xfc, 0x0, [], 0x1}, @loopback, 0x8, 0x7800, 0xfffffef5, 0x81}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000080)={'ip6gre0\x00', &(0x7f0000000000)={'syztnl1\x00', 0x0, 0x4, 0x1f, 0x2, 0x9, 0x1, @empty, @private1, 0x8000, 0x8000, 0x8, 0xaad0}}) 06:42:24 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000005a40), 0x0, 0x0) 06:42:25 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f0000000180)=@ethtool_rxnfc={0x2a, 0x0, 0x0, {0x0, @hdata="e7cc0fc7bb048a8a2cce6fcb0c9e0661db1a13abe56cd6594fd9af7ad28ded01a5a51a4a77456181faaac20369e0113acbb09a1e", {0x0, @broadcast}, @udp_ip6_spec={@loopback, @remote}, {0x0, @dev}}}}) 06:42:25 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000001140)={0x0, 0x0, &(0x7f0000001100)={&(0x7f0000001080)={0x1c, 0x6, 0x6, 0x401, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}}, 0x0) 06:42:25 executing program 5: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSETLED(r0, 0x4b32, 0x1f) 06:42:25 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000005a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:42:25 executing program 2: socketpair(0x0, 0x80408, 0x0, 0x0) 06:42:25 executing program 0: openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) 06:42:25 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000440)={'ip6gre0\x00', &(0x7f00000003c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @empty, 0x0, 0x0, 0x3}}) 06:42:25 executing program 1: r0 = syz_init_net_socket$ax25(0x3, 0x2, 0x0) setsockopt$ax25_int(r0, 0x101, 0x3, &(0x7f0000000000)=0x3, 0x4) 06:42:25 executing program 5: r0 = syz_open_dev$vim2m(&(0x7f00000001c0)='/dev/video#\x00', 0x7, 0x2) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000cc0)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "e4232a53"}, 0x0, 0x0, @fd}) 06:42:25 executing program 2: read$rfkill(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x105000) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) 06:42:25 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000005a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:42:25 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$SO_TIMESTAMP(r0, 0x1, 0x23, 0x0, &(0x7f0000000040)) 06:42:25 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000002900)='l2tp\x00', 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_CREATE(r0, &(0x7f00000029c0)={0x0, 0x0, &(0x7f0000002980)={&(0x7f0000002940)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="01000009fdffffffffff04"], 0x30}}, 0x0) [ 1068.299285][T32211] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 06:42:26 executing program 3: r0 = socket$rds(0x15, 0x5, 0x0) sendmmsg$sock(r0, &(0x7f0000005a40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) 06:42:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x2, 0x2) sendto$inet(r0, &(0x7f0000000080)="c36db7f03b9660598fb421d802be769d4005ced7f2e936967ba38341534ecc3edd63a7a9c623ae7c6d1fc52d25a0bc916219d0c0b54be9c4188bfa99a7ab0890a460bbb5802a4fd40f8c9639c2d15c5a1a715c1dfd22f2b0966e3d713e8e2484fcbfdc4fc0bbe43b662b29d8c70898e32c5ebc8be9a4b8415a2011b41d5fe9b46630aae57c7aa1351e3b1b60979e348a3085864fe8a233877e5d869dca6095d92104497461a1307671ca1aca8d73d1c68256c98cf1e094fe6ae6a7fbbce0", 0xbe, 0x20004000, &(0x7f0000000000)={0x2, 0x4e24, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x1, 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000040)={@multicast2, @local}, 0xc) perf_event_open(&(0x7f0000000100)={0x3, 0x70, 0xff, 0x0, 0x0, 0xfc, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$loop(&(0x7f0000000380)='/dev/loop#\x00', 0x0, 0x0) munmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000200)={'vcan0\x00', &(0x7f00000005c0)=ANY=[@ANYBLOB="2f00000000000000000005000000000000000000ff0768c8efd2769ee2d64346c67466cd18df1c999e8bfb22046191da012c1d0bdfc2c457c60d3925ea9ad0340055694dccfc7235f4a4000000005588413d9b72470c0d980f4e4f1bc76deda885468a92ec992876314ebe1cb3fc8e521fdda2943d5ec9e1000000000000000000000000000055dd965ce78343e114c18d79579e50fc9e49cb9db1f1a76bddeaf11bcd8df6c31cfcbcf6d39470e8c1c16129d6d3097909633f36650a04b9977c436e526735786ced6e032d575a9700"/221]}) ioctl$BTRFS_IOC_QGROUP_CREATE(r3, 0x4010942a, &(0x7f00000000c0)={0x1, 0x40}) sysinfo(&(0x7f00000007c0)=""/142) ioctl$BLKPG(r2, 0x1269, &(0x7f0000000240)={0x1, 0x0, 0x0, &(0x7f0000000800)}) shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) 06:42:26 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000001540)=[{0x0, 0x0, 0xfffffffffffff801}, {&(0x7f0000000540)="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", 0x1ec, 0x1}]) [ 1068.354978][T32214] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.4'. 06:42:26 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000001c0)={0x20, 0x2, 0x2, 0x101, 0x0, 0x0, {}, [@CTA_EXPECT_FN={0x8, 0xb, 'sip\x00'}, @CTA_EXPECT_TUPLE={0x4}]}, 0x20}}, 0x0) 06:42:26 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000080)={0x26, 'aead\x00', 0x0, 0x0, 'ccm_base(lrw(cast6),sha384-ssse3)\x00'}, 0x58) 06:42:26 executing program 4: pselect6(0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), &(0x7f00000001c0)={&(0x7f0000000180)={[0x8]}, 0x8}) 06:42:26 executing program 3: r0 = getpgid(0x0) process_vm_readv(r0, &(0x7f00000001c0)=[{&(0x7f0000003580)=""/102400, 0x19000}], 0x1, &(0x7f0000003540)=[{0x0, 0x4f}, {&(0x7f0000000380)=""/4081, 0xfffffee6}, {0x0}], 0x3, 0x0) 06:42:26 executing program 2: r0 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x1, 0x2) r1 = memfd_create(&(0x7f0000000140)='\\vnet0?\'`/{,vi.et1eb0u_er\x00', 0x0) ftruncate(r1, 0x1000000) sendfile(r0, r1, &(0x7f00000000c0)=0xf18001, 0xeefffdef) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, 0x0, 0x0) [ 1068.548907][T32225] loop0: detected capacity change from 0 to 16376 06:42:26 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x24, &(0x7f0000000200), 0x4) [ 1068.702614][T32217] ================================================================== [ 1068.711462][T32217] BUG: KASAN: use-after-free in disk_part_iter_next+0x49d/0x530 [ 1068.719189][T32217] Read of size 8 at addr ffff888037d4b328 by task syz-executor.5/32217 [ 1068.727448][T32217] [ 1068.729785][T32217] CPU: 0 PID: 32217 Comm: syz-executor.5 Not tainted 5.12.0-rc1-syzkaller #0 [ 1068.738555][T32217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1068.748618][T32217] Call Trace: [ 1068.751908][T32217] dump_stack+0xfa/0x151 [ 1068.756194][T32217] ? disk_part_iter_next+0x49d/0x530 [ 1068.761500][T32217] print_address_description.constprop.0.cold+0x5b/0x2c6 [ 1068.768581][T32217] ? disk_part_iter_next+0x49d/0x530 [ 1068.773882][T32217] ? disk_part_iter_next+0x49d/0x530 [ 1068.779185][T32217] kasan_report.cold+0x7c/0xd8 [ 1068.783971][T32217] ? disk_part_iter_next+0x49d/0x530 [ 1068.789276][T32217] disk_part_iter_next+0x49d/0x530 [ 1068.794408][T32217] ? disk_part_iter_init+0xe0/0xe0 [ 1068.799536][T32217] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1068.805849][T32217] ? filemap_check_errors+0xa5/0x150 [ 1068.811165][T32217] ? filemap_write_and_wait_range+0x14d/0x1c0 [ 1068.817264][T32217] blk_drop_partitions+0x10a/0x180 [ 1068.822485][T32217] ? bdev_resize_partition+0x220/0x220 [ 1068.827973][T32217] ? lock_is_held_type+0xd5/0x130 [ 1068.833037][T32217] bdev_disk_changed+0x238/0x430 [ 1068.838914][T32217] __loop_clr_fd+0x7c7/0xff0 [ 1068.843574][T32217] lo_release+0x1ac/0x1f0 [ 1068.847920][T32217] ? __loop_clr_fd+0xff0/0xff0 [ 1068.852702][T32217] __blkdev_put+0x54e/0x800 [ 1068.857233][T32217] ? __mutex_unlock_slowpath+0xe2/0x610 [ 1068.862805][T32217] ? freeze_bdev+0x250/0x250 [ 1068.867417][T32217] ? wait_for_completion_io+0x270/0x270 [ 1068.872990][T32217] ? _raw_spin_unlock+0x24/0x40 [ 1068.877868][T32217] ? locks_remove_file+0x312/0x560 [ 1068.883053][T32217] blkdev_put+0x92/0x580 [ 1068.887315][T32217] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1068.893586][T32217] blkdev_close+0x8c/0xb0 [ 1068.898048][T32217] __fput+0x288/0x920 [ 1068.902105][T32217] ? blkdev_put+0x580/0x580 [ 1068.906634][T32217] task_work_run+0xdd/0x1a0 [ 1068.911200][T32217] exit_to_user_mode_prepare+0x249/0x250 [ 1068.916899][T32217] syscall_exit_to_user_mode+0x19/0x50 [ 1068.922379][T32217] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1068.928290][T32217] RIP: 0033:0x41920b [ 1068.932197][T32217] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 1068.951819][T32217] RSP: 002b:00007ffd900b7360 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1068.960384][T32217] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 000000000041920b [ 1068.968366][T32217] RDX: 0000000000000000 RSI: 0000000008d47a56 RDI: 0000000000000005 [ 1068.976349][T32217] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b32725f24 [ 1068.984418][T32217] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000056c9e0 [ 1068.992401][T32217] R13: 000000000056c9e0 R14: 000000000056bf60 R15: 0000000000104e23 [ 1069.000407][T32217] 06:42:26 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TYPE(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000680)={0x24, 0xd, 0x6, 0x801, 0x0, 0x0, {}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x24}}, 0x0) [ 1069.002735][T32217] Allocated by task 32230: [ 1069.007158][T32217] kasan_save_stack+0x1b/0x40 [ 1069.011901][T32217] __kasan_slab_alloc+0x73/0x90 [ 1069.016765][T32217] kmem_cache_alloc+0x1c3/0x4f0 [ 1069.021729][T32217] bdev_alloc_inode+0x18/0x80 [ 1069.026423][T32217] alloc_inode+0x61/0x230 [ 1069.030818][T32217] new_inode+0x27/0x2f0 [ 1069.034991][T32217] bdev_alloc+0x20/0x2f0 [ 1069.039263][T32217] add_partition+0x1ab/0x8a0 [ 1069.043872][T32217] bdev_add_partition+0xb6/0x130 [ 1069.048826][T32217] blkpg_do_ioctl+0x2d0/0x340 06:42:26 executing program 2: r0 = socket(0x11, 0x800000003, 0x8) bind(r0, &(0x7f0000000280)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x58) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000040)=0x76, 0x4) bind$inet(r1, &(0x7f0000000280)={0x2, 0x4e23, @broadcast}, 0x10) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000480)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xeb}]}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000700)="266da1c93cf3746c9262636ebefccb", 0xf, 0x20000000, &(0x7f00000003c0)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000000)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000000080)=0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000007c0)='bbr\x00', 0x4) r2 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r1, &(0x7f00000012c0)="0c268a927f1f6588b967481241ba7860ac5cf65ac618ded8974895abeaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95425a3a07e758044ab4ea6f7ae55d88fecf90b1a7511bf746bec66ba", 0xfe6a, 0x20c49a, 0x0, 0x27) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000300)=ANY=[@ANYBLOB="08000000c403b8ff13f148991fe24c1c4a5bf7f8993480ca27e0403f78046e16b26c27dd1910c3c0008f29f8a334e4d5439a52d42aa9167355", @ANYRESOCT], &(0x7f000095dffc)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, &(0x7f0000000500)=ANY=[@ANYRES32, @ANYBLOB="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"], &(0x7f0000000400)=0xfa) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000380)='\'l\x00') [ 1069.053517][T32217] blkdev_ioctl+0x577/0x6d0 [ 1069.058032][T32217] block_ioctl+0xf9/0x140 [ 1069.062375][T32217] __x64_sys_ioctl+0x193/0x200 [ 1069.067151][T32217] do_syscall_64+0x2d/0x70 [ 1069.071590][T32217] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1069.077570][T32217] [ 1069.079898][T32217] Freed by task 12: [ 1069.083707][T32217] kasan_save_stack+0x1b/0x40 [ 1069.088404][T32217] kasan_set_track+0x1c/0x30 [ 1069.093008][T32217] kasan_set_free_info+0x20/0x30 [ 1069.097962][T32217] __kasan_slab_free+0xc7/0x100 06:42:26 executing program 3: syz_mount_image$nilfs2(&(0x7f00000006c0)='nilfs2\x00', &(0x7f0000002200)='./file0\x00', 0x0, 0x1, &(0x7f0000002700)=[{&(0x7f0000002240), 0x0, 0xfffffffffffffffe}], 0xc1, &(0x7f0000002780)={[{@barrier='barrier'}], [{@uid_eq={'uid'}}]}) [ 1069.102826][T32217] kmem_cache_free+0x6f/0x1d0 [ 1069.107522][T32217] i_callback+0x3f/0x70 [ 1069.111692][T32217] rcu_core+0x722/0x1280 [ 1069.115998][T32217] __do_softirq+0x29b/0x9f6 [ 1069.120523][T32217] [ 1069.122850][T32217] Last potentially related work creation: [ 1069.128566][T32217] kasan_save_stack+0x1b/0x40 [ 1069.133255][T32217] kasan_record_aux_stack+0xa4/0xd0 [ 1069.138462][T32217] call_rcu+0xb1/0x700 [ 1069.142706][T32217] destroy_inode+0x129/0x1b0 [ 1069.147336][T32217] iput.part.0+0x57e/0x810 [ 1069.151779][T32217] iput+0x58/0x70 [ 1069.155528][T32217] disk_part_iter_next+0x9a/0x530 [ 1069.160555][T32217] blk_drop_partitions+0x10a/0x180 [ 1069.165672][T32217] bdev_disk_changed+0x238/0x430 [ 1069.170601][T32217] loop_reread_partitions+0x29/0x50 [ 1069.175865][T32217] loop_set_status+0x704/0x1050 [ 1069.180714][T32217] lo_ioctl+0x4ca/0x1620 [ 1069.185038][T32217] blkdev_ioctl+0x2a1/0x6d0 [ 1069.189529][T32217] block_ioctl+0xf9/0x140 [ 1069.193844][T32217] __x64_sys_ioctl+0x193/0x200 [ 1069.198597][T32217] do_syscall_64+0x2d/0x70 [ 1069.203012][T32217] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1069.208932][T32217] [ 1069.211279][T32217] The buggy address belongs to the object at ffff888037d4b300 [ 1069.211279][T32217] which belongs to the cache bdev_cache of size 2792 [ 1069.225334][T32217] The buggy address is located 40 bytes inside of [ 1069.225334][T32217] 2792-byte region [ffff888037d4b300, ffff888037d4bde8) [ 1069.238600][T32217] The buggy address belongs to the page: [ 1069.244211][T32217] page:000000002d049855 refcount:1 mapcount:0 mapping:0000000000000000 index:0xffff888037d4bfff pfn:0x37d4b [ 1069.256099][T32217] flags: 0xfff00000000200(slab) [ 1069.260978][T32217] raw: 00fff00000000200 ffffea0001e77d08 ffff88801135f250 ffff888010a9c800 [ 1069.269560][T32217] raw: ffff888037d4bfff ffff888037d4b300 0000000100000001 0000000000000000 [ 1069.278145][T32217] page dumped because: kasan: bad access detected [ 1069.284544][T32217] [ 1069.286870][T32217] Memory state around the buggy address: [ 1069.292504][T32217] ffff888037d4b200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc 06:42:27 executing program 1: r0 = socket$l2tp6(0xa, 0x2, 0x73) ioctl$sock_ifreq(r0, 0x8936, &(0x7f0000000040)={'bond_slave_0\x00', @ifru_ivalue}) [ 1069.300565][T32217] ffff888037d4b280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1069.308638][T32217] >ffff888037d4b300: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1069.316679][T32217] ^ [ 1069.322042][T32217] ffff888037d4b380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1069.330118][T32217] ffff888037d4b400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1069.338160][T32217] ================================================================== [ 1069.346202][T32217] Disabling lock debugging due to kernel taint [ 1069.381315][T32217] Kernel panic - not syncing: panic_on_warn set ... [ 1069.387916][T32217] CPU: 1 PID: 32217 Comm: syz-executor.5 Tainted: G B 5.12.0-rc1-syzkaller #0 [ 1069.398072][T32217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1069.408132][T32217] Call Trace: [ 1069.411411][T32217] dump_stack+0xfa/0x151 [ 1069.415666][T32217] panic+0x306/0x73d [ 1069.419597][T32217] ? __warn_printk+0xf3/0xf3 [ 1069.424197][T32217] ? preempt_schedule_common+0x59/0xc0 [ 1069.429696][T32217] ? disk_part_iter_next+0x49d/0x530 [ 1069.431321][T32259] loop3: detected capacity change from 0 to 16383 [ 1069.434987][T32217] ? preempt_schedule_thunk+0x16/0x18 [ 1069.443912][T32259] NILFS (loop3): couldn't find nilfs on the device [ 1069.446789][T32217] ? trace_hardirqs_on+0x38/0x1c0 [ 1069.458270][T32217] ? trace_hardirqs_on+0x51/0x1c0 [ 1069.463287][T32217] ? disk_part_iter_next+0x49d/0x530 [ 1069.468561][T32217] ? disk_part_iter_next+0x49d/0x530 [ 1069.473888][T32217] end_report.cold+0x5a/0x5a [ 1069.478463][T32217] kasan_report.cold+0x6a/0xd8 [ 1069.483222][T32217] ? disk_part_iter_next+0x49d/0x530 [ 1069.488536][T32217] disk_part_iter_next+0x49d/0x530 [ 1069.493651][T32217] ? disk_part_iter_init+0xe0/0xe0 [ 1069.498765][T32217] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 1069.505013][T32217] ? filemap_check_errors+0xa5/0x150 [ 1069.510341][T32217] ? filemap_write_and_wait_range+0x14d/0x1c0 [ 1069.516404][T32217] blk_drop_partitions+0x10a/0x180 [ 1069.521501][T32217] ? bdev_resize_partition+0x220/0x220 [ 1069.526944][T32217] ? lock_is_held_type+0xd5/0x130 [ 1069.531957][T32217] bdev_disk_changed+0x238/0x430 [ 1069.536880][T32217] __loop_clr_fd+0x7c7/0xff0 [ 1069.541453][T32217] lo_release+0x1ac/0x1f0 [ 1069.545762][T32217] ? __loop_clr_fd+0xff0/0xff0 [ 1069.550513][T32217] __blkdev_put+0x54e/0x800 [ 1069.555103][T32217] ? __mutex_unlock_slowpath+0xe2/0x610 [ 1069.560634][T32217] ? freeze_bdev+0x250/0x250 [ 1069.565220][T32217] ? wait_for_completion_io+0x270/0x270 [ 1069.570749][T32217] ? _raw_spin_unlock+0x24/0x40 [ 1069.575581][T32217] ? locks_remove_file+0x312/0x560 [ 1069.580676][T32217] blkdev_put+0x92/0x580 [ 1069.584907][T32217] ? __sanitizer_cov_trace_const_cmp2+0x22/0x80 [ 1069.591135][T32217] blkdev_close+0x8c/0xb0 [ 1069.595467][T32217] __fput+0x288/0x920 [ 1069.599434][T32217] ? blkdev_put+0x580/0x580 [ 1069.603920][T32217] task_work_run+0xdd/0x1a0 [ 1069.608407][T32217] exit_to_user_mode_prepare+0x249/0x250 [ 1069.614023][T32217] syscall_exit_to_user_mode+0x19/0x50 [ 1069.619483][T32217] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1069.625365][T32217] RIP: 0033:0x41920b [ 1069.629241][T32217] Code: 0f 05 48 3d 00 f0 ff ff 77 45 c3 0f 1f 40 00 48 83 ec 18 89 7c 24 0c e8 63 fc ff ff 8b 7c 24 0c 41 89 c0 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 35 44 89 c7 89 44 24 0c e8 a1 fc ff ff 8b 44 [ 1069.648840][T32217] RSP: 002b:00007ffd900b7360 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 1069.657254][T32217] RAX: 0000000000000000 RBX: 0000000000000006 RCX: 000000000041920b [ 1069.665213][T32217] RDX: 0000000000000000 RSI: 0000000008d47a56 RDI: 0000000000000005 [ 1069.673170][T32217] RBP: 0000000000000001 R08: 0000000000000000 R09: 0000001b32725f24 [ 1069.681174][T32217] R10: 0000000000000000 R11: 0000000000000293 R12: 000000000056c9e0 [ 1069.689399][T32217] R13: 000000000056c9e0 R14: 000000000056bf60 R15: 0000000000104e23 [ 1069.697908][T32217] Kernel Offset: disabled [ 1069.702219][T32217] Rebooting in 86400 seconds..