tdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x8}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:25 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="380001002400010061", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0x80ffffff00000000, {}, {}, @quote}], 0xff33) 21:30:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) r2 = syz_open_dev$admmidi(&(0x7f0000000100)='/dev/admmidi#\x00', 0x40, 0x0) write$USERIO_CMD_SEND_INTERRUPT(r2, &(0x7f0000000180)={0x2, 0x814}, 0x2) recvmmsg(r1, &(0x7f0000000100), 0x0, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x7fff, 0x58) ioctl$BLKRRPART(r1, 0x125f, 0x0) getpeername(r1, &(0x7f0000000000)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000080)=0x80) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:25 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000", @ANYRES32], 0x19}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:25 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = getgid() getresgid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f0000000100)) r4 = getgid() r5 = getgid() r6 = getgid() fsetxattr$system_posix_acl(r0, &(0x7f0000000000)='system.posix_acl_default\x00', &(0x7f0000000200)={{}, {0x1, 0x1}, [], {0x4, 0x5}, [{0x8, 0x3, r2}, {0x8, 0x5, r3}, {0x8, 0x1, r4}, {0x8, 0x2, r5}, {0x8, 0x1, r6}], {0x10, 0x2}, {0x20, 0x2}}, 0x4c, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:25 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0}, &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x1e}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r4, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:25 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x8}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:25 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0x8100000000000000, {}, {}, @quote}], 0xff33) 21:30:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0}, &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x1e}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r4, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:26 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="380001002400010061", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x8}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x6, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:26 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0x81ffffff00000000, {}, {}, @quote}], 0xff33) 21:30:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x8}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0}, &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x1e}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r4, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:26 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000", @ANYRES32], 0x19}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x40000000084, 0x4) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x5, @rand_addr="5d8b69011cb74bbf91466fb1f5f1ca29", 0x3}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:26 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0x92ffffff00000000, {}, {}, @quote}], 0xff33) 21:30:26 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="380001002400010061", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x8}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:26 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0}, &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x1e}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r4, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:26 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x101, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000080)={0x10001, 0x3, 0x81}) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20, 0x3, @rand_addr, 0x9}, 0x1c) write$USERIO_CMD_REGISTER(r0, &(0x7f0000000000)={0x0, 0x4}, 0x2) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:26 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x8}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0}, &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x1e}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r4, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:27 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB, @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0x93ffffff00000000, {}, {}, @quote}], 0xff33) 21:30:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) rseq(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x5}, 0x20, 0x0, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:27 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:27 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x8}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) listen(r1, 0x8) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:27 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0x9400000000000000, {}, {}, @quote}], 0xff33) 21:30:27 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:27 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:27 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000240)='setgroups\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xb05202252fa60c08}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x24, r1, 0x4, 0x70bd2d, 0x25dfdbfb, {{}, 0x0, 0x8001, 0x0, {0xfffffffffffffe4c}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x4) r3 = socket$inet6(0xa, 0x2, 0x0) ftruncate(r3, 0x100000001) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r3, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r3, 0x0, 0x0, 0x44080, &(0x7f0000000200)={0xa, 0x4e20, 0x7ff, @mcast1}, 0xffffffffffffffc9) 21:30:27 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB, @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:27 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:28 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB, @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2653.103069] net_ratelimit: 22 callbacks suppressed [ 2653.103106] protocol 88fb is buggy, dev hsr_slave_0 [ 2653.103114] protocol 88fb is buggy, dev hsr_slave_0 [ 2653.110233] protocol 88fb is buggy, dev hsr_slave_1 [ 2653.114941] protocol 88fb is buggy, dev hsr_slave_1 21:30:28 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0x94ffffff00000000, {}, {}, @quote}], 0xff33) 21:30:28 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:28 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB, @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:28 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:28 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB, @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:28 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB, @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:28 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$adsp(&(0x7f00000003c0)='/dev/adsp#\x00', 0x400, 0x800) sendto$rxrpc(r2, &(0x7f0000000400)="372633adc7de9d14795e270d7e05d1ec6714f04b2d3eea1bfb4a7bbab6e1b39c2e2a7a394cdf01950bfc4e636693282e4eafcdf79debabd0aa0bcc04a3ef82dc57646971d19a52b1bdd9e2ebeef1a79af7beb798c801d1f65359b3cd78d4103a87be104e203e0e308b6bcab44e983fa0141e7a5a2aa34a88a21945549e32f546c69d6344ea6973469e1a41db494fccbccf43be23b4c757ac7b8f8d20af9037b5804082cd88408cda9bcd72268e346f100f9785be861db04a8dcfbfb5030fa8e4577a26ec6e24646e43fecd6c01f2f73082a4517242c79aba6424994ab1aa17406035ba01f78a13d2cfbe3088961650e222dd1b2a2bbf3de790a2371256e2837af39dd731f760a591bc76f670fa88838e0153d006f2188066e4f0f3c2d5241f240ebded9b1ebc0767e7429c80c3cdae03202edbac4519a3d830c92fa7a7807aa4b7648513ee8802ceef6ba40f730c986705a7a0df0dca5b66193911780ce467f16255f88ebf1f9b0dc492da161ac99d79ad9ec3adf68bc35378035e7e77a1fd9d26f0089bb6bdc063e170b194e790e41c16a0636100854454bd809c38a91e52d15fe4e34f220a287feaf874545db7f39bba954c3b0c67e1a1290d6fa5f5fb7bbb85c73148558fc0c87da788744e328e5e66d1311ab791ca54e89d5af5f2ec9cc8fd6e760ee4118eb34afb4cdd918d713e3d2ead1ddf70e58df7159a0e13c0b796a6659a99267fe9e7ba69a9ffe23428bc02839b827b4847511efb28d1eed97864e3271c32733247f3edb5ed934557a31d10ebd6ea2b8dd43362396bc778b31f819daccb883becd3ef2f596820279e1badd33ca73481de222b7f1c5358c5da62d08d395467beabdfd5c541468f7dddd0cf0653a025cca93b96573f4c91f8cd65cba428d8108df820cf50c666c411a0d04b4df3e8a687628e6b6fae755583696d3b80801235fb5337012e9f6c8a2950b84a8f177dab50f4017cd89ec6ec286df17a59cae46c7a1b986c0df3c1be3d349c8fdaff225beb9f1762e1c2fb27a6447954fbca151c832bd7696f2a78a344bea86c0cbc922ad53bbe0942d71cfb6dc943f17fbffb365e6c4b805b6a3c294383d1c72e2b2421b6d6ca76b6791ead0e8a198036296f09a6e0b68a4fec672ac3e509fb0834995efa0decac1786009e3d5d970352caeccd753e60a3f292c101dec895415fb9d7f74878d46491666bbe03aa180f4aab6d9f952670dea1758d4ee0496863245e3f47803f11c3c5b8031cb39c02df8cf4eebfe1d31122d9f4bf0f5ea6d185fa80d51d2931d05098806e0e458c4487afd307d62e89307ed713bee8621cd172e2216020ff57b9513b3f17786f91421b9f87a53ccbec02c50eb3b4e0b6c5e79e191c78daf73d6f11706b72395f3ad2c280e29ad818ac02f8d39356e3b78a6090f55f2b15a2c77f94e90b6322c297900850ef0cb535febaa902b72b79b26164fd87cbfb089e3f0d758dca0f3124be3e568e607479b0769f471e3fee6ddf9de87f516843279a71359f27a9e25a1660ae07697f437e7088c036a86464922cae9cd43100e8cc3e5acb58b98da1d5c2955e3ca7f952fd76315f8ece3b664df32c661b92e52de9e7dc778edaca467b2758ad4c8b4090b379c733fe78b24b497456ba13ca62de194db607745c44bc38c37e286e31c508100afd20ffa901a095ac603918c4570888b450b4b09a2b6b83c3c4ed5fab37891fcbde2c7f9282ce95564060486e40ac72e606835a045b44adae1b918bc7f12c06d3180cbfd8d73084d930861fb66888213ba71772a748e8da4c24c6e11008942668d9c9ae3455968c737ae11f1fcd9a5da9367a9347c9a454e6a3dbbdc76b38752336ab1b694f894d66c14e1856b0bb5f18c8d880091a6695b259f2e3496684c75372daa4caa04d2619bfccbac3fbaa18b92e92030ec460d25c6fa01b942d3646388ada27c2f6b6e458945c8d68cb1b09d440a71508ede874d80dac9d4502eed3ca9e67c77b42f40a613053b680259f8ac066744a85795188a70c590cdeb7305358ad5af9061e469a0058bf872709bc5089de62b26615c0a340c57083c332f69daf252f562528794ccc2b2811bdeb7e095edda2f137969f81315820ec3c5cff8e45f8285c4fc46ba2537fa18b0b9d0f5637a369a53f46e575101eb736f2bd3eb7aa6c25ef8665304af71d97a9037128947d222a04ed4bcd061db59681a7c40a6649acfc8946fca95a1acd42f5da404630b392471c86db89e8873983cefbf189d40c1bc1ab1460fd1e1f12e9e742757c268ed307c4b02dc20fbea9c71ca9cfb0df1674d894bb3a3d1333c06c27e78f35d58546ff68f1d228dba397eaeaeddc45cc807387c655f65bc812c08cfd06892a8945ff3e8e705d9c0b6b0f37bd36c3a31013819d1cafe90b7d3743e18b0dc6836ead24051486a8f3092f5f9467817a073382e96d30edcc63b3d0a6e10369f01bde7a26b40a206ca3a0a47a77b3524d9ef8d191db1aa482e013d8ec6bea4e1b764c444d6c85a10bfc2e217ceed35014ae1a5358a213a6e0dc92d64a367b8dfb46f3085f1cc01af1e8f30fe47d42e08c90f473aaa1bc86bce023467efe04c15436f16ccc0601e48aa95876ab590ae707461948c0521ff3b65f62180d593a368412c47c238e68f4fc3b4942e6f3faefd79be50057813b1947ba358aa0c9e6ea442c5a1691071f5d5f8f24b70f7e34921f04590b316169b77a1f8f9cf1b0419ba93c5e9459f491e0bb8b0d2104a4d6638a507dfb20a4082fbd84b5ca37cafbb9e0dc5d3fa585abe10fbc67ecd75e75b8440dbcf9884bc80a3d8d4c9d8cecfd329d84db732aff751ed5413bc07c44260557c4e57ce1ed2f4c147705d1f831f8d8f1d85e5e46dc6194f60b872032f84aa27f6ecefa9e4673a3e7a6fd86e00316dc0d6437f9b60a092967841c5846cdf9ae8498f51837b541e8933db51f37f53a2d5f96efd1159cd853253e127c666a3a60c1e27cea952955c64f2dfdd7183764a7f65d7ebcb2659166d92c7080d0434cf8753cbd30a11214cd25473267da8ff66b186b19072a5c6e87e74dd8eb202170abf5aa7606121a4d1c07baa9f2f9045974d84fb7ec534ee7444063a7c820bfac32257e487a560508f2ddd9ab1f0bebe74be0b1de5003e45436f1cd425e925474ca6ac0f2d1173940e51e22ef2859fe4505ee199202f9f03d9b331830e38877dad97869044ffbf0546c799e53fc4d794ab030e10ae4ba705e8de820e21409b667bb7c02ebe0fb638b4ba07342ca01be061026ed1bf300b3cd1b97f1d55c1b478590e340e72066e6f7d68c1b54c3394a37eac962131ccd41d5ae8c34e23097eb4788cc576881ac30405b333916fee851b955d60e27c9561aca60c37e4e79c6eb88785510b1d65fc60c72436c02bab74cd1473f69441c4c612d06b6195616e41c7083fc0cdfc3a9e7e32a680b9456e924e3c5e1e717420d13fed8c66031554b04eb60baf198773e73419ea4a37cb4225bf63044eafa6c08bef9052e261c911305dbbfe7c5b136d13efe9cf12757e328783fb9f7c5d684d93797a07443d9fea78d9065094825c46362a8b8bac2b52194c9138315d6fe5d448dd00ff786bf57a024ddd400addc2a89c39f1c119dea19df04704898da419165a7449b0708601a2877764a1de2e7a33ec9bd0ba8e48e6249187a2215bfb4111fdc04cd17c7dcd007604f8eaeafdef50afc8eea259105db628fc439612bb6ae5d0dc43767ba5a49f732f438c4a509c610cabeb206c0042f7ddcc895dd8d0a67e169ef73f660c44988b0fa55e034827cd28e49c0436b388d0b1f4ad01aebddf460823a09687a88fbc12485a5a75ed1ac6c62d94e05c338498cb0ace2bd39ae4addd0d91bcb15244df86e536c6c021b9b7e1c8b1e4c608ef6210a71f42b00ccdc9240c6e6eac9127704992434646dcce99e27549f5b1e35d303000169b4c13478124ba7e81c618bd5e140fb38025d5054624d80ade9a3a6cb438870bd86dffedf0fdefa91e954fc7d6d53cfda088bac59cba58d63bdf630b9186e7c6563b0e5e0947c64f123d9c717d923f2f28c190fb00273487e6b6ac4294a51107f70b89499656889760a07a60f92ca4b403c4d0bb212e95864aaaa855b07fd431a26e0980979dee656a3dc1d2077026dabd6c4ad714ed93f7b8e4a23fd93bf9ac4b7f4514fbda73cd5f5269ccf7853a71627826c8a24a1de6e427f79704d7a7a5bb3ce2828c736c39ccc533dfe35152802f36f100d11ea421d87cdcfdb9acab593d6b11f68fcac224238a3767313928e6d000ac476c3756b2ef17e1ffb9ce85e061c7bb0d9fd9dff1aff8d7380d7ef61bc5b4d3972eb54ea4b8c9816ad31d7714022fcc959135c53aed40535bad01f4757823815d01e0d7aebb8413725f6ac0cc6a0df0f8590634602a696f5d846a9d386ad887448423c341eb3d9fa5ce0eca707c98b77533dd28340042bc2644e2726112d4ce31d5c04859b14f52185130212e31a7dde70595684606c0bc4aed37e4761fd0d84d7d237e98e3a323e6639f125826b8bd6cd4d53a656436a1a2b5ee34e497396e95b4c4c916266fa01fe5f3d8d0841de31ca98e9d845299cc870a341b33e00bc9438f285e9ca5dd182badafdab068ffdd6f177005d387d4b17578c941f96c7582df1f6466d66ae703182925d62a858defe25f8fe7ed4a97979e11f218d0664ed271c3cd7eb04de37d6003084d11ff509981743c570b560b0e60f1b8544dd433e9848769f7b9f0e63fc56c4411372584f14a810e5f364b5cbb93cbe1ae170346cc8adace402a220db69f9d847138847e2018794e92551803eafdb9cdc24aa651adfdaa1be806ce3abf605edbee4adf02b2cf2fb57966eef11728fd8e3dd1b6ec6d7a916e7b942579dc4dc1c4fe3ab11e2ed185337280d670249188a2be4b19b7a3bd84196d112c10794647d6f63be02072f4fc4d5c29c690d0a94c9aa7dc9554c9043b4f14e83efaef8cf6ee65cd91e99c60e17d8db8da77af2f9bd47a981cb3c6e24cab67cec82a149aa172758d78a19a8eb99331c628d4a40a9d63974892ac56922c6d66dc15322eac75b9a7d40d58d15ee53ff73b8581b360b165986c48e0517a90185e3f783308c80d9d1181a8e62a695f498e1b34385d610e852af137c1dc5d81e7b13e5e3d5c755241c20fdece446c54bacff022f945c41e83a046ed58154eddb7e35b1e996ebe0b30d1d47a62e73f236f46c54721965c724341567e505fb4bff75434eb02736683ce5aa7dfa7e4c680c5ce960d84d750b86f0d59134862b30548856dbe6625e29043233ad3c13cd79abc4d6d63e836ce28ca480900be5248c544970d7918b921e96db8e984633bdea9a3851bb8eb35dcb4db64759e7a3709945006716bfe5e12bebe2c9140da20abb77710dc0579dcda78d6571cc6d7374f4372b95835d8f49a0e66342b6685b90020b9e1c965e1b938e080fd87efd69c508743dc9d189dbd61009c16015c164f78ea95fbe60439a881915f967df73bc549cdb61ff8f247408686e4afb08f27a42bed69d4fbc5f5db6e777b12385eb1301829c36b0dd3a05958dc5b959f9776e9898b34c349662d0a50765f8eb60853e77e991b2947bb86f6f2a0937a76db7faae0c30f3daf8196963f4831d56deeac22bf94c0fff0a3b42464e5399791d73350ebf197ad9d61a953efa0629dc98c71ced6e372b31ba81358959a0705170bc37d71fe3eab860e8041a6b0174f6fd5f1eddd3d2547aa95853907a1b3161593cd5bbc4d06d0dcf1808fd6b57d094", 0x1000, 0x800, &(0x7f0000001400)=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e21, 0x7, @empty, 0x6}}, 0x24) perf_event_open(&(0x7f00000000c0)={0x0, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x40, 0x6, 0x0, 0x68aa, 0x0, 0x7fffffff, 0x0, 0x1, 0x3f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x7, 0x40, 0x0, 0x0, 0x6154ae6, 0x8f29, 0x2, 0x0, 0x2e, 0xea60000000000000, 0x9, 0x0, 0x0, 0x2, 0x0, 0x7, 0x0, @perf_bp={0x0}, 0x0, 0x1f, 0x1}, 0x0, 0xf, 0xffffffffffffff9c, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) r4 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x40000, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f00000002c0)={0x9dfd}, 0x4) mknod$loop(&(0x7f0000000040)='./file0\x00', 0x20, 0x0) connect$inet6(r3, &(0x7f0000002740)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) socket$nl_netfilter(0x10, 0x3, 0xc) sendmmsg(r3, &(0x7f0000007e00), 0x136a88c8311572c, 0x3f000900) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000200)={0x88, r5, 0x308, 0x70bd2b, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x40}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xe7}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e21}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x148}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x8}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @remote}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000000}, 0x40000) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) ioctl$DRM_IOCTL_FREE_BUFS(r4, 0x4010641a, &(0x7f0000000380)={0x5, &(0x7f0000000340)=[0x195, 0x4, 0x5, 0x6, 0x100000000]}) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:28 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0xbf00000000000000, {}, {}, @quote}], 0xff33) 21:30:29 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB, @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB, @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:29 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:29 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0xfd00000000000000, {}, {}, @quote}], 0xff33) 21:30:29 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB, @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2654.224261] protocol 88fb is buggy, dev hsr_slave_0 [ 2654.230790] protocol 88fb is buggy, dev hsr_slave_1 [ 2654.237460] protocol 88fb is buggy, dev hsr_slave_0 [ 2654.243219] protocol 88fb is buggy, dev hsr_slave_1 [ 2654.249550] protocol 88fb is buggy, dev hsr_slave_0 [ 2654.255469] protocol 88fb is buggy, dev hsr_slave_1 21:30:29 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:29 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="38000100240001", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:29 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c0004000180ed00882600000200071fd332000000000901bdc70000affe0100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x81000008913, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000000080)=[{{&(0x7f0000000000)=@ax25={{0x3, @bcast}, [@bcast, @default, @null, @netrom, @null, @default, @remote, @bcast]}, 0x259, &(0x7f0000000780)=[{&(0x7f0000000200)=""/248}, {&(0x7f0000000340)=""/217}, {&(0x7f0000000440)=""/222}, {&(0x7f0000000540)=""/212}, {&(0x7f0000000640)=""/92}, {&(0x7f00000006c0)=""/149}]}, 0xffff}], 0x42a, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:30 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0xfdffffff00000000, {}, {}, @quote}], 0xff33) 21:30:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:30 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB, @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:30 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="38000100240001", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0xfeffffff00000000, {}, {}, @quote}], 0xff33) 21:30:30 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="38000100240001", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:30 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:30 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000100)='/dev/full\x00', 0x400000, 0x0) getpeername$packet(r1, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x14) r2 = socket$xdp(0x2c, 0x3, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000000)={@local, @broadcast, 0x0}, &(0x7f0000000040)=0xfffffffffffffd83) ioctl$sock_bt_bnep_BNEPGETCONNLIST(0xffffffffffffffff, 0x800442d2, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x0, @link_local}]}) bind$xdp(r2, &(0x7f0000000080)={0x2c, 0x1, r3, 0x3b, 0xffffffffffffff9c}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r4 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r4, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r4, &(0x7f0000008880), 0x0, 0xdfc0d202299b7aea, 0x0) setsockopt$inet6_int(r4, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1, 0x1000000000}, 0x1c) 21:30:30 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0xff00000000000000, {}, {}, @quote}], 0xff33) 21:30:30 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1800008912, &(0x7f0000000000)="88a0700000fdff00000000397c4614afbfa22238b7bcbed09a875dbddd486689562ca7c07622c650cd") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:31 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:31 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB, @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x800, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f0000000080)=0xa8) openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80040, 0x0) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @empty}, 0x1c) 21:30:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:31 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x40000, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r1, 0x40045542, &(0x7f0000000040)=0x1) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) syz_open_dev$video(&(0x7f0000000080)='/dev/video#\x00', 0x4, 0x400000) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0xffffffffffffffff, r1, 0x0, 0xc, &(0x7f0000000100)='/dev/video#\x00'}, 0x30) prctl$PR_SET_PTRACER(0x59616d61, r3) 21:30:31 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:31 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0xffffffff00000000, {}, {}, @quote}], 0xff33) 21:30:31 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:32 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x480200, 0x0) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000040)={0x0, 0x80, 0x8, 0x8db}) 21:30:32 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB, @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:32 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x2}, {}, @quote}], 0xff33) 21:30:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x87) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, &(0x7f0000000000)="7e925498ff910b88559948a73e4ab820ad8fe11b4bc32a24", 0x18, 0x40000, &(0x7f0000000040)={0xa, 0x4e23, 0x100000001, @mcast1, 0x7fffffff}, 0x1c) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:32 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:32 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x42, 0x108) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'gre0\x00', 0x200}) socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000080)={0x10000002}) 21:30:32 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) accept4$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000040)=0x1c, 0x800) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:33 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:33 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:33 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="38000100240001006163746976", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:33 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x3}, {}, @quote}], 0xff33) 21:30:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x0, 0x2) ioctl$VIDIOC_OVERLAY(r1, 0x4004560e, &(0x7f0000000340)=0x5) r2 = socket$inet6(0xa, 0x2, 0x0) r3 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x20000, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000400)=ANY=[@ANYRES32=0x0, @ANYBLOB="0109fff36e29000082c6853a52596cb7a29d1d8f1311cf487f171643f23f614d52f7a716482d73ca5b63017cfa864a0a27b584a45feb45782816c6192abe803f067f70f77c47ad5924f7db4971fbc7af5abc964113c060cba149"], &(0x7f0000000080)=0x30c) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000000200)={r4, @in6={{0xa, 0x4e24, 0x8, @remote, 0x7}}, [0x400, 0xffff, 0xffffffff, 0xffff, 0x13ee03cb, 0x1000, 0x40009, 0x0, 0x20000, 0x9, 0x0, 0x9, 0x2, 0x8, 0x6]}, &(0x7f0000000100)=0x3ee) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r2, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) execve(&(0x7f0000000180)='./file0\x00', &(0x7f00000003c0)=[&(0x7f0000000380)='/dev/vbi#\x00'], &(0x7f0000000580)=[&(0x7f0000000480)='\xf4system@\x00', &(0x7f00000004c0)='[keyringuser$bdev.\'cpuset\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='/dev/vbi#\x00']) 21:30:33 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYBLOB="380001002400010061", @ANYRES32], 0x19}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c0004000180ed00882600000200071fd332000000000901bdc70000affe0100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:33 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2658.382935] net_ratelimit: 17 callbacks suppressed [ 2658.382944] protocol 88fb is buggy, dev hsr_slave_0 [ 2658.393229] protocol 88fb is buggy, dev hsr_slave_1 [ 2658.398434] protocol 88fb is buggy, dev hsr_slave_0 [ 2658.403612] protocol 88fb is buggy, dev hsr_slave_1 [ 2658.408823] protocol 88fb is buggy, dev hsr_slave_0 [ 2658.414015] protocol 88fb is buggy, dev hsr_slave_1 21:30:33 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x4}, {}, @quote}], 0xff33) 21:30:33 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x2000000000000, @mcast1}, 0x1c) [ 2658.543923] protocol 88fb is buggy, dev hsr_slave_0 [ 2658.549856] protocol 88fb is buggy, dev hsr_slave_1 21:30:33 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:33 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getpeername$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000040)=0x14) bind(r0, &(0x7f0000000200)=@xdp={0x2c, 0x4, r1, 0xc}, 0x1a) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") socket$caif_seqpacket(0x25, 0x5, 0x4) r2 = socket$inet6(0xa, 0x807, 0x800000400005) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r0, &(0x7f0000008880), 0x0, 0x44000101, 0x0) setsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0xfffffffffffffde3) 21:30:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c0004000180ed00882600000200071fd332000000000901bdc70000affe0100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:34 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="38000100240001006163746976", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:34 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x5}, {}, @quote}], 0xff33) 21:30:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = accept(r0, &(0x7f00000003c0)=@can, &(0x7f0000000000)=0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_GET(r1, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000440)={0x9c, r2, 0x200, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfff}]}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7fff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1f}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x1}, 0x11) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) r4 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl(r0, 0x51ddb6, &(0x7f0000000200)="63105f3349dc26b656d34cb39ef3ded18a9428bca3abf973af910595774b41bf0884134d00720c09c617f70999519dbafc8d001bd09fea6167bcef39a9abbe43681ce1591eaf96d6c9f3abf192deff936ada8ef447c56776acb7c945790cd63c62919cc946e052cb8984b6422b616dc1db3267a47af316ac2daaf795375d96a03dbd2a251ac3859af5f870008c20485dd54eef7870799d20650196a53d3d565e4a62596e3e774164069dace500bcbca9d2c7f3b04d9ce039e3015c31c1f04e9fa8783014") fsync(r4) recvmmsg(r3, &(0x7f0000000000), 0x0, 0x10001, 0x0) setsockopt$inet6_int(r3, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000500)) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/attr/current\x00', 0x2, 0x0) 21:30:34 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYBLOB="380001002400010061", @ANYRES32], 0x19}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:34 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2659.342883] protocol 88fb is buggy, dev hsr_slave_0 [ 2659.342896] protocol 88fb is buggy, dev hsr_slave_0 21:30:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") bind$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:34 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:34 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYBLOB="380001002400010061", @ANYRES32], 0x19}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:34 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000000000), 0x0, 0x44000102, 0x0) syz_open_dev$mice(&(0x7f0000000240)='/dev/input/mice\x00', 0x0, 0x420000) r2 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x800, 0x40000) getsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000040)=0x71a, &(0x7f0000000080)=0x4) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0xff7b) 21:30:34 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c0004000180ed00882600000200071fd332000000000901bdc70000affe0100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x1d}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:34 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x7}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="38000100240001006163746976", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:35 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x8}, {}, @quote}], 0xff33) 21:30:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYBLOB, @ANYRES32], 0x19}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vfio/vfio\x00', 0x100, 0x0) recvfrom$rxrpc(r2, &(0x7f0000000800)=""/4, 0x4, 0x40000102, &(0x7f0000000840)=@in6={0x21, 0x1, 0x2, 0x1c, {0xa, 0x4e22, 0x3f80000, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x1}}, 0x24) setxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.redirect\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x2) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000200)=@vsock={0x28, 0x0, 0x2711, @hyper}, 0x80, &(0x7f0000000680)=[{&(0x7f0000000340)="8c6b3d6a0295934d3163707dabfc18183f1d1b091a72cd3ed4b725324663a6542e6de9945d8b684559e1c23b4a47492bff715c980500ca67e80406bbbb0a2edd387db7a9cf43c1cd72b60c1ab124db4712bbefed8e2ce7444acd8eb9fc38140ca672bc6a9ed91d478f87e30f73b4632243a4fb6d17768666a0b6d30f0fc5419f452d815b074910255fa4343500d098ef1485e50e401cbbf1af8230dfc1d6fe9133bae6842ac7d759ee1ce44b24852917ff0fc1e3f648d6c5cf4072ac9b150fafc38156bd16", 0xc5}, {&(0x7f0000000280)="23ee967056b4a190671177e6520a0d0de6b82a336acbde2060f37b2d50004515c6b506d8eedc4d85fe3c68a35e80aee60962dd3ee65ad195fe6c618460022facdd7c875e", 0x44}, {&(0x7f0000000440)="8c805c9fab759949b216584709d19edf5181a1ffa47e23049dfffe82eebf368ee31071d539ce0efb27c1c23793e9e71d415867bd3dd6b370d397338fee55c18e1507557fda3013ae0e45e5c8b7950f676b620005c2cf6b9ae27a436a46a10cfe6514e2b1983c0e680a5ed93f4c590b49fbf1e76237d009b1d2a216f8d167b09b2dba26b6e5c90932427c372af6a3860820785c9a1edfd839de89d2470b5d2e40b224783efc1cd76167cdfd037865eaf27f23f4b7becc3c848b023812fa97dc0fdad7b04a288c", 0xc6}, {&(0x7f0000000540)="cb74eeaa4b9cf75f81c504f7c10ad68ee294b810e35c5720d6d05b43ffee7b9d0bcc8f958bde7ce1681808d7855375b1d130eb34eba37461b0e7c8ec57ab210674b2739427d406e3467f1dafa077cf9801d51593a291a89b04a2ff9d80a0745c239e59d5bc4bea1c302ce688662e75c1ba89de2c5776557eceae8cabca0ed5906fcc1492202f861a8045c08170c360df71b66373b4ae27a7887e0a20359daa6e", 0xa0}, {&(0x7f0000000600)="b1aa48612dd2fd760e24a553c2ec21148a94a336496d4d7f67379a7199d7a9d2b3dc968dd3aa72d086288bd7a4f88851db1b7ecd1bdc674a294bc61c84ac188c4343713be725e1e3dcd63a1ef1eeb00d772cc90c36231f62cf3453a22442d54821bfd97b5507590b52719dfdb144ffa9ef7ae38c0be4", 0x76}], 0x5, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0xf8}, 0x40084) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r2, 0x28, 0x1, &(0x7f0000000880)=0x3f, 0x8) name_to_handle_at(r2, &(0x7f00000008c0)='./file0\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="4300000000000000ecdcb6a188d9eac3cf3e1a63c106a1c001262eeb3a01a9adbef05f8507af046b0000fa8bbc3bb3148ae85739d2781b1cdec929f1c6266c9ddf6590"], &(0x7f0000000980), 0x1000) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) fsetxattr$security_capability(r0, &(0x7f0000000000)='security.capability\x00', &(0x7f0000000040)=@v2={0x2000000, [{0x88e8, 0x1000}, {0x9, 0x2}]}, 0x14, 0x2) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) fsetxattr$security_smack_entry(r1, &(0x7f0000000080)='security.SMACK64EXEC\x00', &(0x7f0000000100)='security.capability\x00', 0x14, 0x1) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:35 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x94}, {}, @quote}], 0xff33) 21:30:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:35 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x8000, 0x8) readlinkat(r2, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=""/42, 0x2a) r3 = socket(0x10, 0x802, 0x0) write(r3, &(0x7f0000000080)="220000002000070700be000009000701020000ffffff9e0000200000050013800100", 0x22) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20, 0x0, @rand_addr, 0x8}, 0x1c) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000340)={{{@in=@local, @in6=@ipv4={[], [], @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@dev}}, &(0x7f0000000180)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@remote, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4}}, &(0x7f0000000280)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000540)={{{@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, @in6=@remote, 0x4e24, 0x7f, 0x4e23, 0x0, 0xa, 0x0, 0x80, 0x0, r4, r5}, {0x10000, 0x1000, 0x0, 0x5, 0x3, 0x200, 0xfffffffffffffbff, 0x2}, {0x2, 0x72f, 0x5, 0x7fff}, 0x4, 0x0, 0x0, 0x0, 0x1}, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4d4, 0xff}, 0x2, @in=@broadcast, 0x0, 0x3, 0x2, 0x8, 0x3, 0x3, 0xa6}}, 0xe8) recvmmsg(r0, &(0x7f0000000080), 0x400000000000334, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:35 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:35 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0xbf}, {}, @quote}], 0xff33) 21:30:35 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:35 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB, @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:35 executing program 3: r0 = socket$inet(0x2, 0x7, 0x9) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000640), &(0x7f0000000680)=0x4) r1 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffff9c, 0x84, 0x6, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e24, 0x3ff8, @empty, 0xffff}}}, &(0x7f00000002c0)=0x84) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000340)={r2, 0x1, 0x2}, &(0x7f0000000380)=0x8) r3 = socket$inet_udplite(0x2, 0x2, 0x88) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x8000, 0x0) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x8, &(0x7f0000000100)=0x81, 0x4) ioctl(r3, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r5 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r5, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r5, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) ioctl$void(r5, 0x5451) setsockopt$inet6_int(r5, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) ioctl$sock_SIOCSIFBR(r5, 0x8941, &(0x7f0000000040)=@add_del={0x2, &(0x7f0000000000)='sit0\x00'}) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:35 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYBLOB, @ANYRES32], 0x19}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB, @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB, @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:36 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/secure_tcp\x00', 0x2, 0x0) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r0, 0x800442d3, &(0x7f0000000100)={0x2, 0xb4cd, 0xab, @random="bbd47fa8a539", 'bcsf0\x00'}) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000200)={0x2bdd, {{0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}}}, 0x88) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x7ff, 0x0, 0x1f, 0x18, 0x19, "fa33725d5a64832a956630a1eb412fac3b326a5e3f44c16c263fc4b7ec4a8f1d02f34e68259f0226587ddcc1a6ee4afb2dd6f7d38f26f329aedef3d39e9b15de", "57b7f29f71b13b5a4b724de896446ae85077f852c36ab2930f5f8a94a43c830d280ee4beed0152a4714b341dcdf148a83a838d321e7986c348b21bb9e64f8416", "401a3654af1f5c615c1e62112ac8ab58e82122aeccc1aad6015554f5c0744ced", [0x4, 0x101]}) r2 = socket$inet6(0xa, 0x2, 0xfffffffffffffffc) bind$inet6(r2, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r2, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r3 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_S_SELECTION(r3, 0xc040565f, &(0x7f0000000040)={0xf, 0x101, 0x2, {0x9, 0x9, 0x8, 0x8001}}) 21:30:36 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000000)=@dstopts={0x2e, 0x1, [], [@ra={0x5, 0x2, 0x100000001}, @ra={0x5, 0x2, 0x8001}]}, 0x10) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x400000000000249, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:36 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0xfd}, {}, @quote}], 0xff33) 21:30:36 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB, @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:36 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB, @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:36 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB, @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:36 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:36 executing program 3: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppp\x00', 0x101005, 0x0) ioctl$EVIOCGPROP(r0, 0xc004743e, &(0x7f00000001c0)=""/246) pwritev(r0, &(0x7f0000000000)=[{&(0x7f00000002c0)="80fd", 0x2}], 0x1, 0x0) 21:30:36 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x300}, {}, @quote}], 0xff33) 21:30:37 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000140)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)=ANY=[@ANYBLOB], 0x1}}, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000200)='veno\x00', 0x5) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES16=0x0], 0x2) writev(r0, &(0x7f0000001a40)=[{&(0x7f0000000a00)="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", 0x3a9}], 0x1) 21:30:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB, @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:37 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB, @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:37 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x500}, {}, @quote}], 0xff33) 21:30:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) write$apparmor_exec(r0, &(0x7f0000000140)={'stack ', 'asymmetric\x00'}, 0x11) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @rand_addr="4ba386f9358e813147b0c7a0d57e7d6c"}, 0x1c) 21:30:37 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:37 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:37 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:37 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) flock(r0, 0xfffffffffffffffe) 21:30:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:38 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000040)={0x0, 0x0, 0x0, r0, 0xe}) 21:30:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x8100}, {}, @quote}], 0xff33) 21:30:38 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB, @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:38 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x11, r0, 0x0) 21:30:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2663.502879] net_ratelimit: 22 callbacks suppressed [ 2663.502886] protocol 88fb is buggy, dev hsr_slave_0 [ 2663.513456] protocol 88fb is buggy, dev hsr_slave_1 [ 2663.514215] protocol 88fb is buggy, dev hsr_slave_0 [ 2663.524547] protocol 88fb is buggy, dev hsr_slave_1 21:30:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:38 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:38 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick=0xffffff92, {}, {}, @quote}], 0xff33) 21:30:38 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x9400}, {}, @quote}], 0xff33) 21:30:38 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:38 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYBLOB, @ANYRES32], 0x17}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:38 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:39 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0}, &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000008000100", @ANYRES32=r4, @ANYBLOB="b80002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000200000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004007f00000008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x23}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r6, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:39 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYBLOB, @ANYRES32], 0x17}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:39 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0xbf00}, {}, @quote}], 0xff33) [ 2664.623793] protocol 88fb is buggy, dev hsr_slave_0 [ 2664.629561] protocol 88fb is buggy, dev hsr_slave_1 [ 2664.635942] protocol 88fb is buggy, dev hsr_slave_0 [ 2664.641641] protocol 88fb is buggy, dev hsr_slave_1 [ 2664.648360] protocol 88fb is buggy, dev hsr_slave_0 [ 2664.653998] protocol 88fb is buggy, dev hsr_slave_1 21:30:39 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:39 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000140)="0adc1f023c123f3188a070") r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f00000001c0)={0xa, 0x4e20}, 0x1c) recvmmsg(r1, &(0x7f0000008880), 0x4000000000001cb, 0x44000102, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2, &(0x7f00000000c0)=0x8001, 0x4) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) 21:30:39 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:39 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0xfd00}, {}, @quote}], 0xff33) 21:30:39 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:40 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0}, &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000008000100", @ANYRES32=r4, @ANYBLOB="b80002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000200000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004007f00000008000600", @ANYRES32=r6, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="6c0102003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x2a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r8, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:40 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYBLOB, @ANYRES32], 0x17}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:40 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:40 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0xff00}, {}, @quote}], 0xff33) 21:30:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:40 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x1000000}, {}, @quote}], 0xff33) 21:30:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0}, &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000008000100", @ANYBLOB="3800010024000100616374697665706f727400", @ANYRES32], 0x1f}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:40 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:40 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:41 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB, @ANYRES32], 0x16}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:41 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f7274000000000000", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:41 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x2000000}, {}, @quote}], 0xff33) 21:30:41 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB, @ANYRES32], 0x16}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:41 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:41 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r3, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x17}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r4, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:41 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x6}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:41 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x3000000}, {}, @quote}], 0xff33) 21:30:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:42 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f7274000000000000", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:42 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r3, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x17}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r4, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:42 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB, @ANYRES32], 0x16}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0}, &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000", @ANYRES32], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:42 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:42 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:42 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x4000000}, {}, @quote}], 0xff33) 21:30:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:43 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f7274000000000000", @ANYRES32], 0x18}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB, @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:43 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYBLOB, @ANYRES32], 0x15}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:43 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x5000000}, {}, @quote}], 0xff33) 21:30:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB, @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB, @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:43 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x8000000}, {}, @quote}], 0xff33) [ 2668.782898] net_ratelimit: 18 callbacks suppressed [ 2668.782906] protocol 88fb is buggy, dev hsr_slave_0 [ 2668.793259] protocol 88fb is buggy, dev hsr_slave_1 [ 2668.798498] protocol 88fb is buggy, dev hsr_slave_0 [ 2668.803673] protocol 88fb is buggy, dev hsr_slave_1 [ 2668.808918] protocol 88fb is buggy, dev hsr_slave_0 [ 2668.814097] protocol 88fb is buggy, dev hsr_slave_1 21:30:43 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0}, &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYRES32=r2, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000", @ANYRES32], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:43 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB, @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:43 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB, @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2668.943380] protocol 88fb is buggy, dev hsr_slave_0 [ 2668.949420] protocol 88fb is buggy, dev hsr_slave_1 21:30:44 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x80ffffff}, {}, @quote}], 0xff33) 21:30:44 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYBLOB="3800010024000100616374697665706f727400000000000000", @ANYRES32], 0x17}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB, @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYBLOB, @ANYRES32], 0x15}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:44 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2669.743189] protocol 88fb is buggy, dev hsr_slave_0 [ 2669.743383] protocol 88fb is buggy, dev hsr_slave_0 21:30:44 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYBLOB, @ANYRES32], 0x15}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:44 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0}, &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c0004000180ed00882600000200071fd332000000000901bdc70000affe0100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYRES32=r2, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000008000100", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000", @ANYRES32], 0x20}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x81000000}, {}, @quote}], 0xff33) 21:30:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:45 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYBLOB="3800010024000100616374697665706f727400000000000000", @ANYRES32], 0x17}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x81ffffff}, {}, @quote}], 0xff33) 21:30:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:45 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:45 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB, @ANYRES32], 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:45 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:45 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000008000100", @ANYRES32=r3, @ANYBLOB="b80002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000200000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004007f00000008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="6c0102003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f72740000000000", @ANYRES32], 0x2a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r6 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r6, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:45 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x92ffffff}, {}, @quote}], 0xff33) 21:30:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYBLOB="3800010024000100616374697665706f727400000000000000", @ANYRES32], 0x17}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB, @ANYRES32], 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:46 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0}, &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r3, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000008000300050000001000040062726f6164636173740000003c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c00040068617368000000004c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000001c0004000180ed00882600000200071fd332000000000901bdc70000affe0100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000000c000400686173680000000008000100", @ANYRES32=r4, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000008000100", @ANYRES32=r5, @ANYBLOB="b80002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x22}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r7, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:46 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x93ffffff}, {}, @quote}], 0xff33) 21:30:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB, @ANYRES32], 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:46 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00', 0x0}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYRES32, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000008000100", @ANYRES32=r3, @ANYBLOB="b80002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r4, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000200000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004007f00000008000600", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="6c0102003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="3c000100240001006270665f686173685f66756e6300000000000000000000000000000000000000080003000b0000000c00040005000205000000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32=r7, @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x2e}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r8 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r8, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:46 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:46 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYBLOB, @ANYRES32], 0x17}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:46 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:46 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYBLOB, @ANYRES32], 0x13}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0)={0x11, 0x0, 0x0}, &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r3, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="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", @ANYRES32=r4, @ANYBLOB="3c00020038000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000800030003000000080004000400000008000100", @ANYRES32=r5, @ANYBLOB="b80002003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000200000040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004007f00000008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x23}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r7 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r7, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:47 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYBLOB, @ANYRES32], 0x13}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:47 executing program 3 (fault-call:2 fault-nth:0): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 21:30:47 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x94000000}, {}, @quote}], 0xff33) 21:30:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:47 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2672.526545] FAULT_INJECTION: forcing a failure. [ 2672.526545] name failslab, interval 1, probability 0, space 0, times 0 [ 2672.622921] CPU: 1 PID: 18457 Comm: syz-executor.3 Not tainted 5.0.0-rc7 #77 [ 2672.630168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2672.639694] Call Trace: [ 2672.642363] dump_stack+0x172/0x1f0 [ 2672.646148] should_fail.cold+0xa/0x1b [ 2672.650058] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2672.655266] ? lock_downgrade+0x810/0x810 [ 2672.659515] ? ___might_sleep+0x163/0x280 [ 2672.663785] __should_failslab+0x121/0x190 [ 2672.668346] should_failslab+0x9/0x14 [ 2672.672157] kmem_cache_alloc_trace+0x2d1/0x760 [ 2672.676901] ? ldsem_wake+0x40/0x40 [ 2672.680623] h5_open+0x4e4/0x5f0 [ 2672.684090] ? h5_rx_crc+0x20/0x20 [ 2672.687656] ? ___might_sleep+0x163/0x280 [ 2672.691833] hci_uart_tty_ioctl+0x2d4/0xa70 [ 2672.696214] tty_ioctl+0xac9/0x14d0 [ 2672.699853] ? hci_uart_init_work+0x150/0x150 [ 2672.704365] ? tty_vhangup+0x30/0x30 [ 2672.708101] ? mark_held_locks+0x100/0x100 [ 2672.712398] ? proc_fail_nth_write+0x9d/0x1e0 [ 2672.716923] ? proc_cwd_link+0x1d0/0x1d0 [ 2672.721018] ? __f_unlock_pos+0x19/0x20 [ 2672.725011] ? find_held_lock+0x35/0x130 [ 2672.729080] ? __fget+0x340/0x540 [ 2672.732546] ? find_held_lock+0x35/0x130 [ 2672.736619] ? __fget+0x340/0x540 [ 2672.740088] ? tty_vhangup+0x30/0x30 [ 2672.743812] do_vfs_ioctl+0xd6e/0x1390 [ 2672.747708] ? ioctl_preallocate+0x210/0x210 [ 2672.752128] ? __fget+0x367/0x540 [ 2672.755595] ? iterate_fd+0x360/0x360 [ 2672.759480] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2672.765064] ? fput+0x128/0x1a0 [ 2672.768402] ? security_file_ioctl+0x93/0xc0 [ 2672.772841] ksys_ioctl+0xab/0xd0 [ 2672.776303] __x64_sys_ioctl+0x73/0xb0 [ 2672.780244] do_syscall_64+0x103/0x610 [ 2672.784145] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2672.789340] RIP: 0033:0x457e29 [ 2672.792534] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2672.811438] RSP: 002b:00007f3c1730bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 21:30:47 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2672.819262] RAX: ffffffffffffffda RBX: 00007f3c1730bc90 RCX: 0000000000457e29 [ 2672.826549] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 2672.833809] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2672.841097] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3c1730c6d4 [ 2672.848356] R13: 00000000004c06b9 R14: 00000000004d2350 R15: 0000000000000004 21:30:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYBLOB, @ANYRES32], 0x17}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0x94ffffff}, {}, @quote}], 0xff33) 21:30:48 executing program 3 (fault-call:2 fault-nth:1): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 21:30:48 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYBLOB, @ANYRES32], 0x13}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x5}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0de5"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2673.247890] FAULT_INJECTION: forcing a failure. [ 2673.247890] name failslab, interval 1, probability 0, space 0, times 0 [ 2673.263248] CPU: 0 PID: 18478 Comm: syz-executor.3 Not tainted 5.0.0-rc7 #77 [ 2673.270478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2673.279840] Call Trace: [ 2673.282454] dump_stack+0x172/0x1f0 [ 2673.286100] should_fail.cold+0xa/0x1b [ 2673.290009] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2673.295130] ? mark_held_locks+0xb1/0x100 [ 2673.299297] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2673.304430] ? __debug_object_init+0x190/0xc30 [ 2673.309032] __should_failslab+0x121/0x190 [ 2673.313291] should_failslab+0x9/0x14 [ 2673.317095] kmem_cache_alloc_node+0x56/0x710 [ 2673.317112] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2673.317128] ? __debug_object_init+0x190/0xc30 [ 2673.317237] __alloc_skb+0xd5/0x5e0 [ 2673.334920] ? skb_scrub_packet+0x440/0x440 [ 2673.339252] ? lockdep_init_map+0x10c/0x5b0 [ 2673.343589] h5_link_control.isra.0+0x2f/0xa0 [ 2673.348093] h5_open+0x438/0x5f0 [ 2673.351477] ? h5_rx_crc+0x20/0x20 [ 2673.355027] ? ___might_sleep+0x163/0x280 [ 2673.359196] hci_uart_tty_ioctl+0x2d4/0xa70 [ 2673.363542] tty_ioctl+0xac9/0x14d0 [ 2673.367203] ? hci_uart_init_work+0x150/0x150 [ 2673.371713] ? tty_vhangup+0x30/0x30 [ 2673.375453] ? mark_held_locks+0x100/0x100 [ 2673.379702] ? proc_fail_nth_write+0x9d/0x1e0 [ 2673.384215] ? proc_cwd_link+0x1d0/0x1d0 [ 2673.388287] ? __f_unlock_pos+0x19/0x20 [ 2673.392274] ? find_held_lock+0x35/0x130 [ 2673.396352] ? __fget+0x340/0x540 [ 2673.399828] ? find_held_lock+0x35/0x130 [ 2673.403903] ? __fget+0x340/0x540 [ 2673.407390] ? tty_vhangup+0x30/0x30 [ 2673.411119] do_vfs_ioctl+0xd6e/0x1390 [ 2673.415025] ? ioctl_preallocate+0x210/0x210 [ 2673.419449] ? __fget+0x367/0x540 [ 2673.422919] ? iterate_fd+0x360/0x360 [ 2673.426731] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2673.432280] ? fput+0x128/0x1a0 [ 2673.435580] ? security_file_ioctl+0x93/0xc0 [ 2673.440004] ksys_ioctl+0xab/0xd0 [ 2673.443474] __x64_sys_ioctl+0x73/0xb0 [ 2673.447389] do_syscall_64+0x103/0x610 [ 2673.451293] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2673.456488] RIP: 0033:0x457e29 [ 2673.459691] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2673.478602] RSP: 002b:00007f3c1730bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2673.486320] RAX: ffffffffffffffda RBX: 00007f3c1730bc90 RCX: 0000000000457e29 [ 2673.493601] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 2673.500884] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2673.508169] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3c1730c6d4 [ 2673.515449] R13: 00000000004c06b9 R14: 00000000004d2350 R15: 0000000000000004 21:30:48 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYBLOB, @ANYRES32], 0x17}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0xbf000000}, {}, @quote}], 0xff33) 21:30:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x4}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:48 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:48 executing program 3 (fault-call:2 fault-nth:2): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 21:30:48 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0xfd000000}, {}, @quote}], 0xff33) 21:30:48 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x4}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2673.889125] FAULT_INJECTION: forcing a failure. [ 2673.889125] name failslab, interval 1, probability 0, space 0, times 0 [ 2673.902858] net_ratelimit: 22 callbacks suppressed [ 2673.902865] protocol 88fb is buggy, dev hsr_slave_0 [ 2673.902869] protocol 88fb is buggy, dev hsr_slave_0 [ 2673.902916] protocol 88fb is buggy, dev hsr_slave_1 [ 2673.907952] protocol 88fb is buggy, dev hsr_slave_1 [ 2673.978308] CPU: 1 PID: 18509 Comm: syz-executor.3 Not tainted 5.0.0-rc7 #77 [ 2673.985555] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2673.994935] Call Trace: [ 2673.997537] dump_stack+0x172/0x1f0 [ 2674.001175] should_fail.cold+0xa/0x1b [ 2674.005070] ? h5_open+0x4e4/0x5f0 [ 2674.008620] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2674.013734] ? __debug_object_init+0x190/0xc30 [ 2674.018340] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2674.023888] ? should_fail+0x14d/0x85c [ 2674.027792] __should_failslab+0x121/0x190 [ 2674.032039] should_failslab+0x9/0x14 [ 2674.035852] kmem_cache_alloc_node_trace+0x5a/0x720 [ 2674.040886] ? __alloc_skb+0xd5/0x5e0 [ 2674.044764] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 2674.050225] __kmalloc_node_track_caller+0x3d/0x70 [ 2674.055166] __kmalloc_reserve.isra.0+0x40/0xf0 [ 2674.059847] __alloc_skb+0x10b/0x5e0 [ 2674.063573] ? skb_scrub_packet+0x440/0x440 [ 2674.067908] ? lockdep_init_map+0x10c/0x5b0 [ 2674.072244] h5_link_control.isra.0+0x2f/0xa0 [ 2674.076744] h5_open+0x438/0x5f0 [ 2674.080120] ? h5_rx_crc+0x20/0x20 [ 2674.083664] ? ___might_sleep+0x163/0x280 [ 2674.087828] hci_uart_tty_ioctl+0x2d4/0xa70 [ 2674.092161] tty_ioctl+0xac9/0x14d0 [ 2674.095791] ? hci_uart_init_work+0x150/0x150 [ 2674.100292] ? tty_vhangup+0x30/0x30 [ 2674.104027] ? mark_held_locks+0x100/0x100 [ 2674.108271] ? proc_fail_nth_write+0x9d/0x1e0 [ 2674.112776] ? proc_cwd_link+0x1d0/0x1d0 [ 2674.116842] ? __f_unlock_pos+0x19/0x20 [ 2674.120828] ? find_held_lock+0x35/0x130 [ 2674.124898] ? __fget+0x340/0x540 [ 2674.128362] ? find_held_lock+0x35/0x130 [ 2674.132427] ? __fget+0x340/0x540 [ 2674.135900] ? tty_vhangup+0x30/0x30 [ 2674.139622] do_vfs_ioctl+0xd6e/0x1390 [ 2674.143524] ? ioctl_preallocate+0x210/0x210 [ 2674.147938] ? __fget+0x367/0x540 [ 2674.151399] ? iterate_fd+0x360/0x360 [ 2674.155208] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2674.160750] ? fput+0x128/0x1a0 [ 2674.164046] ? security_file_ioctl+0x93/0xc0 [ 2674.168471] ksys_ioctl+0xab/0xd0 [ 2674.171935] __x64_sys_ioctl+0x73/0xb0 [ 2674.175835] do_syscall_64+0x103/0x610 [ 2674.179752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2674.184945] RIP: 0033:0x457e29 [ 2674.188143] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2674.207053] RSP: 002b:00007f3c1730bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2674.214870] RAX: ffffffffffffffda RBX: 00007f3c1730bc90 RCX: 0000000000457e29 [ 2674.222146] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 21:30:49 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYBLOB="38000100240001006163746976", @ANYRES32], 0x17}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2674.229418] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2674.236694] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3c1730c6d4 [ 2674.243969] R13: 00000000004c06b9 R14: 00000000004d2350 R15: 0000000000000004 21:30:49 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB, @ANYRES32], 0x12}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x4}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008000400e400000008000500070000000800060001040000400003001400020074756e6c30000000000000000000000008000300000000000800080004000000080007004e2200000800010001000000080001000000000040000200080008000500000008000900e05d0000080003000400000014000100e0000002000000000000000000000000080005000100000008000400ff0300008c0756e78942864d7cc63f03c6f5a6dcd7c52f7b874c305be8370d2c856137cabfee0c6bb93a7a6c1ff279db1812b7222ef1b80a586cddecf1c8cf5758b2c254fa519fea863cad2d0f7df82a0f43ea779b0d538692913bc05a10fd2af607f4914b2ad61d9c936b12e511bb4f01e2d0fa7538a028b016849fe0d1649e15914b7443a79d8f3de6ea4fe26d801397de2a9186d3ee87680f0679098aa6ef735bc553adefdf017ac8c84b2d4ab92982e25ae0d54fe526b06c2331f38ca2d3e09e041d0db1aae742ea0d"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB, @ANYRES32], 0x4}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:49 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="000829bd7000fbdbdf250c0000000800040023bc800d5400010014000300e000000200000000000000000000000014000300fe8000000000000000000000000000260c0007002700000014000000080005000400000014000300ac14140c00000000000000000000000028000200140001007f0000010000000000000000000000000800040003000000080002004e230000080005007a1500003c000300080004000800000014000600fe8000000000000000000000000000aa14000600ff010000000000000000000000000001080007004e2100003c0003000800050000000000080008003c000000080007004e24000008000400ffff000008000500ac1e0001080008000100000008"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0xfdffffff}, {}, @quote}], 0xff33) 21:30:49 executing program 3 (fault-call:2 fault-nth:3): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000000c0)=0xf) ioctl$KDADDIO(r0, 0x400455c8, 0x2) 21:30:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB, @ANYRES32], 0x4}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2674.732143] FAULT_INJECTION: forcing a failure. [ 2674.732143] name failslab, interval 1, probability 0, space 0, times 0 [ 2674.822564] CPU: 0 PID: 18539 Comm: syz-executor.3 Not tainted 5.0.0-rc7 #77 [ 2674.829852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2674.839224] Call Trace: [ 2674.841854] dump_stack+0x172/0x1f0 [ 2674.845506] should_fail.cold+0xa/0x1b [ 2674.849428] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2674.854548] ? lock_downgrade+0x810/0x810 [ 2674.858723] ? ___might_sleep+0x163/0x280 [ 2674.862893] __should_failslab+0x121/0x190 [ 2674.867148] should_failslab+0x9/0x14 21:30:49 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYBLOB="3800010024000100616374697665706f7274000000000000000000000000000000000000000000000800030003000000080004", @ANYRES32], 0x1b}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2674.870969] kmem_cache_alloc_trace+0x2d1/0x760 [ 2674.875673] ? h5_open+0x472/0x5f0 [ 2674.879225] ? h5_rx_crc+0x20/0x20 [ 2674.882787] ? ___might_sleep+0x163/0x280 [ 2674.887017] hci_alloc_dev+0x43/0x1d00 [ 2674.891355] hci_uart_tty_ioctl+0x321/0xa70 [ 2674.895693] tty_ioctl+0xac9/0x14d0 [ 2674.899334] ? hci_uart_init_work+0x150/0x150 [ 2674.903841] ? tty_vhangup+0x30/0x30 [ 2674.907572] ? mark_held_locks+0x100/0x100 [ 2674.911823] ? proc_fail_nth_write+0x9d/0x1e0 [ 2674.916338] ? proc_cwd_link+0x1d0/0x1d0 [ 2674.920420] ? __f_unlock_pos+0x19/0x20 [ 2674.924409] ? find_held_lock+0x35/0x130 [ 2674.928480] ? __fget+0x340/0x540 [ 2674.931944] ? find_held_lock+0x35/0x130 [ 2674.936015] ? __fget+0x340/0x540 [ 2674.939485] ? tty_vhangup+0x30/0x30 [ 2674.943209] do_vfs_ioctl+0xd6e/0x1390 [ 2674.947112] ? ioctl_preallocate+0x210/0x210 [ 2674.951532] ? __fget+0x367/0x540 [ 2674.954999] ? iterate_fd+0x360/0x360 [ 2674.958808] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2674.964356] ? fput+0x128/0x1a0 [ 2674.967650] ? security_file_ioctl+0x93/0xc0 [ 2674.972070] ksys_ioctl+0xab/0xd0 [ 2674.975540] __x64_sys_ioctl+0x73/0xb0 [ 2674.979440] do_syscall_64+0x103/0x610 [ 2674.983345] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2674.988630] RIP: 0033:0x457e29 [ 2674.991839] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2675.010753] RSP: 002b:00007f3c1730bc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2675.018472] RAX: ffffffffffffffda RBX: 00007f3c1730bc90 RCX: 0000000000457e29 [ 2675.025842] RDX: 0000000000000002 RSI: 00000000400455c8 RDI: 0000000000000003 [ 2675.033123] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 2675.040398] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3c1730c6d4 [ 2675.047676] R13: 00000000004c06b9 R14: 00000000004d2350 R15: 0000000000000004 [ 2675.056272] protocol 88fb is buggy, dev hsr_slave_0 [ 2675.061371] protocol 88fb is buggy, dev hsr_slave_1 [ 2675.066547] protocol 88fb is buggy, dev hsr_slave_0 [ 2675.071625] protocol 88fb is buggy, dev hsr_slave_1 [ 2675.076797] protocol 88fb is buggy, dev hsr_slave_0 [ 2675.081875] protocol 88fb is buggy, dev hsr_slave_1 [ 2675.088605] kasan: CONFIG_KASAN_INLINE enabled [ 2675.092749] Bluetooth: Invalid header checksum [ 2675.098604] kasan: GPF could be caused by NULL-ptr deref or user memory access 21:30:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB, @ANYRES32], 0x4}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:50 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r1, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYBLOB="38000100240001006163746976", @ANYRES32], 0x17}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2675.134013] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 2675.140303] CPU: 0 PID: 17456 Comm: kworker/0:2 Not tainted 5.0.0-rc7 #77 [ 2675.147247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2675.156621] Workqueue: events hci_uart_write_work [ 2675.161484] RIP: 0010:hci_uart_write_work+0x1b6/0x710 21:30:50 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0xfeffffff}, {}, @quote}], 0xff33) [ 2675.166684] Code: 0f 85 6a 04 00 00 49 8b b4 24 c8 00 00 00 4c 89 ef e8 fe 70 53 02 89 c6 48 8b 45 d0 48 8d b8 5c 10 00 00 48 89 f8 48 c1 e8 03 <0f> b6 14 18 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 1d [ 2675.185596] RSP: 0018:ffff88804f877cb0 EFLAGS: 00010203 [ 2675.190965] RAX: 000000000000020b RBX: dffffc0000000000 RCX: 0000000000000000 [ 2675.198250] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000105c [ 2675.205528] RBP: ffff88804f877d30 R08: ffff88808c470480 R09: ffff88808c470d48 [ 2675.212803] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880927f1800 [ 2675.220079] R13: ffff888051668940 R14: ffff88809f609aa8 R15: ffff8880927f1870 [ 2675.227363] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2675.235596] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2675.241479] CR2: 00007f2635837000 CR3: 00000000a48cd000 CR4: 00000000001406f0 [ 2675.248753] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2675.256026] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2675.263316] Call Trace: [ 2675.265986] process_one_work+0x98e/0x1790 [ 2675.270254] ? pwq_dec_nr_in_flight+0x320/0x320 [ 2675.274931] ? lock_acquire+0x16f/0x3f0 [ 2675.278920] worker_thread+0x98/0xe40 21:30:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x4}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:50 executing program 0: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, 0x0, &(0x7f0000002000)) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32=r2, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB, @ANYRES32], 0x12}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2675.282780] ? trace_hardirqs_on+0x67/0x230 [ 2675.287113] kthread+0x357/0x430 [ 2675.290485] ? process_one_work+0x1790/0x1790 [ 2675.294988] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 2675.300535] ret_from_fork+0x3a/0x50 [ 2675.304255] Modules linked in: [ 2675.308037] kobject: 'loop5' (00000000bcac7648): kobject_uevent_env [ 2675.332889] kobject: 'loop5' (00000000bcac7648): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2675.342744] kobject: 'loop1' (000000006f622966): kobject_uevent_env [ 2675.361653] kobject: 'loop1' (000000006f622966): fill_kobj_path: path = '/devices/virtual/block/loop1' 21:30:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) 21:30:50 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000840)) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, 0x0, &(0x7f0000002200)) getsockname$packet(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700)={0x11, 0x0, 0x0}, &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="3c0001", @ANYRES32=r1, @ANYRES32], 0x3}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r2, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {0xff000000}, {}, @quote}], 0xff33) [ 2675.383200] kobject: 'loop4' (00000000181a4acc): kobject_uevent_env [ 2675.394500] kobject: 'loop4' (00000000181a4acc): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2675.407906] kobject: 'loop5' (00000000bcac7648): kobject_uevent_env [ 2675.416166] kobject: 'loop5' (00000000bcac7648): fill_kobj_path: path = '/devices/virtual/block/loop5' 21:30:50 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x2ab) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000046c0)={'team0\x00'}) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="3800010024000100616374697665706f72740000000000000000", @ANYRES32], 0x4}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2675.437598] kobject: 'loop0' (000000004b156a1a): kobject_uevent_env [ 2675.462907] kobject: 'loop0' (000000004b156a1a): fill_kobj_path: path = '/devices/virtual/block/loop0' 21:30:50 executing program 2: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x890}, 0xc005) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000240)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000001fc0), &(0x7f0000002000)=0x14) accept$packet(r0, &(0x7f00000021c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000002200)=0x14) getsockname$packet(0xffffffffffffffff, &(0x7f0000002700)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002740)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002780)={{{@in=@initdev, @in=@initdev}}, {{@in6=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000002880)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f0000002b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000002b40)=0x14) accept4$packet(0xffffffffffffffff, &(0x7f0000004700), &(0x7f0000004740)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000005540)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000005500)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="81000050", @ANYRES16, @ANYBLOB="000127bd7000ffdbdf2503000000c1fe0100", @ANYRES32=r1, @ANYBLOB="4400020040000100240001007072696f72697479000000000000000000000000000000000000000000000000080003000e000000080004008100000008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32=r2, @ANYBLOB="4001020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000002000008000600", @ANYRES32, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000800030003000000080004000600000008000600", @ANYRES32, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="44000100240001006d6f6465000000000000000000000000000000000000000000000000000000000800030005000000140004006163746976656261636b7570000000003c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="08000100", @ANYRES32, @ANYBLOB="7c00020038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000800030003000000080004000000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32, @ANYBLOB="080007000000000008000100", @ANYRES32, @ANYBLOB="800102003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000008000300060000000400040008000600", @ANYRES32, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32], 0x1a}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) write$sndseq(r3, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @quote}], 0xff33) [ 2675.485618] kobject: 'loop2' (00000000ead5b122): kobject_uevent_env [ 2675.498880] kobject: 'loop2' (00000000ead5b122): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2675.509447] kobject: 'loop4' (00000000181a4acc): kobject_uevent_env [ 2675.518894] kobject: 'loop4' (00000000181a4acc): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 2675.532177] kobject: 'loop2' (00000000ead5b122): kobject_uevent_env [ 2675.539455] kobject: 'loop2' (00000000ead5b122): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 2675.550387] kobject: 'loop0' (000000004b156a1a): kobject_uevent_env [ 2675.557428] kobject: 'loop0' (000000004b156a1a): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 2675.616235] ---[ end trace b9018e2fd2a0c07b ]--- [ 2675.621052] RIP: 0010:hci_uart_write_work+0x1b6/0x710 [ 2675.633274] Code: 0f 85 6a 04 00 00 49 8b b4 24 c8 00 00 00 4c 89 ef e8 fe 70 53 02 89 c6 48 8b 45 d0 48 8d b8 5c 10 00 00 48 89 f8 48 c1 e8 03 <0f> b6 14 18 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 1d [ 2675.634513] kobject: 'loop5' (00000000bcac7648): kobject_uevent_env [ 2675.658944] RSP: 0018:ffff88804f877cb0 EFLAGS: 00010203 [ 2675.658955] RAX: 000000000000020b RBX: dffffc0000000000 RCX: 0000000000000000 [ 2675.658962] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 000000000000105c [ 2675.658970] RBP: ffff88804f877d30 R08: ffff88808c470480 R09: ffff88808c470d48 [ 2675.658978] R10: 0000000000000000 R11: 0000000000000000 R12: ffff8880927f1800 [ 2675.658985] R13: ffff888051668940 R14: ffff88809f609aa8 R15: ffff8880927f1870 [ 2675.658996] FS: 0000000000000000(0000) GS:ffff8880ae800000(0000) knlGS:0000000000000000 [ 2675.659003] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2675.659011] CR2: 0000000000ae0fd0 CR3: 000000009650f000 CR4: 00000000001406f0 [ 2675.659023] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2675.659030] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2675.659040] Kernel panic - not syncing: Fatal exception [ 2675.682390] kobject: 'loop5' (00000000bcac7648): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 2675.687643] Kernel Offset: disabled [ 2675.756815] Rebooting in 86400 seconds..