b59da8da5aee925c02985413d12ada0259eeb38c2ca4c4142667cd29b840ddb761941e3715c8600e4164d0a", 0x9f}, {&(0x7f0000000500)="a7508142e6552a7598f5e3c0b4488b3ef98a6c4ed9d0ffa1f799293b1856e98cfc8edf6c4656c951b9f4f309519807af8196016a0d6a8323d786c32fbb8e3dd2f76f2e1cc6d6e0479a35bd50cda27724a65d066617f3cce5f8b9a96a0d8873279fd3f5260126415318e6dd1e54700b79aa056f261b", 0x75}], 0x4, &(0x7f0000000580)}, 0x40) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) (async) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendmsg$inet(r2, &(0x7f00000005c0)={&(0x7f0000000300)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000000480)=[{&(0x7f0000000340)="0b799c89d36801cdc67f05", 0xb}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="883d604e6bb60457a479fcac0ca7b1a76b38c5bf54c96fe9ee6f9a6d8b54faf37a130502df5482158d8bed1375e9a6016a36f558e52ff91f033d9911a946fbbdd9153d83acbb2f6c4c4fff77687abc49ab1ca3dcd4f88569098b468eadf2eaf63030ad4b6356f26058d28b964d81dd465067bd3b59da8da5aee925c02985413d12ada0259eeb38c2ca4c4142667cd29b840ddb761941e3715c8600e4164d0a", 0x9f}, {&(0x7f0000000500)="a7508142e6552a7598f5e3c0b4488b3ef98a6c4ed9d0ffa1f799293b1856e98cfc8edf6c4656c951b9f4f309519807af8196016a0d6a8323d786c32fbb8e3dd2f76f2e1cc6d6e0479a35bd50cda27724a65d066617f3cce5f8b9a96a0d8873279fd3f5260126415318e6dd1e54700b79aa056f261b", 0x75}], 0x4, &(0x7f0000000580)}, 0x40) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) 20:58:09 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="180000000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 956.048998][ T419] bridge0: port 13(team0) entered blocking state [ 956.049062][ T419] bridge0: port 13(team0) entered disabled state 20:58:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d00000cba8000001201", 0x2e}], 0x1}, 0x0) 20:58:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/15], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 956.072445][ T414] device team0 entered promiscuous mode [ 956.072462][ T414] device team_slave_0 entered promiscuous mode 20:58:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/13], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 956.072578][ T414] device team_slave_1 entered promiscuous mode 20:58:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000009ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:09 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000008ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:09 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000240)={0x8, 'ip6erspan0\x00', {'hsr0\x00'}, 0x9}) read$usbfs(r1, &(0x7f0000000300)=""/203, 0xcb) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x94) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:09 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/15], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 956.075252][ T414] bond0: (slave team0): Releasing backup interface [ 956.088061][ T414] bridge0: port 3(team0) entered blocking state [ 956.088125][ T414] bridge0: port 3(team0) entered disabled state [ 956.198279][ T429] device team0 left promiscuous mode [ 956.198297][ T429] device team_slave_1 left promiscuous mode [ 956.198581][ T429] bridge0: port 13(team0) entered disabled state 20:58:09 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/13], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) 20:58:09 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x9201000000000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 956.210063][ T429] 8021q: adding VLAN 0 to HW filter on device team0 20:58:09 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/15], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) 20:58:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000002ba8000001201", 0x2e}], 0x1}, 0x0) [ 956.244080][ T429] device team0 entered promiscuous mode [ 956.244097][ T429] device team_slave_1 entered promiscuous mode [ 956.247137][ T429] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000240)={0x8, 'ip6erspan0\x00', {'hsr0\x00'}, 0x9}) (async) read$usbfs(r1, &(0x7f0000000300)=""/203, 0xcb) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x94) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/15], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 956.280994][ T430] bond0: (slave team0): Releasing backup interface 20:58:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/16], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) 20:58:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d0000f0ba8000001201", 0x2e}], 0x1}, 0x0) [ 956.293489][ T430] bridge0: port 13(team0) entered blocking state [ 956.293548][ T430] bridge0: port 13(team0) entered disabled state 20:58:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x4000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/15], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 956.385960][T27409] usb 6-1: new high-speed USB device number 94 using dummy_hcd 20:58:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/16], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 956.625694][T27409] usb 6-1: Using ep0 maxpacket: 32 [ 956.748191][T27409] usb 6-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 20:58:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r0, 0x8983, &(0x7f0000000240)={0x8, 'ip6erspan0\x00', {'hsr0\x00'}, 0x9}) read$usbfs(r1, &(0x7f0000000300)=""/203, 0xcb) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x94) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 956.748248][T27409] usb 6-1: New USB device found, idVendor=0afa, idProduct=03e8, bcdDevice=f0.dd 20:58:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x400000000000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/15], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 956.748279][T27409] usb 6-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 20:58:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x8100) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 956.750388][T27409] usb 6-1: config 0 descriptor?? 20:58:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/16], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) 20:58:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffffff}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 957.239724][ T14] usb 6-1: USB disconnect, device number 94 [ 957.838504][ T444] device team0 left promiscuous mode 20:58:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed001b95"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 957.838519][ T444] device team_slave_1 left promiscuous mode 20:58:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/16], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 957.838785][ T444] bridge0: port 13(team0) entered disabled state [ 957.866162][ T444] 8021q: adding VLAN 0 to HW filter on device team0 20:58:10 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000074ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/16], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 957.876481][ T444] device team0 entered promiscuous mode [ 957.876498][ T444] device team_slave_1 entered promiscuous mode [ 957.877310][ T444] bond0: (slave team0): Enslaving as an active interface with an up link [ 957.877572][ T440] device team0 left promiscuous mode 20:58:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000068ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) 20:58:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0xffffffff}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 957.877586][ T440] device team_slave_0 left promiscuous mode [ 957.877720][ T440] device team_slave_1 left promiscuous mode [ 957.878029][ T440] bridge0: port 3(team0) entered disabled state 20:58:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed001b95"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 957.899236][ T440] 8021q: adding VLAN 0 to HW filter on device team0 20:58:10 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/16], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) 20:58:10 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) 20:58:10 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800"/16], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 957.910038][ T440] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:10 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed001b95"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:10 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0xffffff9e) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 957.969320][ T443] bond0: (slave team0): Releasing backup interface [ 957.977765][ T443] bridge0: port 13(team0) entered blocking state 20:58:10 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed001b95"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 957.977823][ T443] bridge0: port 13(team0) entered disabled state [ 957.979827][ T444] device team0 left promiscuous mode 20:58:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 957.979842][ T444] device team_slave_1 left promiscuous mode 20:58:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) 20:58:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d005865ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0xf00) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 957.980094][ T444] bridge0: port 13(team0) entered disabled state [ 957.986785][ T444] 8021q: adding VLAN 0 to HW filter on device team0 [ 957.987959][ T444] device team0 entered promiscuous mode 20:58:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x17, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="5208fba6ee203eda037b62c15d182263773aed63f3827926caf5424faaa0787820d3497d821d45acb61c29e872f7bd6c38f30ed0a85b2d98583b5290a7a9db0e6a2679998a05ff33099dd19ca07d2f1c44a164e130889978ad685f81aed09521e059cf1097a0c8aaeb82fc717fee6c5cbf52d3b500"/132], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r4 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) dup2(r3, r4) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='rpcb_unregister\x00'}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00'], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r7 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r8 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r6, r7, 0x12}, 0x10) r9 = dup2(r7, r8) ioctl$USBDEVFS_CONNECTINFO(r7, 0x40085511, &(0x7f0000000300)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r10}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r9, 0x8982, &(0x7f00000003c0)={0x0, 'veth1_to_team\x00', {}, 0x200}) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) 20:58:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000050ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 957.987972][ T444] device team_slave_1 entered promiscuous mode [ 957.988690][ T444] bond0: (slave team0): Enslaving as an active interface with an up link [ 958.141744][ T460] bond0: (slave team0): Releasing backup interface [ 958.143265][ T460] bridge0: port 13(team0) entered blocking state 20:58:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000048ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) 20:58:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 958.143457][ T460] bridge0: port 13(team0) entered disabled state [ 958.185880][ T456] validate_nla: 70 callbacks suppressed [ 958.185901][ T456] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 958.185922][ T456] device team0 entered promiscuous mode [ 958.185934][ T456] device team_slave_0 entered promiscuous mode 20:58:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 958.186077][ T456] device team_slave_1 entered promiscuous mode [ 958.200299][ T456] bond0: (slave team0): Releasing backup interface 20:58:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d00003fba8000001201", 0x2e}], 0x1}, 0x0) 20:58:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) 20:58:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async, rerun: 32) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async, rerun: 32) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x17, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="5208fba6ee203eda037b62c15d182263773aed63f3827926caf5424faaa0787820d3497d821d45acb61c29e872f7bd6c38f30ed0a85b2d98583b5290a7a9db0e6a2679998a05ff33099dd19ca07d2f1c44a164e130889978ad685f81aed09521e059cf1097a0c8aaeb82fc717fee6c5cbf52d3b500"/132], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r4 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) dup2(r3, r4) (async, rerun: 64) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='rpcb_unregister\x00'}, 0x10) (rerun: 64) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00'], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) (async) r7 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r8 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r6, r7, 0x12}, 0x10) r9 = dup2(r7, r8) (async) ioctl$USBDEVFS_CONNECTINFO(r7, 0x40085511, &(0x7f0000000300)) (async, rerun: 32) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async, rerun: 32) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 32) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r10}, 0x10) (async) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r9, 0x8982, &(0x7f00000003c0)={0x0, 'veth1_to_team\x00', {}, 0x200}) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 958.212094][ T456] bridge0: port 3(team0) entered blocking state [ 958.212718][ T456] bridge0: port 3(team0) entered disabled state 20:58:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x17, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="5208fba6ee203eda037b62c15d182263773aed63f3827926caf5424faaa0787820d3497d821d45acb61c29e872f7bd6c38f30ed0a85b2d98583b5290a7a9db0e6a2679998a05ff33099dd19ca07d2f1c44a164e130889978ad685f81aed09521e059cf1097a0c8aaeb82fc717fee6c5cbf52d3b500"/132], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r4 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) dup2(r3, r4) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='rpcb_unregister\x00'}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00'], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r7 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r8 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r6, r7, 0x12}, 0x10) r9 = dup2(r7, r8) ioctl$USBDEVFS_CONNECTINFO(r7, 0x40085511, &(0x7f0000000300)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r10}, 0x10) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r9, 0x8982, &(0x7f00000003c0)={0x0, 'veth1_to_team\x00', {}, 0x200}) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) 20:58:11 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000024ba8000001201", 0x2e}], 0x1}, 0x0) [ 958.214497][ T462] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 20:58:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) [ 958.214521][ T462] device team0 entered promiscuous mode [ 958.214534][ T462] device team_slave_0 entered promiscuous mode [ 958.214750][ T462] device team_slave_1 entered promiscuous mode 20:58:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x17, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="5208fba6ee203eda037b62c15d182263773aed63f3827926caf5424faaa0787820d3497d821d45acb61c29e872f7bd6c38f30ed0a85b2d98583b5290a7a9db0e6a2679998a05ff33099dd19ca07d2f1c44a164e130889978ad685f81aed09521e059cf1097a0c8aaeb82fc717fee6c5cbf52d3b500"/132], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, 0x26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r4 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) dup2(r3, r4) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000002c0)='rpcb_unregister\x00'}, 0x10) ioctl$LOOP_CHANGE_FD(r3, 0x4c06, r5) (async) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00'], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) (async) r7 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r8 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r6, r7, 0x12}, 0x10) r9 = dup2(r7, r8) (async) ioctl$USBDEVFS_CONNECTINFO(r7, 0x40085511, &(0x7f0000000300)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r10}, 0x10) (async) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r9, 0x8982, &(0x7f00000003c0)={0x0, 'veth1_to_team\x00', {}, 0x200}) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 958.216664][ T462] bond0: (slave team0): Releasing backup interface [ 958.218144][ T462] bridge0: port 3(team0) entered blocking state [ 958.218204][ T462] bridge0: port 3(team0) entered disabled state 20:58:11 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000012ba8000001201", 0x2e}], 0x1}, 0x0) [ 958.416628][ T480] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 20:58:11 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) [ 958.416933][ T480] device team0 left promiscuous mode 20:58:11 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 20:58:11 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x6) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:11 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0xf) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0xf) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 958.416946][ T480] device team_slave_1 left promiscuous mode [ 958.417220][ T480] bridge0: port 13(team0) entered disabled state [ 958.447825][ T480] 8021q: adding VLAN 0 to HW filter on device team0 20:58:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) [ 958.455067][ T480] device team0 entered promiscuous mode [ 958.455088][ T480] device team_slave_1 entered promiscuous mode 20:58:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 20:58:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d00000eba8000001201", 0x2e}], 0x1}, 0x0) 20:58:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x6000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 958.461084][ T480] bond0: (slave team0): Enslaving as an active interface with an up link [ 958.461223][ T474] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 20:58:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d00000cba8000001201", 0x2e}], 0x1}, 0x0) [ 958.461390][ T474] device team0 left promiscuous mode [ 958.461403][ T474] device team_slave_0 left promiscuous mode 20:58:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r4, 0x12}, 0x10) 20:58:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) [ 958.461544][ T474] device team_slave_1 left promiscuous mode [ 958.461812][ T474] bridge0: port 3(team0) entered disabled state 20:58:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x6) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 958.465243][ T474] 8021q: adding VLAN 0 to HW filter on device team0 [ 958.484532][ T474] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x6) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r4, 0x12}, 0x10) 20:58:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x6) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 958.484620][ T481] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 958.484806][ T481] device team0 left promiscuous mode [ 958.484818][ T481] device team_slave_0 left promiscuous mode 20:58:12 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) 20:58:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, 0x0, 0x0) [ 958.484955][ T481] device team_slave_1 left promiscuous mode [ 958.485269][ T481] bridge0: port 3(team0) entered disabled state [ 958.489011][ T481] 8021q: adding VLAN 0 to HW filter on device team0 20:58:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r4, 0x12}, 0x10) [ 958.490315][ T481] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:12 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d00940bba8000001201", 0x2e}], 0x1}, 0x0) 20:58:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r4, 0x12}, 0x10) [ 958.490370][ T485] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 958.490402][ T485] device team0 entered promiscuous mode 20:58:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) r2 = socket$nl_route(0x10, 0x3, 0x0) (async) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) ioctl$AUTOFS_IOC_FAIL(r2, 0x9361, 0x6) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 958.490414][ T485] device team_slave_0 entered promiscuous mode 20:58:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, 0xffffffffffffffff, 0x12}, 0x10) 20:58:12 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d00000aba8000001201", 0x2e}], 0x1}, 0x0) [ 958.490533][ T485] device team_slave_1 entered promiscuous mode [ 958.511109][ T485] bond0: (slave team0): Releasing backup interface [ 958.623762][ T485] bridge0: port 3(team0) entered blocking state 20:58:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r4, 0x12}, 0x10) [ 958.623827][ T485] bridge0: port 3(team0) entered disabled state 20:58:12 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, 0xffffffffffffffff, 0x12}, 0x10) 20:58:12 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000009ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:12 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) epoll_create1(0x80000) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x1, 0x4, 0x2, 0x1, {0xa, 0x4e23, 0x200, @remote, 0x8}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000940)=ANY=[@ANYRESDEC=0x0], 0x218}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8982, &(0x7f0000000100)={0x8, 'macvlan1\x00', {'veth0_virt_wifi\x00'}, 0x2799}) r4 = accept4$inet6(r2, 0x0, &(0x7f0000000300), 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000340)="0b90183d74747be1a60acac5c1c7be23722c", 0x12}, {&(0x7f0000000380)="193418eaa740bdf826cf63ee7cb4", 0xe}], 0x2) [ 958.628995][ T491] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 958.650173][ T498] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 20:58:12 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={0xffffffffffffffff, r4, 0x12}, 0x10) 20:58:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0x6558}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 958.651269][ T498] bond0: (slave team0): Releasing backup interface 20:58:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, 0xffffffffffffffff, 0x12}, 0x10) [ 958.653074][ T498] bridge0: port 13(team0) entered blocking state [ 958.653135][ T498] bridge0: port 13(team0) entered disabled state [ 958.672201][ T491] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 20:58:13 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, 0xffffffffffffffff, 0x12}, 0x10) 20:58:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) epoll_create1(0x80000) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x1, 0x4, 0x2, 0x1, {0xa, 0x4e23, 0x200, @remote, 0x8}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000940)=ANY=[@ANYRESDEC=0x0], 0x218}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8982, &(0x7f0000000100)={0x8, 'macvlan1\x00', {'veth0_virt_wifi\x00'}, 0x2799}) r4 = accept4$inet6(r2, 0x0, &(0x7f0000000300), 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000340)="0b90183d74747be1a60acac5c1c7be23722c", 0x12}, {&(0x7f0000000380)="193418eaa740bdf826cf63ee7cb4", 0xe}], 0x2) socket$kcm(0x10, 0x2, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) epoll_create1(0x80000) (async) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x1, 0x4, 0x2, 0x1, {0xa, 0x4e23, 0x200, @remote, 0x8}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000940)=ANY=[@ANYRESDEC=0x0], 0x218}, 0x0) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8982, &(0x7f0000000100)={0x8, 'macvlan1\x00', {'veth0_virt_wifi\x00'}, 0x2799}) (async) accept4$inet6(r2, 0x0, &(0x7f0000000300), 0x0) (async) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000340)="0b90183d74747be1a60acac5c1c7be23722c", 0x12}, {&(0x7f0000000380)="193418eaa740bdf826cf63ee7cb4", 0xe}], 0x2) (async) [ 958.848732][ T513] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 20:58:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) epoll_create1(0x80000) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x1, 0x4, 0x2, 0x1, {0xa, 0x4e23, 0x200, @remote, 0x8}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000940)=ANY=[@ANYRESDEC=0x0], 0x218}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8982, &(0x7f0000000100)={0x8, 'macvlan1\x00', {'veth0_virt_wifi\x00'}, 0x2799}) r4 = accept4$inet6(r2, 0x0, &(0x7f0000000300), 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000340)="0b90183d74747be1a60acac5c1c7be23722c", 0x12}, {&(0x7f0000000380)="193418eaa740bdf826cf63ee7cb4", 0xe}], 0x2) 20:58:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5}, 0x10) 20:58:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0x2000000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 958.848915][ T513] device team0 left promiscuous mode 20:58:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, 0xffffffffffffffff, 0x12}, 0x10) [ 958.848929][ T513] device team_slave_1 left promiscuous mode [ 958.849297][ T513] bridge0: port 13(team0) entered disabled state [ 958.911466][ T513] 8021q: adding VLAN 0 to HW filter on device team0 20:58:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5}, 0x10) 20:58:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, 0xffffffffffffffff, 0x12}, 0x10) 20:58:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000007ba8000001201", 0x2e}], 0x1}, 0x0) [ 958.912831][ T513] device team0 entered promiscuous mode [ 958.912846][ T513] device team_slave_1 entered promiscuous mode [ 958.913741][ T513] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0xf0ffff}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) epoll_create1(0x80000) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x1, 0x4, 0x2, 0x1, {0xa, 0x4e23, 0x200, @remote, 0x8}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000940)=ANY=[@ANYRESDEC=0x0], 0x218}, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8982, &(0x7f0000000100)={0x8, 'macvlan1\x00', {'veth0_virt_wifi\x00'}, 0x2799}) r4 = accept4$inet6(r2, 0x0, &(0x7f0000000300), 0x0) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000340)="0b90183d74747be1a60acac5c1c7be23722c", 0x12}, {&(0x7f0000000380)="193418eaa740bdf826cf63ee7cb4", 0xe}], 0x2) socket$kcm(0x10, 0x2, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) epoll_create1(0x80000) (async) sendmsg$kcm(r0, &(0x7f0000000400)={&(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x1, 0x4, 0x2, 0x1, {0xa, 0x4e23, 0x200, @remote, 0x8}}}, 0x80, &(0x7f0000000100), 0x0, &(0x7f0000000940)=ANY=[@ANYRESDEC=0x0], 0x218}, 0x0) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8982, &(0x7f0000000100)={0x8, 'macvlan1\x00', {'veth0_virt_wifi\x00'}, 0x2799}) (async) accept4$inet6(r2, 0x0, &(0x7f0000000300), 0x0) (async) writev(r4, &(0x7f00000003c0)=[{&(0x7f0000000340)="0b90183d74747be1a60acac5c1c7be23722c", 0x12}, {&(0x7f0000000380)="193418eaa740bdf826cf63ee7cb4", 0xe}], 0x2) (async) 20:58:13 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5}, 0x10) [ 958.996478][ T521] device team0 entered promiscuous mode [ 958.996496][ T521] device team_slave_0 entered promiscuous mode 20:58:13 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000005ba8000001201", 0x2e}], 0x1}, 0x0) [ 958.996639][ T521] device team_slave_1 entered promiscuous mode 20:58:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, 0xffffffffffffffff, 0x12}, 0x10) 20:58:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0x700}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 958.997719][ T521] bond0: (slave team0): Releasing backup interface [ 959.008473][ T521] bridge0: port 3(team0) entered blocking state [ 959.012556][ T521] bridge0: port 3(team0) entered disabled state 20:58:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 959.358277][ T558] bond0: (slave team0): Releasing backup interface [ 959.360170][ T558] bridge0: port 13(team0) entered blocking state 20:58:13 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d007400ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:13 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5}, 0x10) [ 959.360308][ T558] bridge0: port 13(team0) entered disabled state 20:58:13 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d006c00ba8000001201", 0x2e}], 0x1}, 0x0) [ 959.541605][ T573] device team0 left promiscuous mode [ 959.541622][ T573] device team_slave_1 left promiscuous mode [ 959.541893][ T573] bridge0: port 13(team0) entered disabled state [ 959.562743][ T573] 8021q: adding VLAN 0 to HW filter on device team0 [ 959.599346][ T573] device team0 entered promiscuous mode 20:58:13 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000100000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 959.599364][ T573] device team_slave_1 entered promiscuous mode 20:58:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0xfcffffff}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d006800ba8000001201", 0x2e}], 0x1}, 0x0) [ 959.600161][ T573] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5}, 0x10) 20:58:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d006800ba8000001201", 0x2e}], 0x1}, 0x0) [ 959.600488][ T572] device team0 left promiscuous mode 20:58:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0x600}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 959.600502][ T572] device team_slave_0 left promiscuous mode [ 959.600717][ T572] device team_slave_1 left promiscuous mode 20:58:14 executing program 0: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5}, 0x10) [ 959.600999][ T572] bridge0: port 3(team0) entered disabled state [ 959.650881][ T572] 8021q: adding VLAN 0 to HW filter on device team0 20:58:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0x10000000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000100000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 959.652390][ T572] bond0: (slave team0): Enslaving as an active interface with an up link [ 959.652888][ T575] device team0 left promiscuous mode [ 959.652902][ T575] device team_slave_0 left promiscuous mode 20:58:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d004800ba8000001201", 0x2e}], 0x1}, 0x0) [ 959.653040][ T575] device team_slave_1 left promiscuous mode 20:58:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d002400ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d002400ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000700ba8000001201", 0x2e}], 0x1}, 0x0) [ 959.653338][ T575] bridge0: port 3(team0) entered disabled state [ 959.688528][ T575] 8021q: adding VLAN 0 to HW filter on device team0 20:58:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000100000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 959.689937][ T575] bond0: (slave team0): Enslaving as an active interface with an up link [ 959.695004][ T579] device team0 entered promiscuous mode [ 959.695020][ T579] device team_slave_0 entered promiscuous mode 20:58:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000700ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0xa00}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 959.695174][ T579] device team_slave_1 entered promiscuous mode [ 959.715666][ T579] bond0: (slave team0): Releasing backup interface [ 959.725246][ T579] bridge0: port 3(team0) entered blocking state [ 959.751721][ T579] bridge0: port 3(team0) entered disabled state 20:58:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000e6ffffffffffffffed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) accept4$phonet_pipe(r1, &(0x7f00000002c0), &(0x7f0000000300)=0x10, 0x0) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r1, 0xc01064c1, &(0x7f0000000340)={0x0, 0x1, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r7) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map=r5, r1, 0x1a, 0x0, r2}, 0x14) sendmsg$nl_route(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYRES16=0x0, @ANYRESHEX=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x5, {0x0, 0x0, 0x0, r8, {0x0, 0xa}, {0xffff, 0x3}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="7f0000002c00270d00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000b00070000000a0001006261736963070000000002001c000280100002800c00000000000700000000000800010000002de8"], 0x50}}, 0x0) r9 = fcntl$dupfd(r0, 0x406, r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r9}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000400ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000300ba8000001201", 0x2e}], 0x1}, 0x0) [ 959.763381][ T580] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0xf0ffffff00000000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 959.962523][ T598] bond0: (slave team0): Releasing backup interface [ 959.964287][ T598] bridge0: port 13(team0) entered blocking state [ 959.964417][ T598] bridge0: port 13(team0) entered disabled state [ 959.998857][ T598] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:58:14 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d00f000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d008100ba8000001201", 0x2e}], 0x1}, 0x0) [ 959.999295][ T598] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 960.182070][ T617] device team0 left promiscuous mode 20:58:14 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d007a00ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.182085][ T617] device team_slave_1 left promiscuous mode 20:58:14 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0xa}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 960.182352][ T617] bridge0: port 13(team0) entered disabled state 20:58:14 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async, rerun: 64) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async, rerun: 64) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000e6ffffffffffffffed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) accept4$phonet_pipe(r1, &(0x7f00000002c0), &(0x7f0000000300)=0x10, 0x0) (async, rerun: 32) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r1, 0xc01064c1, &(0x7f0000000340)={0x0, 0x1, 0xffffffffffffffff}) (async, rerun: 32) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) (async) r7 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r7) (async) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map=r5, r1, 0x1a, 0x0, r2}, 0x14) (async) sendmsg$nl_route(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYRES16=0x0, @ANYRESHEX=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x5, {0x0, 0x0, 0x0, r8, {0x0, 0xa}, {0xffff, 0x3}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="7f0000002c00270d00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000b00070000000a0001006261736963070000000002001c000280100002800c00000000000700000000000800010000002de8"], 0x50}}, 0x0) (async, rerun: 32) r9 = fcntl$dupfd(r0, 0x406, r4) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r9}, 0x10) (async, rerun: 64) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (rerun: 64) 20:58:14 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d0c7500ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.222171][ T617] 8021q: adding VLAN 0 to HW filter on device team0 [ 960.226137][ T617] device team0 entered promiscuous mode 20:58:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0xf0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 960.226152][ T617] device team_slave_1 entered promiscuous mode [ 960.228282][ T617] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d006c00ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d006800ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.239718][ T617] bond0: (slave team0): Releasing backup interface 20:58:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800000000e6ffffffffffffffed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) accept4$phonet_pipe(r1, &(0x7f00000002c0), &(0x7f0000000300)=0x10, 0x0) (async) ioctl$DRM_IOCTL_SYNCOBJ_HANDLE_TO_FD_SYNC_FILE(r1, 0xc01064c1, &(0x7f0000000340)={0x0, 0x1, 0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) (async) r5 = socket(0x10, 0x3, 0x0) (async) r6 = socket$nl_route(0x10, 0x3, 0x0) (async) r7 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r7) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000540)=0x14) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000380)={@map=r5, r1, 0x1a, 0x0, r2}, 0x14) (async, rerun: 64) sendmsg$nl_route(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000500)=ANY=[@ANYRES16=0x0, @ANYRESHEX=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x0) (rerun: 64) sendmsg$nl_route_sched(r5, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x5, {0x0, 0x0, 0x0, r8, {0x0, 0xa}, {0xffff, 0x3}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=ANY=[@ANYBLOB="7f0000002c00270d00"/20, @ANYRES32=r8, @ANYBLOB="0000000000000b00070000000a0001006261736963070000000002001c000280100002800c00000000000700000000000800010000002de8"], 0x50}}, 0x0) (async) r9 = fcntl$dupfd(r0, 0x406, r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r9}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.302575][ T617] bridge0: port 13(team0) entered blocking state [ 960.302634][ T617] bridge0: port 13(team0) entered disabled state 20:58:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d586500ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.309534][ T626] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 960.314225][ T617] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 960.404716][ T636] device team0 left promiscuous mode 20:58:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, r5, 0x0, 0x2, 0x4, 0x2, {0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, '\x00', 0x2a}, 0x17}}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000003c0)="6d6ff6335cb43c638641cc02a08a9e03b3499acb1e3cc1905f0f2bf2", 0x1c}, {&(0x7f0000000400)="e210f17572f3427980576c2de24d9961edfebae00388145dcfd8b9be0daa031909a43c28851ca8b3b661bd19ab165ff9e211e1ac10adf94a2a4534a7778a661a0024622e96a1030d0390da32c4635ce258c731203509e28cdc0956686dc42c8c2ca27a68ced44bb0", 0x68}, {&(0x7f0000000500)="e2f7252093aaed445f2fcae799b4752cdbe1022f9979d856da3235ff44bf3ab6a2206aabc00c97abea9b75faac0f8cfcb6f4bdb543a2b1f57bf6881e6bef53cb8c9f9084312eb9d04d7a", 0x4a}], 0x3, &(0x7f0000000640)=[{0xa0, 0x109, 0x8001, "6fbc69ea05107b48915b98f513ba9e4ce595c437a68975ea4c22b9a71f5266d0a4b4135603d246c60ce49f4ee79c769e51c21a7a273c6211f2ade0e0b90dc502d2c6a8ecddf38942164d18404449f12e60e293873f8aceb6f99ed2a41084d11a52f2e4e3a4df13d7745cda52c5fc722785f9e2ab0d59049d55b456761267f5d1a7c15d9193b8d83c2ec66b651a3dbd"}, {0x10, 0x10e, 0xba}, {0x110, 0x3a, 0x7ff, "a8e31da53776a6a0c8fcbd128199022e8904ff9b4701916c753a5f94d70d4f5b10ccab039afda490fced422ff98325141788ec28fb04a99b777328703e795616d10159fc948f7fca219e86f058c6ed99e94979500bec6c2a7db4ccc57cf62daa4cd563cf7b5b5372f244a86fee27a557f6223792484ad1c08572dc552a0d50a4c9f3f0b5daa6ec2d4bc414d79a07c6fda5b32a919fe4390edf86dc1af9bd65adbe864165bf4a74133bcfbf416a8e59258d5e6a1678c518066928b5d2e852d3ae650f767c678d84a7553b8584a720ad7e4be7cbb6f6bf34f3a583393645314f26073de052592a5c01c0f0e482edf0a2e4cbb1212f4d760bb330"}], 0x1c0}, 0x4004000) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r6}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) creat(&(0x7f0000000300)='./file0\x00', 0x180) 20:58:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0xa}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d655800ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.404732][ T636] device team_slave_1 left promiscuous mode [ 960.404998][ T636] bridge0: port 13(team0) entered disabled state [ 960.410681][ T636] 8021q: adding VLAN 0 to HW filter on device team0 [ 960.411837][ T636] device team0 entered promiscuous mode [ 960.411850][ T636] device team_slave_1 entered promiscuous mode [ 960.412655][ T636] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0xfffffff0}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0x5}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d004c00ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.421526][ T629] device team0 entered promiscuous mode [ 960.421542][ T629] device team_slave_0 entered promiscuous mode [ 960.421682][ T629] device team_slave_1 entered promiscuous mode [ 960.434193][ T629] bond0: (slave team0): Releasing backup interface 20:58:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d004c00ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x88a8ffff}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 960.446316][ T629] bridge0: port 3(team0) entered blocking state [ 960.446457][ T629] bridge0: port 3(team0) entered disabled state 20:58:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async, rerun: 32) r2 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 32) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) (async) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, r5, 0x0, 0x2, 0x4, 0x2, {0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, '\x00', 0x2a}, 0x17}}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000003c0)="6d6ff6335cb43c638641cc02a08a9e03b3499acb1e3cc1905f0f2bf2", 0x1c}, {&(0x7f0000000400)="e210f17572f3427980576c2de24d9961edfebae00388145dcfd8b9be0daa031909a43c28851ca8b3b661bd19ab165ff9e211e1ac10adf94a2a4534a7778a661a0024622e96a1030d0390da32c4635ce258c731203509e28cdc0956686dc42c8c2ca27a68ced44bb0", 0x68}, {&(0x7f0000000500)="e2f7252093aaed445f2fcae799b4752cdbe1022f9979d856da3235ff44bf3ab6a2206aabc00c97abea9b75faac0f8cfcb6f4bdb543a2b1f57bf6881e6bef53cb8c9f9084312eb9d04d7a", 0x4a}], 0x3, &(0x7f0000000640)=[{0xa0, 0x109, 0x8001, "6fbc69ea05107b48915b98f513ba9e4ce595c437a68975ea4c22b9a71f5266d0a4b4135603d246c60ce49f4ee79c769e51c21a7a273c6211f2ade0e0b90dc502d2c6a8ecddf38942164d18404449f12e60e293873f8aceb6f99ed2a41084d11a52f2e4e3a4df13d7745cda52c5fc722785f9e2ab0d59049d55b456761267f5d1a7c15d9193b8d83c2ec66b651a3dbd"}, {0x10, 0x10e, 0xba}, {0x110, 0x3a, 0x7ff, "a8e31da53776a6a0c8fcbd128199022e8904ff9b4701916c753a5f94d70d4f5b10ccab039afda490fced422ff98325141788ec28fb04a99b777328703e795616d10159fc948f7fca219e86f058c6ed99e94979500bec6c2a7db4ccc57cf62daa4cd563cf7b5b5372f244a86fee27a557f6223792484ad1c08572dc552a0d50a4c9f3f0b5daa6ec2d4bc414d79a07c6fda5b32a919fe4390edf86dc1af9bd65adbe864165bf4a74133bcfbf416a8e59258d5e6a1678c518066928b5d2e852d3ae650f767c678d84a7553b8584a720ad7e4be7cbb6f6bf34f3a583393645314f26073de052592a5c01c0f0e482edf0a2e4cbb1212f4d760bb330"}], 0x1c0}, 0x4004000) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async, rerun: 32) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async, rerun: 32) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r6}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) creat(&(0x7f0000000300)='./file0\x00', 0x180) 20:58:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000f00ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:15 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000f00ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.450227][ T632] device team0 left promiscuous mode 20:58:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000e00ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x10000000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 960.450244][ T632] device team_slave_0 left promiscuous mode [ 960.450394][ T632] device team_slave_1 left promiscuous mode [ 960.450691][ T632] bridge0: port 3(team0) entered disabled state [ 960.453961][ T632] 8021q: adding VLAN 0 to HW filter on device team0 20:58:15 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d940b00ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.492338][ T632] bond0: (slave team0): Enslaving as an active interface with an up link [ 960.495169][ T629] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:15 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) r2 = socket$nl_route(0x10, 0x3, 0x0) (async) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r4, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) (async) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) (async) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000340)=@pppol2tpin6={0x18, 0x1, {0x0, r5, 0x0, 0x2, 0x4, 0x2, {0xa, 0x4e20, 0x2, @dev={0xfe, 0x80, '\x00', 0x2a}, 0x17}}}, 0x80, &(0x7f0000000480)=[{&(0x7f00000003c0)="6d6ff6335cb43c638641cc02a08a9e03b3499acb1e3cc1905f0f2bf2", 0x1c}, {&(0x7f0000000400)="e210f17572f3427980576c2de24d9961edfebae00388145dcfd8b9be0daa031909a43c28851ca8b3b661bd19ab165ff9e211e1ac10adf94a2a4534a7778a661a0024622e96a1030d0390da32c4635ce258c731203509e28cdc0956686dc42c8c2ca27a68ced44bb0", 0x68}, {&(0x7f0000000500)="e2f7252093aaed445f2fcae799b4752cdbe1022f9979d856da3235ff44bf3ab6a2206aabc00c97abea9b75faac0f8cfcb6f4bdb543a2b1f57bf6881e6bef53cb8c9f9084312eb9d04d7a", 0x4a}], 0x3, &(0x7f0000000640)=[{0xa0, 0x109, 0x8001, "6fbc69ea05107b48915b98f513ba9e4ce595c437a68975ea4c22b9a71f5266d0a4b4135603d246c60ce49f4ee79c769e51c21a7a273c6211f2ade0e0b90dc502d2c6a8ecddf38942164d18404449f12e60e293873f8aceb6f99ed2a41084d11a52f2e4e3a4df13d7745cda52c5fc722785f9e2ab0d59049d55b456761267f5d1a7c15d9193b8d83c2ec66b651a3dbd"}, {0x10, 0x10e, 0xba}, {0x110, 0x3a, 0x7ff, "a8e31da53776a6a0c8fcbd128199022e8904ff9b4701916c753a5f94d70d4f5b10ccab039afda490fced422ff98325141788ec28fb04a99b777328703e795616d10159fc948f7fca219e86f058c6ed99e94979500bec6c2a7db4ccc57cf62daa4cd563cf7b5b5372f244a86fee27a557f6223792484ad1c08572dc552a0d50a4c9f3f0b5daa6ec2d4bc414d79a07c6fda5b32a919fe4390edf86dc1af9bd65adbe864165bf4a74133bcfbf416a8e59258d5e6a1678c518066928b5d2e852d3ae650f767c678d84a7553b8584a720ad7e4be7cbb6f6bf34f3a583393645314f26073de052592a5c01c0f0e482edf0a2e4cbb1212f4d760bb330"}], 0x1c0}, 0x4004000) (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r6}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) creat(&(0x7f0000000300)='./file0\x00', 0x180) 20:58:15 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x0, 0xa}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:15 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000500ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.496105][ T629] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0xf0ffffffffffff}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 960.579683][ T649] bond0: (slave team0): Releasing backup interface 20:58:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000df00000ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.600149][ T649] bridge0: port 13(team0) entered blocking state [ 960.600351][ T649] bridge0: port 13(team0) entered disabled state 20:58:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/unix\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0xffffff9e}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 960.605959][ T632] device team0 entered promiscuous mode [ 960.605975][ T632] device team_slave_0 entered promiscuous mode 20:58:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d7a0000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0xfffffffc}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d740000ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.606107][ T632] device team_slave_1 entered promiscuous mode [ 960.614213][ T632] bond0: (slave team0): Releasing backup interface 20:58:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d6c0000ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.627244][ T632] bridge0: port 3(team0) entered blocking state [ 960.627303][ T632] bridge0: port 3(team0) entered disabled state 20:58:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d500000ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.708296][ T641] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. 20:58:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async, rerun: 64) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/unix\x00') (rerun: 64) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async, rerun: 32) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async, rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/unix\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d500000ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.787799][ T662] device team0 left promiscuous mode 20:58:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d4c0000ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.787817][ T662] device team_slave_1 left promiscuous mode [ 960.789277][ T662] bridge0: port 13(team0) entered disabled state [ 960.808872][ T662] 8021q: adding VLAN 0 to HW filter on device team0 [ 960.821675][ T662] device team0 entered promiscuous mode [ 960.821692][ T662] device team_slave_1 entered promiscuous mode 20:58:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='net/unix\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d480000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d240000ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.822556][ T662] bond0: (slave team0): Enslaving as an active interface with an up link [ 960.838677][ T665] bond0: (slave team0): Releasing backup interface 20:58:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0xf00000000000000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:16 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d100000ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.866397][ T665] bridge0: port 13(team0) entered blocking state [ 960.866461][ T665] bridge0: port 13(team0) entered disabled state 20:58:16 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d0a0000ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.994249][ T678] device team0 left promiscuous mode 20:58:16 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x0, 'wg2\x00', {0x3}, 0x3}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYRES16=r0], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.994266][ T678] device team_slave_1 left promiscuous mode 20:58:16 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d090000ba8000001201", 0x2e}], 0x1}, 0x0) [ 960.994537][ T678] bridge0: port 13(team0) entered disabled state [ 961.018719][ T678] 8021q: adding VLAN 0 to HW filter on device team0 [ 961.041664][ T678] device team0 entered promiscuous mode [ 961.041681][ T678] device team_slave_1 entered promiscuous mode [ 961.042511][ T678] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:16 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x9}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 961.042771][ T680] device team0 left promiscuous mode 20:58:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x5000000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 961.042786][ T680] device team_slave_0 left promiscuous mode [ 961.042928][ T680] device team_slave_1 left promiscuous mode [ 961.043212][ T680] bridge0: port 3(team0) entered disabled state 20:58:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d070000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:17 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x0, 'wg2\x00', {0x3}, 0x3}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYRES16=r0], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x0, 'wg2\x00', {0x3}, 0x3}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYRES16=r0], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.057908][ T680] 8021q: adding VLAN 0 to HW filter on device team0 [ 961.059294][ T680] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d060000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d050000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.060612][ T678] bond0: (slave team0): Releasing backup interface [ 961.080132][ T678] bridge0: port 13(team0) entered blocking state [ 961.080194][ T678] bridge0: port 13(team0) entered disabled state [ 961.141809][ T680] device team0 entered promiscuous mode [ 961.141828][ T680] device team_slave_0 entered promiscuous mode 20:58:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d050000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:17 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8982, &(0x7f0000000100)={0x0, 'wg2\x00', {0x3}, 0x3}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYRES16=r0], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x2, '\x00', 0x0, 0x0, r1, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x406, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.141967][ T680] device team_slave_1 entered promiscuous mode [ 961.183026][ T680] bond0: (slave team0): Releasing backup interface 20:58:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d030000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d030000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.194144][ T680] bridge0: port 3(team0) entered blocking state 20:58:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d020000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.194205][ T680] bridge0: port 3(team0) entered disabled state [ 961.196985][ T698] device team0 left promiscuous mode 20:58:17 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000005c0)={&(0x7f0000000300)=@nl=@kern={0x10, 0x0, 0x0, 0x800}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000380)="82946118b41ec00c67ef5ed48699d15fe07ae4fa18ca6273976839131214c6beafb43b3f4f632782d99b9b48729dd58213520417642c39fcaa4eda551ec8507e23e6f5718ef6da0be44db4e53d7fc53d77f57e259a0699df417cedcf2c", 0x5d}, {&(0x7f0000000400)="4c58a142e8e2b094973f66a652e5bb29314178a3a13b645bcfd7d3e456086ad0082e9ad491a9b10e8c65a606b9dc7373c84e34d53752a0faede4ae1be8573c70543df5d06389c9fc477b6d2f846bac02bbcddb07f2833ec4d756be05aac43b47b488bc9c16864448", 0x68}], 0x2, &(0x7f0000000500)=[{0xb0, 0x105, 0x3, "0b2ca988ba9f482b6727d0edd200c4ed7b3eabfcf3e9d7c85316f9c91691b2eb3da2c388e73e1960e0eae34e770d28b6c226fed7a2155920839872c32f53e85a1ade0b817b2b2e93c80460b9060843642f43278c9dd162c8e5fc19925d1a4bb5cccab50681f0d7cef745f62f929dece31a23f8319df35d8f540d82ce49ee3351e1500468e60da5cac06db6df5bc02f46c9540febf4ac6f0eab6664ed920a32c6"}], 0xb0}, 0x40001) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000020008000001201", 0x2e}], 0x1}, 0x0) [ 961.197000][ T698] device team_slave_0 left promiscuous mode [ 961.197137][ T698] device team_slave_1 left promiscuous mode 20:58:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x7ffff000}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 961.197378][ T698] bridge0: port 3(team0) entered disabled state [ 961.301110][ T698] 8021q: adding VLAN 0 to HW filter on device team0 20:58:17 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000004008000001201", 0x2e}], 0x1}, 0x0) [ 961.321877][ T698] bond0: (slave team0): Enslaving as an active interface with an up link [ 961.327791][ T708] device team0 left promiscuous mode [ 961.327807][ T708] device team_slave_1 left promiscuous mode [ 961.328104][ T708] bridge0: port 13(team0) entered disabled state 20:58:17 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a0000200000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:17 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a0025000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:17 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x33fe0}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:17 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a0024000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:17 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000005c0)={&(0x7f0000000300)=@nl=@kern={0x10, 0x0, 0x0, 0x800}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000380)="82946118b41ec00c67ef5ed48699d15fe07ae4fa18ca6273976839131214c6beafb43b3f4f632782d99b9b48729dd58213520417642c39fcaa4eda551ec8507e23e6f5718ef6da0be44db4e53d7fc53d77f57e259a0699df417cedcf2c", 0x5d}, {&(0x7f0000000400)="4c58a142e8e2b094973f66a652e5bb29314178a3a13b645bcfd7d3e456086ad0082e9ad491a9b10e8c65a606b9dc7373c84e34d53752a0faede4ae1be8573c70543df5d06389c9fc477b6d2f846bac02bbcddb07f2833ec4d756be05aac43b47b488bc9c16864448", 0x68}], 0x2, &(0x7f0000000500)=[{0xb0, 0x105, 0x3, "0b2ca988ba9f482b6727d0edd200c4ed7b3eabfcf3e9d7c85316f9c91691b2eb3da2c388e73e1960e0eae34e770d28b6c226fed7a2155920839872c32f53e85a1ade0b817b2b2e93c80460b9060843642f43278c9dd162c8e5fc19925d1a4bb5cccab50681f0d7cef745f62f929dece31a23f8319df35d8f540d82ce49ee3351e1500468e60da5cac06db6df5bc02f46c9540febf4ac6f0eab6664ed920a32c6"}], 0xb0}, 0x40001) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000005c0)={&(0x7f0000000300)=@nl=@kern={0x10, 0x0, 0x0, 0x800}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000380)="82946118b41ec00c67ef5ed48699d15fe07ae4fa18ca6273976839131214c6beafb43b3f4f632782d99b9b48729dd58213520417642c39fcaa4eda551ec8507e23e6f5718ef6da0be44db4e53d7fc53d77f57e259a0699df417cedcf2c", 0x5d}, {&(0x7f0000000400)="4c58a142e8e2b094973f66a652e5bb29314178a3a13b645bcfd7d3e456086ad0082e9ad491a9b10e8c65a606b9dc7373c84e34d53752a0faede4ae1be8573c70543df5d06389c9fc477b6d2f846bac02bbcddb07f2833ec4d756be05aac43b47b488bc9c16864448", 0x68}], 0x2, &(0x7f0000000500)=[{0xb0, 0x105, 0x3, "0b2ca988ba9f482b6727d0edd200c4ed7b3eabfcf3e9d7c85316f9c91691b2eb3da2c388e73e1960e0eae34e770d28b6c226fed7a2155920839872c32f53e85a1ade0b817b2b2e93c80460b9060843642f43278c9dd162c8e5fc19925d1a4bb5cccab50681f0d7cef745f62f929dece31a23f8319df35d8f540d82ce49ee3351e1500468e60da5cac06db6df5bc02f46c9540febf4ac6f0eab6664ed920a32c6"}], 0xb0}, 0x40001) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) [ 961.356346][ T708] 8021q: adding VLAN 0 to HW filter on device team0 [ 961.357459][ T708] device team0 entered promiscuous mode [ 961.357473][ T708] device team_slave_1 entered promiscuous mode [ 961.366729][ T708] bond0: (slave team0): Enslaving as an active interface with an up link [ 961.368043][ T698] device team0 entered promiscuous mode [ 961.368058][ T698] device team_slave_0 entered promiscuous mode 20:58:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a0021000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f000000028000001225", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 961.368209][ T698] device team_slave_1 entered promiscuous mode [ 961.369872][ T698] bond0: (slave team0): Releasing backup interface [ 961.379507][ T698] bridge0: port 3(team0) entered blocking state [ 961.379575][ T698] bridge0: port 3(team0) entered disabled state 20:58:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a0019000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x60}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000005c0)={&(0x7f0000000300)=@nl=@kern={0x10, 0x0, 0x0, 0x800}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000380)="82946118b41ec00c67ef5ed48699d15fe07ae4fa18ca6273976839131214c6beafb43b3f4f632782d99b9b48729dd58213520417642c39fcaa4eda551ec8507e23e6f5718ef6da0be44db4e53d7fc53d77f57e259a0699df417cedcf2c", 0x5d}, {&(0x7f0000000400)="4c58a142e8e2b094973f66a652e5bb29314178a3a13b645bcfd7d3e456086ad0082e9ad491a9b10e8c65a606b9dc7373c84e34d53752a0faede4ae1be8573c70543df5d06389c9fc477b6d2f846bac02bbcddb07f2833ec4d756be05aac43b47b488bc9c16864448", 0x68}], 0x2, &(0x7f0000000500)=[{0xb0, 0x105, 0x3, "0b2ca988ba9f482b6727d0edd200c4ed7b3eabfcf3e9d7c85316f9c91691b2eb3da2c388e73e1960e0eae34e770d28b6c226fed7a2155920839872c32f53e85a1ade0b817b2b2e93c80460b9060843642f43278c9dd162c8e5fc19925d1a4bb5cccab50681f0d7cef745f62f929dece31a23f8319df35d8f540d82ce49ee3351e1500468e60da5cac06db6df5bc02f46c9540febf4ac6f0eab6664ed920a32c6"}], 0xb0}, 0x40001) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.393766][ T708] bond0: (slave team0): Releasing backup interface 20:58:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x5000000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x10}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 961.404499][ T708] bridge0: port 13(team0) entered blocking state [ 961.408909][ T708] bridge0: port 13(team0) entered disabled state [ 961.424710][ T713] device team0 left promiscuous mode 20:58:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000f000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f0000000280000a121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 961.424728][ T713] device team_slave_0 left promiscuous mode [ 961.424855][ T713] device team_slave_1 left promiscuous mode 20:58:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ftruncate(r1, 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r2}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x4000800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800005e65f3870f22e07a0000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000002, 0x110, r3, 0xd6173000) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$kcm(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.425196][ T713] bridge0: port 3(team0) entered disabled state [ 961.430254][ T713] 8021q: adding VLAN 0 to HW filter on device team0 [ 961.432165][ T713] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a0025000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f0000000280000e121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x1000000}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 961.478697][ T713] device team0 entered promiscuous mode [ 961.478714][ T713] device team_slave_0 entered promiscuous mode 20:58:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a0024000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.478865][ T713] device team_slave_1 entered promiscuous mode [ 961.524805][ T713] bond0: (slave team0): Releasing backup interface 20:58:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a0024000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ftruncate(r1, 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r2}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x4000800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800005e65f3870f22e07a0000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000002, 0x110, r3, 0xd6173000) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$kcm(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) (async) syz_init_net_socket$x25(0x9, 0x5, 0x0) (async) ftruncate(r1, 0x2) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r2}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x4000800) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800005e65f3870f22e07a0000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000002, 0x110, r3, 0xd6173000) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) (async) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendmsg$kcm(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) [ 961.529558][ T713] bridge0: port 3(team0) entered blocking state 20:58:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ftruncate(r1, 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r2}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x4000800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800005e65f3870f22e07a0000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000002, 0x110, r3, 0xd6173000) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$kcm(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.529621][ T713] bridge0: port 3(team0) entered disabled state [ 961.590103][ T731] device team0 left promiscuous mode 20:58:18 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a0021000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.590119][ T731] device team_slave_0 left promiscuous mode [ 961.591601][ T731] device team_slave_1 left promiscuous mode [ 961.591870][ T731] bridge0: port 3(team0) entered disabled state 20:58:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1, 0x0, 0x7}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 961.635123][ T731] 8021q: adding VLAN 0 to HW filter on device team0 [ 961.636914][ T731] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:18 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a0020000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:18 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a0020000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a0019000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.639940][ T733] device team0 left promiscuous mode [ 961.639953][ T733] device team_slave_1 left promiscuous mode [ 961.641162][ T733] bridge0: port 13(team0) entered disabled state [ 961.660381][ T733] 8021q: adding VLAN 0 to HW filter on device team0 [ 961.661684][ T733] device team0 entered promiscuous mode 20:58:18 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ftruncate(r1, 0x2) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r2}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x4000800) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800005e65f3870f22e07a0000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000002, 0x110, r3, 0xd6173000) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$kcm(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) (async) syz_init_net_socket$x25(0x9, 0x5, 0x0) (async) ftruncate(r1, 0x2) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r2}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000300)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x4000800) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="1800005e65f3870f22e07a0000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r3) (async) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000002, 0x110, r3, 0xd6173000) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) (async) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendmsg$kcm(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) 20:58:18 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0xffffff1f}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:18 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x2}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 961.661699][ T733] device team_slave_1 entered promiscuous mode [ 961.672408][ T733] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0xc0}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 961.684541][ T731] device team0 entered promiscuous mode [ 961.684558][ T731] device team_slave_0 entered promiscuous mode 20:58:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a0f0d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f0000000280000e121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 961.684746][ T731] device team_slave_1 entered promiscuous mode [ 961.715255][ T731] bond0: (slave team0): Releasing backup interface 20:58:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f0000000280000f121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 961.730763][ T731] bridge0: port 3(team0) entered blocking state [ 961.730829][ T731] bridge0: port 3(team0) entered disabled state 20:58:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800200121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.732473][ T733] __nla_validate_parse: 1 callbacks suppressed [ 961.732490][ T733] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:58:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00001002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 961.733061][ T733] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. 20:58:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800200121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e0014000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.764468][ T733] bond0: (slave team0): Releasing backup interface 20:58:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e0010000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000e02800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 961.800919][ T733] bridge0: port 13(team0) entered blocking state [ 961.800995][ T733] bridge0: port 13(team0) entered disabled state [ 961.808294][ T739] device team0 left promiscuous mode [ 961.808309][ T739] device team_slave_0 left promiscuous mode [ 961.808449][ T739] device team_slave_1 left promiscuous mode [ 961.808730][ T739] bridge0: port 3(team0) entered disabled state 20:58:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800009121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async, rerun: 32) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (rerun: 32) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e001a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 961.839722][ T739] 8021q: adding VLAN 0 to HW filter on device team0 20:58:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800005121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 961.841224][ T739] bond0: (slave team0): Enslaving as an active interface with an up link [ 961.846085][ T744] device team0 entered promiscuous mode 20:58:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800009121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f0000000280a401121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f0000000280000c121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 961.846101][ T744] device team_slave_0 entered promiscuous mode [ 961.846254][ T744] device team_slave_1 entered promiscuous mode 20:58:19 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r1, 0x6628) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) 20:58:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800200121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 961.847875][ T744] bond0: (slave team0): Releasing backup interface [ 961.884844][ T744] bridge0: port 3(team0) entered blocking state 20:58:19 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00100002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 961.884909][ T744] bridge0: port 3(team0) entered disabled state [ 962.087186][ T763] device team0 left promiscuous mode 20:58:19 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000a02800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:19 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e020a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.087203][ T763] device team_slave_0 left promiscuous mode 20:58:19 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00070002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:19 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4403097a0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.087340][ T763] device team_slave_1 left promiscuous mode [ 962.087614][ T763] bridge0: port 3(team0) entered disabled state [ 962.116597][ T763] 8021q: adding VLAN 0 to HW filter on device team0 [ 962.117967][ T763] bond0: (slave team0): Enslaving as an active interface with an up link [ 962.118243][ T764] device team0 left promiscuous mode [ 962.118256][ T764] device team_slave_0 left promiscuous mode 20:58:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r1) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) listen(r0, 0x6) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r4, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r4}) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) [ 962.118388][ T764] device team_slave_1 left promiscuous mode 20:58:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4403096c0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000ff0000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00019202800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309600e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.118653][ T764] bridge0: port 3(team0) entered disabled state [ 962.147145][ T764] 8021q: adding VLAN 0 to HW filter on device team0 20:58:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309500e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.161149][ T764] bond0: (slave team0): Enslaving as an active interface with an up link [ 962.161413][ T770] device team0 left promiscuous mode [ 962.161425][ T770] device team_slave_1 left promiscuous mode [ 962.161756][ T770] bridge0: port 13(team0) entered disabled state [ 962.183896][ T770] 8021q: adding VLAN 0 to HW filter on device team0 [ 962.195152][ T770] device team0 entered promiscuous mode 20:58:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) (async) r1 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r1) (async) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) listen(r0, 0x6) (async) r3 = socket$kcm(0x10, 0x2, 0x0) (async) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r4, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r4}) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) [ 962.195168][ T770] device team_slave_1 entered promiscuous mode [ 962.196535][ T770] bond0: (slave team0): Enslaving as an active interface with an up link [ 962.196681][ T773] device team0 entered promiscuous mode 20:58:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309500e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.196695][ T773] device team_slave_0 entered promiscuous mode [ 962.196825][ T773] device team_slave_1 entered promiscuous mode 20:58:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309480e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.198206][ T773] bond0: (slave team0): Releasing backup interface 20:58:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309240e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:20 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r1) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) listen(r0, 0x6) r3 = socket$kcm(0x10, 0x2, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r4, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r4}) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r1) (async) getsockname$packet(r1, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r2, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) listen(r0, 0x6) (async) socket$kcm(0x10, 0x2, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) ioctl$USBDEVFS_CONNECTINFO(r4, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r4}) (async) sendmsg$kcm(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) (async) [ 962.236515][ T773] bridge0: port 3(team0) entered blocking state 20:58:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309240e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.236578][ T773] bridge0: port 3(team0) entered disabled state 20:58:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309120e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.246360][ T774] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 962.246433][ T763] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309120e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.246603][ T770] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 962.270793][ T781] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 962.289814][ T770] bond0: (slave team0): Releasing backup interface [ 962.364104][ T770] bridge0: port 13(team0) entered blocking state [ 962.366252][ T770] bridge0: port 13(team0) entered disabled state 20:58:20 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), r1) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0x48, r2, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x4048812) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x20000000) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000040000000000000ed00009573c87b47628c697a493bbda45908fbac22d00f38b697c0ffa1a4f5a505aa34f76bf502a0775731db27f389d3bca56513847748b324c17ad5770abe4cc304f3c44fc673d19dcda22d0edfd9afec1d97df2ae6142e498224353e90eca3c53c708bc267a5779716b9cf67cb8aaca113b1e187eb7490c87f45b6487dfc9fa4e2115d95c0a9fa047476e6798b815cbff0f32e57e7f77e264e31fae58dbf7b7f737125551b051c56d845dc6dd4d0a2cb3dd0d47c2b13e3163ce6b98438e310f067c61f8c1affb3a47fd09726b65feaae76ba383697d1b96a0f0c822eb648808f8f5f9c03"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:20 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309240e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.384372][ T763] device team0 entered promiscuous mode [ 962.384390][ T763] device team_slave_0 entered promiscuous mode 20:58:20 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4403090f0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:20 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f02000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 962.384567][ T763] device team_slave_1 entered promiscuous mode [ 962.398910][ T763] bond0: (slave team0): Releasing backup interface [ 962.408348][ T763] bridge0: port 3(team0) entered blocking state [ 962.408413][ T763] bridge0: port 3(team0) entered disabled state 20:58:20 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), r1) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0x48, r2, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x4048812) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x20000000) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000040000000000000ed00009573c87b47628c697a493bbda45908fbac22d00f38b697c0ffa1a4f5a505aa34f76bf502a0775731db27f389d3bca56513847748b324c17ad5770abe4cc304f3c44fc673d19dcda22d0edfd9afec1d97df2ae6142e498224353e90eca3c53c708bc267a5779716b9cf67cb8aaca113b1e187eb7490c87f45b6487dfc9fa4e2115d95c0a9fa047476e6798b815cbff0f32e57e7f77e264e31fae58dbf7b7f737125551b051c56d845dc6dd4d0a2cb3dd0d47c2b13e3163ce6b98438e310f067c61f8c1affb3a47fd09726b65feaae76ba383697d1b96a0f0c822eb648808f8f5f9c03"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:20 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4403090e0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.553418][ T801] device team0 left promiscuous mode [ 962.553435][ T801] device team_slave_1 left promiscuous mode 20:58:20 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4403090e0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.553718][ T801] bridge0: port 13(team0) entered disabled state [ 962.561566][ T801] 8021q: adding VLAN 0 to HW filter on device team0 [ 962.571249][ T801] device team0 entered promiscuous mode 20:58:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00100002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 962.571266][ T801] device team_slave_1 entered promiscuous mode [ 962.584518][ T801] bond0: (slave team0): Enslaving as an active interface with an up link [ 962.620679][ T801] bond0: (slave team0): Releasing backup interface 20:58:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4403090c0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.633916][ T801] bridge0: port 13(team0) entered blocking state [ 962.636328][ T801] bridge0: port 13(team0) entered disabled state [ 962.666554][ T810] device team0 left promiscuous mode 20:58:21 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), r1) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000540)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)={0x48, r2, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @broadcast}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}, @BATADV_ATTR_ISOLATION_MARK={0x8}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3}]}, 0x48}, 0x1, 0x0, 0x0, 0x1}, 0x4048812) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x20000000) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000040000000000000ed00009573c87b47628c697a493bbda45908fbac22d00f38b697c0ffa1a4f5a505aa34f76bf502a0775731db27f389d3bca56513847748b324c17ad5770abe4cc304f3c44fc673d19dcda22d0edfd9afec1d97df2ae6142e498224353e90eca3c53c708bc267a5779716b9cf67cb8aaca113b1e187eb7490c87f45b6487dfc9fa4e2115d95c0a9fa047476e6798b815cbff0f32e57e7f77e264e31fae58dbf7b7f737125551b051c56d845dc6dd4d0a2cb3dd0d47c2b13e3163ce6b98438e310f067c61f8c1affb3a47fd09726b65feaae76ba383697d1b96a0f0c822eb648808f8f5f9c03"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4403090c0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.666571][ T810] device team_slave_0 left promiscuous mode [ 962.666747][ T810] device team_slave_1 left promiscuous mode [ 962.667013][ T810] bridge0: port 3(team0) entered disabled state [ 962.709765][ T810] 8021q: adding VLAN 0 to HW filter on device team0 [ 962.711196][ T810] bond0: (slave team0): Enslaving as an active interface with an up link [ 962.733373][ T815] device team0 left promiscuous mode [ 962.733426][ T815] device team_slave_0 left promiscuous mode [ 962.733554][ T815] device team_slave_1 left promiscuous mode [ 962.733798][ T815] bridge0: port 3(team0) entered disabled state [ 962.764702][ T815] 8021q: adding VLAN 0 to HW filter on device team0 20:58:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4403090a0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb4403090a0e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309080e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.775307][ T815] bond0: (slave team0): Enslaving as an active interface with an up link [ 962.807136][ T815] device team0 entered promiscuous mode [ 962.807154][ T815] device team_slave_0 entered promiscuous mode 20:58:21 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a10000100000005e000000000000000e0040000f000000026400001233", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.807308][ T815] device team_slave_1 entered promiscuous mode [ 962.818550][ T815] bond0: (slave team0): Releasing backup interface 20:58:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e003c000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 962.849157][ T815] bridge0: port 3(team0) entered blocking state [ 962.849223][ T815] bridge0: port 3(team0) entered disabled state [ 962.861475][ T823] device team0 left promiscuous mode [ 962.861491][ T823] device team_slave_1 left promiscuous mode [ 962.861758][ T823] bridge0: port 13(team0) entered disabled state 20:58:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309070e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.900879][ T823] 8021q: adding VLAN 0 to HW filter on device team0 [ 962.924250][ T823] device team0 entered promiscuous mode 20:58:21 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309070e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:21 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309060e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:21 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a10000100000005e000000000000000e0040000f000000026400001233", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:21 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309050e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.924278][ T823] device team_slave_1 entered promiscuous mode [ 962.925050][ T823] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:21 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309040e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.932889][ T830] bond0: (slave team0): Releasing backup interface [ 962.958427][ T830] bridge0: port 13(team0) entered blocking state 20:58:21 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a10000100000005e000000000000000e0040000f000000026400001233", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 962.961082][ T830] bridge0: port 13(team0) entered disabled state [ 963.092622][ T841] device team0 left promiscuous mode [ 963.092639][ T841] device team_slave_1 left promiscuous mode [ 963.092881][ T841] bridge0: port 13(team0) entered disabled state [ 963.127564][ T841] 8021q: adding VLAN 0 to HW filter on device team0 [ 963.128745][ T841] device team0 entered promiscuous mode [ 963.128759][ T841] device team_slave_1 entered promiscuous mode [ 963.129594][ T841] bond0: (slave team0): Enslaving as an active interface with an up link [ 963.137125][ T841] bond0: (slave team0): Releasing backup interface 20:58:22 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x1, 0xf3, &(0x7f0000000200)=""/243, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map=0x1, r2, 0x4, 0x4}, 0x14) r3 = openat(r1, &(0x7f0000000440)='./file0\x00', 0x28000, 0x8b) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r1, r2}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x1}}, 0x40, 0x3}, &(0x7f00000003c0)=0x90) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000400)=@sack_info={r4, 0x101, 0xd}, 0xc) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f07000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309030e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 963.164814][ T841] bridge0: port 13(team0) entered blocking state [ 963.164879][ T841] bridge0: port 13(team0) entered disabled state [ 963.241167][ T857] validate_nla: 57 callbacks suppressed 20:58:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00f00002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 963.241187][ T857] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 963.241373][ T857] device team0 left promiscuous mode 20:58:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f02000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 963.241386][ T857] device team_slave_0 left promiscuous mode [ 963.243901][ T857] device team_slave_1 left promiscuous mode 20:58:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00600002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 963.244213][ T857] bridge0: port 3(team0) entered disabled state 20:58:22 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x1, 0xf3, &(0x7f0000000200)=""/243, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map=0x1, r2, 0x4, 0x4}, 0x14) (async) r3 = openat(r1, &(0x7f0000000440)='./file0\x00', 0x28000, 0x8b) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r1, r2}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x1}}, 0x40, 0x3}, &(0x7f00000003c0)=0x90) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000400)=@sack_info={r4, 0x101, 0xd}, 0xc) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 963.289303][ T857] 8021q: adding VLAN 0 to HW filter on device team0 [ 963.290685][ T857] bond0: (slave team0): Enslaving as an active interface with an up link [ 963.360587][ T857] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 963.360627][ T857] device team0 entered promiscuous mode 20:58:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a00ffff070002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440300200e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e0e0a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 963.360639][ T857] device team_slave_0 entered promiscuous mode 20:58:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440329000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 963.360789][ T857] device team_slave_1 entered promiscuous mode [ 963.364541][ T857] bond0: (slave team0): Releasing backup interface 20:58:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440326000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 963.394144][ T857] bridge0: port 3(team0) entered blocking state [ 963.415818][ T857] bridge0: port 3(team0) entered disabled state [ 963.419079][ T867] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 20:58:22 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xe, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000080)='GPL\x00', 0x1, 0xf3, &(0x7f0000000200)=""/243, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000000)={@map=0x1, r2, 0x4, 0x4}, 0x14) (async) r3 = openat(r1, &(0x7f0000000440)='./file0\x00', 0x28000, 0x8b) ioctl$sock_kcm_SIOCKCMATTACH(r3, 0x89e0, &(0x7f0000000180)={r1, r2}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, &(0x7f0000000300)={0x0, @in6={{0xa, 0x4e24, 0x3, @mcast2, 0x1}}, 0x40, 0x3}, &(0x7f00000003c0)=0x90) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0x10, &(0x7f0000000400)=@sack_info={r4, 0x101, 0xd}, 0xc) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00030002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440325000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 963.419243][ T867] device team0 left promiscuous mode [ 963.419256][ T867] device team_slave_1 left promiscuous mode [ 963.419503][ T867] bridge0: port 13(team0) entered disabled state [ 963.444522][ T867] 8021q: adding VLAN 0 to HW filter on device team0 [ 963.447677][ T867] device team0 entered promiscuous mode [ 963.447693][ T867] device team_slave_1 entered promiscuous mode [ 963.448557][ T867] bond0: (slave team0): Enslaving as an active interface with an up link [ 963.456361][ T872] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 963.484109][ T872] bond0: (slave team0): Releasing backup interface [ 963.497347][ T872] bridge0: port 13(team0) entered blocking state [ 963.497541][ T872] bridge0: port 13(team0) entered disabled state 20:58:22 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440323000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 963.639517][ T897] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 20:58:22 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440323000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440321000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:22 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r0], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r1}, 0x10) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cgroup.clone_children\x00', 0x2, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340), 0x18800, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) io_submit(0x0, 0x2, &(0x7f0000000640)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x1f, r3, &(0x7f0000000380)="43742b78bb272c16c861e7e329c14986a75e072e8e6cff6b0e6a6cf8096b44a7b62a67714876c9d14e02ef087b9456c7dbf093b45736b2bd667dd2df3f10a147c6", 0x41, 0x5, 0x0, 0x3, r8}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0xf, 0x3, r4, &(0x7f0000000680)="77df3abaf146733fd20acb005d52cf683162bc817cc53d806f719063178e96e9b0393a616ed805003e29cdb75e90b884e26f96fe200a44cb84d4b8fd404b7b1ffb5b1db95e8340b41e31d6d0459d854312f9701bf6640a94bb379315d056cf7c000000000000", 0x66, 0x401, 0x0, 0x1}]) ioctl$FAT_IOCTL_GET_VOLUME_ID(r2, 0x80047213, &(0x7f0000000300)) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 963.639671][ T897] device team0 left promiscuous mode [ 963.639681][ T897] device team_slave_1 left promiscuous mode [ 963.639909][ T897] bridge0: port 13(team0) entered disabled state 20:58:22 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44031e000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 963.681404][ T897] 8021q: adding VLAN 0 to HW filter on device team0 [ 963.682578][ T897] device team0 entered promiscuous mode 20:58:22 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44031d000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 963.682592][ T897] device team_slave_1 entered promiscuous mode [ 963.683359][ T897] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44031c000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 963.683505][ T902] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 963.816119][ T913] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 963.880061][ T915] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 963.888288][ T915] bond0: (slave team0): Releasing backup interface [ 963.889786][ T915] bridge0: port 13(team0) entered blocking state 20:58:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44031c000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 963.896134][ T915] bridge0: port 13(team0) entered disabled state [ 963.926841][ T920] netlink: 'syz-executor.5': attribute type 10 has an invalid length. 20:58:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f09000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 963.927021][ T920] device team0 left promiscuous mode [ 963.927033][ T920] device team_slave_0 left promiscuous mode 20:58:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44031b000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 963.927165][ T920] device team_slave_1 left promiscuous mode [ 963.927425][ T920] bridge0: port 3(team0) entered disabled state [ 963.953859][ T920] 8021q: adding VLAN 0 to HW filter on device team0 [ 963.955305][ T920] bond0: (slave team0): Enslaving as an active interface with an up link [ 964.020124][ T920] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 964.020165][ T920] device team0 entered promiscuous mode 20:58:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44031a000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 964.020177][ T920] device team_slave_0 entered promiscuous mode [ 964.020311][ T920] device team_slave_1 entered promiscuous mode [ 964.032169][ T920] bond0: (slave team0): Releasing backup interface [ 964.048957][ T920] bridge0: port 3(team0) entered blocking state [ 964.049021][ T920] bridge0: port 3(team0) entered disabled state [ 964.246117][ T941] device team0 left promiscuous mode 20:58:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r0], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r1}, 0x10) (async) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cgroup.clone_children\x00', 0x2, 0x0) (async) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340), 0x18800, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) (async) r6 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) (async) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) io_submit(0x0, 0x2, &(0x7f0000000640)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x1f, r3, &(0x7f0000000380)="43742b78bb272c16c861e7e329c14986a75e072e8e6cff6b0e6a6cf8096b44a7b62a67714876c9d14e02ef087b9456c7dbf093b45736b2bd667dd2df3f10a147c6", 0x41, 0x5, 0x0, 0x3, r8}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0xf, 0x3, r4, &(0x7f0000000680)="77df3abaf146733fd20acb005d52cf683162bc817cc53d806f719063178e96e9b0393a616ed805003e29cdb75e90b884e26f96fe200a44cb84d4b8fd404b7b1ffb5b1db95e8340b41e31d6d0459d854312f9701bf6640a94bb379315d056cf7c000000000000", 0x66, 0x401, 0x0, 0x1}]) (async) ioctl$FAT_IOCTL_GET_VOLUME_ID(r2, 0x80047213, &(0x7f0000000300)) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 964.246134][ T941] device team_slave_1 left promiscuous mode [ 964.246415][ T941] bridge0: port 13(team0) entered disabled state [ 964.296163][ T941] 8021q: adding VLAN 0 to HW filter on device team0 20:58:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440319000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 964.297391][ T941] device team0 entered promiscuous mode [ 964.297405][ T941] device team_slave_1 entered promiscuous mode [ 964.302548][ T941] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440319000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 964.302744][ T946] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:58:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440318000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 964.332107][ T941] bond0: (slave team0): Releasing backup interface 20:58:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000060e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:23 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r0], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r1}, 0x10) r2 = openat$cgroup_int(r1, &(0x7f0000000100)='cgroup.clone_children\x00', 0x2, 0x0) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340), 0x18800, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) io_submit(0x0, 0x2, &(0x7f0000000640)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x1f, r3, &(0x7f0000000380)="43742b78bb272c16c861e7e329c14986a75e072e8e6cff6b0e6a6cf8096b44a7b62a67714876c9d14e02ef087b9456c7dbf093b45736b2bd667dd2df3f10a147c6", 0x41, 0x5, 0x0, 0x3, r8}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0xf, 0x3, r4, &(0x7f0000000680)="77df3abaf146733fd20acb005d52cf683162bc817cc53d806f719063178e96e9b0393a616ed805003e29cdb75e90b884e26f96fe200a44cb84d4b8fd404b7b1ffb5b1db95e8340b41e31d6d0459d854312f9701bf6640a94bb379315d056cf7c000000000000", 0x66, 0x401, 0x0, 0x1}]) ioctl$FAT_IOCTL_GET_VOLUME_ID(r2, 0x80047213, &(0x7f0000000300)) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) (async) ioctl$USBDEVFS_CONNECTINFO(0xffffffffffffffff, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYRESHEX=0x0, @ANYRES32=r0], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r1}, 0x10) (async) openat$cgroup_int(r1, &(0x7f0000000100)='cgroup.clone_children\x00', 0x2, 0x0) (async) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340), 0x18800, 0x0) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) (async) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000580)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) (async) io_submit(0x0, 0x2, &(0x7f0000000640)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0x1f, r3, &(0x7f0000000380)="43742b78bb272c16c861e7e329c14986a75e072e8e6cff6b0e6a6cf8096b44a7b62a67714876c9d14e02ef087b9456c7dbf093b45736b2bd667dd2df3f10a147c6", 0x41, 0x5, 0x0, 0x3, r8}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0xf, 0x3, r4, &(0x7f0000000680)="77df3abaf146733fd20acb005d52cf683162bc817cc53d806f719063178e96e9b0393a616ed805003e29cdb75e90b884e26f96fe200a44cb84d4b8fd404b7b1ffb5b1db95e8340b41e31d6d0459d854312f9701bf6640a94bb379315d056cf7c000000000000", 0x66, 0x401, 0x0, 0x1}]) (async) ioctl$FAT_IOCTL_GET_VOLUME_ID(r2, 0x80047213, &(0x7f0000000300)) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) [ 964.363491][ T941] bridge0: port 13(team0) entered blocking state [ 964.363575][ T941] bridge0: port 13(team0) entered disabled state [ 964.370187][ T27] audit: type=1400 audit(1655499486.195:312): avc: denied { create } for pid=936 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 20:58:23 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000001800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 964.469696][ T956] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 964.470339][ T956] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. 20:58:23 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440316000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 964.508303][ T958] device team0 left promiscuous mode [ 964.508320][ T958] device team_slave_1 left promiscuous mode [ 964.508602][ T958] bridge0: port 13(team0) entered disabled state 20:58:23 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a600f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 964.535237][ T958] 8021q: adding VLAN 0 to HW filter on device team0 [ 964.540873][ T958] device team0 entered promiscuous mode 20:58:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a600f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 964.540889][ T958] device team_slave_1 entered promiscuous mode [ 964.543675][ T958] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440310000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44030f000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 964.545200][ T958] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 964.567619][ T958] bond0: (slave team0): Releasing backup interface 20:58:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000058650e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e0005000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 964.627637][ T958] bridge0: port 13(team0) entered blocking state [ 964.627700][ T958] bridge0: port 13(team0) entered disabled state 20:58:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000065580e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 964.679096][ T985] device team0 left promiscuous mode [ 964.679113][ T985] device team_slave_0 left promiscuous mode [ 964.679291][ T985] device team_slave_1 left promiscuous mode [ 964.679591][ T985] bridge0: port 3(team0) entered disabled state [ 964.717574][ T985] 8021q: adding VLAN 0 to HW filter on device team0 20:58:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e070a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 964.720269][ T985] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44030c000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb44030c000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a030f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 964.761240][ T985] device team0 entered promiscuous mode [ 964.761256][ T985] device team_slave_0 entered promiscuous mode 20:58:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440307000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000070e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 964.761389][ T985] device team_slave_1 entered promiscuous mode [ 964.787595][ T985] bond0: (slave team0): Releasing backup interface [ 964.822508][ T985] bridge0: port 3(team0) entered blocking state 20:58:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000100e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 964.822572][ T985] bridge0: port 3(team0) entered disabled state [ 964.863640][ T1005] device team0 left promiscuous mode 20:58:24 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440305000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 964.863760][ T1005] device team_slave_1 left promiscuous mode [ 964.864071][ T1005] bridge0: port 13(team0) entered disabled state 20:58:24 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) recvmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000380)=""/171, 0xab}, {&(0x7f0000000500)=""/141, 0x8d}], 0x3}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x28, r8, 0x1, 0x0, 0x0, {0x7}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x28}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000001680)={&(0x7f00000001c0), 0xc, &(0x7f0000001640)={&(0x7f0000000440)={0x68, r8, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x44, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x801) 20:58:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440304000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 964.894917][ T1005] 8021q: adding VLAN 0 to HW filter on device team0 [ 964.922451][ T1005] device team0 entered promiscuous mode 20:58:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e00000000000f000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:24 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb445009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb441909000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 964.922469][ T1005] device team_slave_1 entered promiscuous mode [ 964.923205][ T1005] bond0: (slave team0): Enslaving as an active interface with an up link [ 964.936436][ T1008] bond0: (slave team0): Releasing backup interface [ 964.959788][ T1008] bridge0: port 13(team0) entered blocking state [ 964.959851][ T1008] bridge0: port 13(team0) entered disabled state 20:58:24 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb441109000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.021050][ T1020] device team0 left promiscuous mode [ 965.021068][ T1020] device team_slave_0 left promiscuous mode [ 965.021214][ T1020] device team_slave_1 left promiscuous mode [ 965.021488][ T1020] bridge0: port 3(team0) entered disabled state 20:58:24 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb441009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.032449][ T1020] 8021q: adding VLAN 0 to HW filter on device team0 [ 965.033828][ T1020] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (async) r3 = socket(0x10, 0x3, 0x0) (async) r4 = socket$nl_route(0x10, 0x3, 0x0) (async) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) (async) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) (async) recvmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000380)=""/171, 0xab}, {&(0x7f0000000500)=""/141, 0x8d}], 0x3}, 0x40) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) (async) r8 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x28, r8, 0x1, 0x0, 0x0, {0x7}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x28}}, 0x0) (async) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000001680)={&(0x7f00000001c0), 0xc, &(0x7f0000001640)={&(0x7f0000000440)={0x68, r8, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x44, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x801) 20:58:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) recvmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000380)=""/171, 0xab}, {&(0x7f0000000500)=""/141, 0x8d}], 0x3}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x28, r8, 0x1, 0x0, 0x0, {0x7}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x28}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000001680)={&(0x7f00000001c0), 0xc, &(0x7f0000001640)={&(0x7f0000000440)={0x68, r8, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x44, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x801) [ 965.123779][ T1020] device team0 entered promiscuous mode [ 965.123798][ T1020] device team_slave_0 entered promiscuous mode [ 965.123938][ T1020] device team_slave_1 entered promiscuous mode [ 965.133085][ T1020] bond0: (slave team0): Releasing backup interface [ 965.164266][ T1020] bridge0: port 3(team0) entered blocking state 20:58:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440a09000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440a09000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r3 = socket(0x10, 0x3, 0x0) (async) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) recvmsg$kcm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000380)=""/171, 0xab}, {&(0x7f0000000500)=""/141, 0x8d}], 0x3}, 0x40) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (rerun: 32) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000340), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r7, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x28, r8, 0x1, 0x0, 0x0, {0x7}, [@MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @multicast2}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}]}, 0x28}}, 0x0) sendmsg$MPTCP_PM_CMD_GET_ADDR(r0, &(0x7f0000001680)={&(0x7f00000001c0), 0xc, &(0x7f0000001640)={&(0x7f0000000440)={0x68, r8, 0x800, 0x70bd29, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x3}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x5}, @MPTCP_PM_ATTR_ADDR={0x44, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x1}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}]}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x801) [ 965.164332][ T1020] bridge0: port 3(team0) entered disabled state [ 965.201052][ T1037] device team0 left promiscuous mode 20:58:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440809000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.201067][ T1037] device team_slave_1 left promiscuous mode [ 965.210532][ T1037] bridge0: port 13(team0) entered disabled state [ 965.218368][ T1037] 8021q: adding VLAN 0 to HW filter on device team0 [ 965.244012][ T1037] device team0 entered promiscuous mode [ 965.244029][ T1037] device team_slave_1 entered promiscuous mode [ 965.244815][ T1037] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440509000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.310298][ T1037] bond0: (slave team0): Releasing backup interface [ 965.356818][ T1037] bridge0: port 13(team0) entered blocking state [ 965.356883][ T1037] bridge0: port 13(team0) entered disabled state [ 965.392557][ T1048] device team0 left promiscuous mode [ 965.392576][ T1048] device team_slave_0 left promiscuous mode 20:58:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440509000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.392712][ T1048] device team_slave_1 left promiscuous mode [ 965.392968][ T1048] bridge0: port 3(team0) entered disabled state [ 965.412121][ T1048] 8021q: adding VLAN 0 to HW filter on device team0 [ 965.417038][ T1048] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440409000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440209000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.420576][ T1050] device team0 entered promiscuous mode [ 965.420600][ T1050] device team_slave_0 entered promiscuous mode 20:58:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440400000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.420744][ T1050] device team_slave_1 entered promiscuous mode [ 965.443321][ T1050] bond0: (slave team0): Releasing backup interface 20:58:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000300)=@usbdevfs_disconnect={0xffffffff}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x4) syz_open_procfs(r5, &(0x7f0000000340)='net\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=ANY=[@ANYBLOB="480000002400518600"/20, @ANYRES32=0x0, @ANYBLOB="00000000ffffffff0000000008000100687462001c000200180002000300"/48], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0xc, 0x0, 0x0, 0x0, {{0x0, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x50}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@bridge_newneigh={0x28, 0x1c, 0x200, 0x70bd28, 0x25dfdbfe, {0xa, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa}, [@NDA_LLADDR={0xa, 0x2, @broadcast}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) [ 965.466510][ T1050] bridge0: port 3(team0) entered blocking state [ 965.466642][ T1050] bridge0: port 3(team0) entered disabled state [ 965.473158][ T1053] device team0 entered promiscuous mode [ 965.473176][ T1053] device team_slave_0 entered promiscuous mode 20:58:25 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440509000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:25 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb002009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.473389][ T1053] device team_slave_1 entered promiscuous mode [ 965.483795][ T1053] bond0: (slave team0): Releasing backup interface 20:58:25 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb002009000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:25 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) (async, rerun: 32) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000300)=@usbdevfs_disconnect={0xffffffff}) (rerun: 32) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async, rerun: 32) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x4) (async) syz_open_procfs(r5, &(0x7f0000000340)='net\x00') (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=ANY=[@ANYBLOB="480000002400518600"/20, @ANYRES32=0x0, @ANYBLOB="00000000ffffffff0000000008000100687462001c000200180002000300"/48], 0x48}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0xc, 0x0, 0x0, 0x0, {{0x0, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x50}}, 0x0) (async) sendmsg$nl_route(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@bridge_newneigh={0x28, 0x1c, 0x200, 0x70bd28, 0x25dfdbfe, {0xa, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa}, [@NDA_LLADDR={0xa, 0x2, @broadcast}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) 20:58:25 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e00000000f000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 965.485166][ T1053] bridge0: port 3(team0) entered blocking state [ 965.485299][ T1053] bridge0: port 3(team0) entered disabled state [ 965.489583][ T1048] device team0 entered promiscuous mode 20:58:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efbc00309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.489598][ T1048] device team_slave_0 entered promiscuous mode [ 965.489755][ T1048] device team_slave_1 entered promiscuous mode [ 965.490950][ T1048] bond0: (slave team0): Releasing backup interface 20:58:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000300)=@usbdevfs_disconnect={0xffffffff}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x4) syz_open_procfs(r5, &(0x7f0000000340)='net\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=ANY=[@ANYBLOB="480000002400518600"/20, @ANYRES32=0x0, @ANYBLOB="00000000ffffffff0000000008000100687462001c000200180002000300"/48], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0xc, 0x0, 0x0, 0x0, {{0x0, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x50}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@bridge_newneigh={0x28, 0x1c, 0x200, 0x70bd28, 0x25dfdbfe, {0xa, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa}, [@NDA_LLADDR={0xa, 0x2, @broadcast}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) socket$kcm(0x10, 0x2, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) (async) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) (async) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000300)=@usbdevfs_disconnect={0xffffffff}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) getpid() (async) sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x4) (async) syz_open_procfs(r5, &(0x7f0000000340)='net\x00') (async) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=ANY=[@ANYBLOB="480000002400518600"/20, @ANYRES32=0x0, @ANYBLOB="00000000ffffffff0000000008000100687462001c000200180002000300"/48], 0x48}}, 0x0) (async) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {}, {0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0xc, 0x0, 0x0, 0x0, {{0x0, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x50}}, 0x0) (async) sendmsg$nl_route(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=@bridge_newneigh={0x28, 0x1c, 0x200, 0x70bd28, 0x25dfdbfe, {0xa, 0x0, 0x0, 0x0, 0x20, 0x0, 0xa}, [@NDA_LLADDR={0xa, 0x2, @broadcast}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) (async) [ 965.507670][ T1048] bridge0: port 3(team0) entered blocking state [ 965.507733][ T1048] bridge0: port 3(team0) entered disabled state 20:58:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000007000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb0c0309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.509684][ T1057] device team0 left promiscuous mode [ 965.509698][ T1057] device team_slave_1 left promiscuous mode [ 965.509958][ T1057] bridge0: port 13(team0) entered disabled state 20:58:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd25fb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef41000007ae3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.527385][ T1057] 8021q: adding VLAN 0 to HW filter on device team0 [ 965.528649][ T1057] device team0 entered promiscuous mode 20:58:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000012e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.528663][ T1057] device team_slave_1 entered promiscuous mode 20:58:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') r2 = socket(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000800)=@newqdisc={0x30, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x4}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}]}, 0x30}}, 0x0) sendmsg$kcm(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)="8aca61012b8350bfade5294dd6a141f0ad5a47ce", 0x14}, {&(0x7f0000000340)="a7b029d18ed478aa2585357547fba9d7281f3f145760de3242d0bda56152526ed3f7bf40808847b7e81a81546d28e351de46e5d424522b09e2adb68748dc28cebbe1fc2b9e47ae4e35981e2633c14d3bb9993310ec2508cd8dad3d658f9a1b942a05b6efa6c58ee89bfe88501aea83916723458227238edea76d8ef6c18bdb8e152222d3d3e48f7de8332d424d4556c60cdd675f8933d95113eb52a7f3c4ee926fc540e40906000d4c15ecc6b0f8d977fcc736d931a6d22831e027aab35c139ec2a769bb6761ba6d40570689a5e3fe9269f1132af6aa18f6d88f9b33e94d19f93267c47725ed6361e0b0b06a9cc05aebb791984341b952e42a8599", 0xfb}, {&(0x7f0000000500)="47b1f430d21d8800477476e200f2ca79b4be3efc77ca84229a08882853a375b2b284beedd77e82f95a1bd70df0dfe3a78c69cd316710f43c07156272ef64b0790026aa8e3630d43b1feba861e64affad4cc123f365c7898b45a8524fbb60d76d0e134b382c96f6a47b8187dc0c5d9635fa30ff2cc623ac313830d07ba372d5e6a3894d9536035f6cbb3a07aa657b442f9a19d55f330ae6a41b29eb4191c3e48078c2b0f795a3bb6bb9f5fdf95c054ee7ec1a8ecb7b7fee7ece2d0c9f527c", 0xbe}, {&(0x7f0000000440)="11f510cd01b534779fe95014ef72f7f0ca21d711c2501b7d78a1e54141aab919c57cef52348cda5e76ce35dbfff1250b8cd507761d47298e98dfc7eaaacd16ccfa7f", 0x42}, {&(0x7f0000000640)="fab376293456abfb70d9546652ec4ecbddb4a49a901727c008154844ddfde0a164a0e431deece92fc4ed47b4fedaf11239f8301b764d31678b0769ab5d3962db33efed1b9f2dd3f09033c9bfd38fb78306767d0f9902a9b4f069a9f3714cc5f49b02356a2e88c5035b80", 0x6a}], 0x5, &(0x7f0000000740)=[{0xc0, 0x1, 0x1000, "e8a4cd27bf6d47abf3e9204b51cf119ab93882cf32695b558a769de7be32ad576cfe55fad18bd25294f351c20a68c58432bb325ce40881c9c43947a23b5eeca06a7c161f45ba22457d666a2c94f06c666a55a9343a93f52443121e0c7746d57b4e8506ec44abe4a7df9966abce278f86007f26a2e34edc68652c726121ddcfc4dfb77b5115ec7f244837dbaecb8e9aa3a68ec9c2b67d2f11ccdba80a5b005f588377170dbba7b62d9822e5f197a1cd"}], 0xc0}, 0x0) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r6}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.529564][ T1057] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e00000088a8ffff0e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 965.687587][ T1066] device team0 left promiscuous mode [ 965.687605][ T1066] device team_slave_0 left promiscuous mode [ 965.687744][ T1066] device team_slave_1 left promiscuous mode [ 965.687994][ T1066] bridge0: port 3(team0) entered disabled state [ 965.727173][ T1066] 8021q: adding VLAN 0 to HW filter on device team0 [ 965.733393][ T1066] bond0: (slave team0): Enslaving as an active interface with an up link [ 965.740401][ T1068] bond0: (slave team0): Releasing backup interface 20:58:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000c00000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000040e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 965.742337][ T1068] bridge0: port 13(team0) entered blocking state [ 965.742394][ T1068] bridge0: port 13(team0) entered disabled state [ 965.751439][ T1075] device team0 left promiscuous mode 20:58:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000030e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000900000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 965.751453][ T1075] device team_slave_0 left promiscuous mode 20:58:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000058650e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000fffffff00e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') (async) r2 = socket(0x10, 0x3, 0x0) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) (async, rerun: 64) r4 = socket(0x10, 0x803, 0x0) (rerun: 64) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000800)=@newqdisc={0x30, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x4}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}]}, 0x30}}, 0x0) (async) sendmsg$kcm(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)="8aca61012b8350bfade5294dd6a141f0ad5a47ce", 0x14}, {&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000500)="47b1f430d21d8800477476e200f2ca79b4be3efc77ca84229a08882853a375b2b284beedd77e82f95a1bd70df0dfe3a78c69cd316710f43c07156272ef64b0790026aa8e3630d43b1feba861e64affad4cc123f365c7898b45a8524fbb60d76d0e134b382c96f6a47b8187dc0c5d9635fa30ff2cc623ac313830d07ba372d5e6a3894d9536035f6cbb3a07aa657b442f9a19d55f330ae6a41b29eb4191c3e48078c2b0f795a3bb6bb9f5fdf95c054ee7ec1a8ecb7b7fee7ece2d0c9f527c", 0xbe}, {&(0x7f0000000440)="11f510cd01b534779fe95014ef72f7f0ca21d711c2501b7d78a1e54141aab919c57cef52348cda5e76ce35dbfff1250b8cd507761d47298e98dfc7eaaacd16ccfa7f", 0x42}, {&(0x7f0000000640)="fab376293456abfb70d9546652ec4ecbddb4a49a901727c008154844ddfde0a164a0e431deece92fc4ed47b4fedaf11239f8301b764d31678b0769ab5d3962db33efed1b9f2dd3f09033c9bfd38fb78306767d0f9902a9b4f069a9f3714cc5f49b02356a2e88c5035b80", 0x6a}], 0x5, &(0x7f0000000740)=[{0xc0, 0x1, 0x1000, "e8a4cd27bf6d47abf3e9204b51cf119ab93882cf32695b558a769de7be32ad576cfe55fad18bd25294f351c20a68c58432bb325ce40881c9c43947a23b5eeca06a7c161f45ba22457d666a2c94f06c666a55a9343a93f52443121e0c7746d57b4e8506ec44abe4a7df9966abce278f86007f26a2e34edc68652c726121ddcfc4dfb77b5115ec7f244837dbaecb8e9aa3a68ec9c2b67d2f11ccdba80a5b005f588377170dbba7b62d9822e5f197a1cd"}], 0xc0}, 0x0) (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r6}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.751592][ T1075] device team_slave_1 left promiscuous mode [ 965.751844][ T1075] bridge0: port 3(team0) entered disabled state 20:58:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') r2 = socket(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000800)=@newqdisc={0x30, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x4}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}]}, 0x30}}, 0x0) sendmsg$kcm(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)="8aca61012b8350bfade5294dd6a141f0ad5a47ce", 0x14}, {&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000500)="47b1f430d21d8800477476e200f2ca79b4be3efc77ca84229a08882853a375b2b284beedd77e82f95a1bd70df0dfe3a78c69cd316710f43c07156272ef64b0790026aa8e3630d43b1feba861e64affad4cc123f365c7898b45a8524fbb60d76d0e134b382c96f6a47b8187dc0c5d9635fa30ff2cc623ac313830d07ba372d5e6a3894d9536035f6cbb3a07aa657b442f9a19d55f330ae6a41b29eb4191c3e48078c2b0f795a3bb6bb9f5fdf95c054ee7ec1a8ecb7b7fee7ece2d0c9f527c", 0xbe}, {&(0x7f0000000440)="11f510cd01b534779fe95014ef72f7f0ca21d711c2501b7d78a1e54141aab919c57cef52348cda5e76ce35dbfff1250b8cd507761d47298e98dfc7eaaacd16ccfa7f", 0x42}, {&(0x7f0000000640)="fab376293456abfb70d9546652ec4ecbddb4a49a901727c008154844ddfde0a164a0e431deece92fc4ed47b4fedaf11239f8301b764d31678b0769ab5d3962db33efed1b9f2dd3f09033c9bfd38fb78306767d0f9902a9b4f069a9f3714cc5f49b02356a2e88c5035b80", 0x6a}], 0x5, &(0x7f0000000740)=[{0xc0, 0x1, 0x1000, "e8a4cd27bf6d47abf3e9204b51cf119ab93882cf32695b558a769de7be32ad576cfe55fad18bd25294f351c20a68c58432bb325ce40881c9c43947a23b5eeca06a7c161f45ba22457d666a2c94f06c666a55a9343a93f52443121e0c7746d57b4e8506ec44abe4a7df9966abce278f86007f26a2e34edc68652c726121ddcfc4dfb77b5115ec7f244837dbaecb8e9aa3a68ec9c2b67d2f11ccdba80a5b005f588377170dbba7b62d9822e5f197a1cd"}], 0xc0}, 0x0) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r6}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 965.767633][ T1075] 8021q: adding VLAN 0 to HW filter on device team0 [ 965.774433][ T1075] bond0: (slave team0): Enslaving as an active interface with an up link [ 965.774642][ T1072] device team0 left promiscuous mode 20:58:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000008100000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef41000750ce3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:26 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') r2 = socket(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000800)=@newqdisc={0x30, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x4}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}]}, 0x30}}, 0x0) sendmsg$kcm(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)="8aca61012b8350bfade5294dd6a141f0ad5a47ce", 0x14}, {&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000500)="47b1f430d21d8800477476e200f2ca79b4be3efc77ca84229a08882853a375b2b284beedd77e82f95a1bd70df0dfe3a78c69cd316710f43c07156272ef64b0790026aa8e3630d43b1feba861e64affad4cc123f365c7898b45a8524fbb60d76d0e134b382c96f6a47b8187dc0c5d9635fa30ff2cc623ac313830d07ba372d5e6a3894d9536035f6cbb3a07aa657b442f9a19d55f330ae6a41b29eb4191c3e48078c2b0f795a3bb6bb9f5fdf95c054ee7ec1a8ecb7b7fee7ece2d0c9f527c", 0xbe}, {&(0x7f0000000440)="11f510cd01b534779fe95014ef72f7f0ca21d711c2501b7d78a1e54141aab919c57cef52348cda5e76ce35dbfff1250b8cd507761d47298e98dfc7eaaacd16ccfa7f", 0x42}, {&(0x7f0000000640)="fab376293456abfb70d9546652ec4ecbddb4a49a901727c008154844ddfde0a164a0e431deece92fc4ed47b4fedaf11239f8301b764d31678b0769ab5d3962db33efed1b9f2dd3f09033c9bfd38fb78306767d0f9902a9b4f069a9f3714cc5f49b02356a2e88c5035b80", 0x6a}], 0x5, &(0x7f0000000740)=[{0xc0, 0x1, 0x1000, "e8a4cd27bf6d47abf3e9204b51cf119ab93882cf32695b558a769de7be32ad576cfe55fad18bd25294f351c20a68c58432bb325ce40881c9c43947a23b5eeca06a7c161f45ba22457d666a2c94f06c666a55a9343a93f52443121e0c7746d57b4e8506ec44abe4a7df9966abce278f86007f26a2e34edc68652c726121ddcfc4dfb77b5115ec7f244837dbaecb8e9aa3a68ec9c2b67d2f11ccdba80a5b005f588377170dbba7b62d9822e5f197a1cd"}], 0xc0}, 0x0) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r6 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r6}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000140)='limits\x00') (async) socket(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) (async) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000800)=@newqdisc={0x30, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@TCA_STAB={0x4}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x1}]}, 0x30}}, 0x0) (async) sendmsg$kcm(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000300)="8aca61012b8350bfade5294dd6a141f0ad5a47ce", 0x14}, {&(0x7f0000000340)="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", 0xfb}, {&(0x7f0000000500)="47b1f430d21d8800477476e200f2ca79b4be3efc77ca84229a08882853a375b2b284beedd77e82f95a1bd70df0dfe3a78c69cd316710f43c07156272ef64b0790026aa8e3630d43b1feba861e64affad4cc123f365c7898b45a8524fbb60d76d0e134b382c96f6a47b8187dc0c5d9635fa30ff2cc623ac313830d07ba372d5e6a3894d9536035f6cbb3a07aa657b442f9a19d55f330ae6a41b29eb4191c3e48078c2b0f795a3bb6bb9f5fdf95c054ee7ec1a8ecb7b7fee7ece2d0c9f527c", 0xbe}, {&(0x7f0000000440)="11f510cd01b534779fe95014ef72f7f0ca21d711c2501b7d78a1e54141aab919c57cef52348cda5e76ce35dbfff1250b8cd507761d47298e98dfc7eaaacd16ccfa7f", 0x42}, {&(0x7f0000000640)="fab376293456abfb70d9546652ec4ecbddb4a49a901727c008154844ddfde0a164a0e431deece92fc4ed47b4fedaf11239f8301b764d31678b0769ab5d3962db33efed1b9f2dd3f09033c9bfd38fb78306767d0f9902a9b4f069a9f3714cc5f49b02356a2e88c5035b80", 0x6a}], 0x5, &(0x7f0000000740)=[{0xc0, 0x1, 0x1000, "e8a4cd27bf6d47abf3e9204b51cf119ab93882cf32695b558a769de7be32ad576cfe55fad18bd25294f351c20a68c58432bb325ce40881c9c43947a23b5eeca06a7c161f45ba22457d666a2c94f06c666a55a9343a93f52443121e0c7746d57b4e8506ec44abe4a7df9966abce278f86007f26a2e34edc68652c726121ddcfc4dfb77b5115ec7f244837dbaecb8e9aa3a68ec9c2b67d2f11ccdba80a5b005f588377170dbba7b62d9822e5f197a1cd"}], 0xc0}, 0x0) (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r6}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) [ 965.774654][ T1072] device team_slave_0 left promiscuous mode [ 965.774778][ T1072] device team_slave_1 left promiscuous mode [ 965.775030][ T1072] bridge0: port 3(team0) entered disabled state [ 965.778870][ T1072] 8021q: adding VLAN 0 to HW filter on device team0 20:58:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000f00000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:26 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000000a0000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 965.790035][ T1072] bond0: (slave team0): Enslaving as an active interface with an up link [ 965.805845][ T1076] device team0 entered promiscuous mode [ 965.805863][ T1076] device team_slave_0 entered promiscuous mode 20:58:26 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000070e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:26 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000080e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 965.806015][ T1076] device team_slave_1 entered promiscuous mode 20:58:26 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000fffff0000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000a00100000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 965.832722][ T1076] bond0: (slave team0): Releasing backup interface [ 965.848471][ T1076] bridge0: port 3(team0) entered blocking state 20:58:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000655800000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 965.848535][ T1076] bridge0: port 3(team0) entered disabled state [ 965.860518][ T1079] device team0 entered promiscuous mode [ 965.860535][ T1079] device team_slave_0 entered promiscuous mode [ 965.860667][ T1079] device team_slave_1 entered promiscuous mode [ 965.862382][ T1079] bond0: (slave team0): Releasing backup interface 20:58:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000010e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000000000000e0e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410004800e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300), 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='personality\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_open_procfs(r2, &(0x7f0000000340)='numa_maps\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e00000000f000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 965.878064][ T1079] bridge0: port 3(team0) entered blocking state [ 965.878127][ T1079] bridge0: port 3(team0) entered disabled state 20:58:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000fffffff0000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 965.882006][ T1081] device team0 left promiscuous mode [ 965.882022][ T1081] device team_slave_1 left promiscuous mode 20:58:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000c00000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 965.882339][ T1081] bridge0: port 13(team0) entered disabled state 20:58:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000080000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000f0ffffff000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 965.917074][ T1081] 8021q: adding VLAN 0 to HW filter on device team0 20:58:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000600000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 965.918326][ T1081] device team0 entered promiscuous mode [ 965.918341][ T1081] device team_slave_1 entered promiscuous mode [ 965.919202][ T1081] bond0: (slave team0): Enslaving as an active interface with an up link [ 965.976282][ T1081] bond0: (slave team0): Releasing backup interface 20:58:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000000c0000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 965.987982][ T1081] bridge0: port 13(team0) entered blocking state 20:58:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300), 0x4) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='personality\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) (async) syz_open_procfs(r2, &(0x7f0000000340)='numa_maps\x00') (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef4100b9400e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000020000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000f0000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000f0ffffff000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 965.988054][ T1081] bridge0: port 13(team0) entered disabled state [ 966.086103][ T1091] device team0 left promiscuous mode [ 966.086121][ T1091] device team_slave_0 left promiscuous mode [ 966.086261][ T1091] device team_slave_1 left promiscuous mode [ 966.086544][ T1091] bridge0: port 3(team0) entered disabled state 20:58:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000060000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410500000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000300), 0x4) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='personality\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) syz_open_procfs(r2, &(0x7f0000000340)='numa_maps\x00') (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000060000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 966.090513][ T1091] 8021q: adding VLAN 0 to HW filter on device team0 [ 966.099197][ T1091] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000a0010000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000002000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e00000e000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 966.102489][ T1094] device team0 left promiscuous mode 20:58:27 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0x80000000, 0x8000000000000001, 0x6, 0x2, 0x6, 0x87aa, 0x9, 0xfffff800, 0x2, 0x101, 0x100000000, 0x9, 0x9, 0x6}}) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000300)=@generic={0x2a, "09459d8db1a9887b7b5e0b34f0077aa62cc7957706150b549ccc961231e04c3070fca52a6ea799e1999413f34ccc9e09cf2c3444f1b488b4c8c979f6355f5c36920b060434f30186f55051a0c12345af1ba9cbf84db0a2940d69eabe0b2ef67d638192c528ebfc9a6f272992e751e9efb91cdd95710edb75e555ae857164"}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="4ddfb31e5798c262379e3c7686f4d77148a2500e406ca42303d905778ce0bbd34849c8db0168cafe7b4f707709c586428336208ed43edbb0923ae67c71aa2619486da0b02ed5fa71be2a0f1aebf2371168a0945679af86adb72e1f5f73d6b8e100e66bc8e3dcfc6067bf1bacbda451739d625ee90da4c20feeb58809cd0dcef7c7a9aea224a7b069a562a25a", 0x8c}], 0x1}, 0x20000000) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r3, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r3}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:27 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e00ffffa88800000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000058650000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 966.102504][ T1094] device team_slave_0 left promiscuous mode [ 966.102631][ T1094] device team_slave_1 left promiscuous mode [ 966.102898][ T1094] bridge0: port 3(team0) entered disabled state 20:58:27 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000099010000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:27 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000002000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:27 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef42f000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.132829][ T1094] 8021q: adding VLAN 0 to HW filter on device team0 [ 966.151965][ T1094] bond0: (slave team0): Enslaving as an active interface with an up link [ 966.157725][ T1100] device team0 left promiscuous mode [ 966.157740][ T1100] device team_slave_1 left promiscuous mode [ 966.157993][ T1100] bridge0: port 13(team0) entered disabled state 20:58:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef425000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e00000c000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0x80000000, 0x8000000000000001, 0x6, 0x2, 0x6, 0x87aa, 0x9, 0xfffff800, 0x2, 0x101, 0x100000000, 0x9, 0x9, 0x6}}) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) (async) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async, rerun: 32) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000300)=@generic={0x2a, "09459d8db1a9887b7b5e0b34f0077aa62cc7957706150b549ccc961231e04c3070fca52a6ea799e1999413f34ccc9e09cf2c3444f1b488b4c8c979f6355f5c36920b060434f30186f55051a0c12345af1ba9cbf84db0a2940d69eabe0b2ef67d638192c528ebfc9a6f272992e751e9efb91cdd95710edb75e555ae857164"}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="4ddfb31e5798c262379e3c7686f4d77148a2500e406ca42303d905778ce0bbd34849c8db0168cafe7b4f707709c586428336208ed43edbb0923ae67c71aa2619486da0b02ed5fa71be2a0f1aebf2371168a0945679af86adb72e1f5f73d6b8e100e66bc8e3dcfc6067bf1bacbda451739d625ee90da4c20feeb58809cd0dcef7c7a9aea224a7b069a562a25a", 0x8c}], 0x1}, 0x20000000) (async, rerun: 32) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r3, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r3}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) (async, rerun: 32) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (rerun: 32) 20:58:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef421000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000010000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 966.172332][ T1100] 8021q: adding VLAN 0 to HW filter on device team0 [ 966.179391][ T1100] device team0 entered promiscuous mode 20:58:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000007000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 966.179407][ T1100] device team_slave_1 entered promiscuous mode [ 966.180253][ T1100] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40d000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.197325][ T1100] bond0: (slave team0): Releasing backup interface [ 966.227024][ T1100] bridge0: port 13(team0) entered blocking state [ 966.227088][ T1100] bridge0: port 13(team0) entered disabled state 20:58:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef40c000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.229521][ T1094] device team0 entered promiscuous mode [ 966.229536][ T1094] device team_slave_0 entered promiscuous mode [ 966.229674][ T1094] device team_slave_1 entered promiscuous mode 20:58:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e00000c000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef406000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.231179][ T1094] bond0: (slave team0): Releasing backup interface 20:58:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef404000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000640)={{0x0, 0x80000000, 0x8000000000000001, 0x6, 0x2, 0x6, 0x87aa, 0x9, 0xfffff800, 0x2, 0x101, 0x100000000, 0x9, 0x9, 0x6}}) (async) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$kcm(r2, &(0x7f0000000480)={&(0x7f0000000300)=@generic={0x2a, "09459d8db1a9887b7b5e0b34f0077aa62cc7957706150b549ccc961231e04c3070fca52a6ea799e1999413f34ccc9e09cf2c3444f1b488b4c8c979f6355f5c36920b060434f30186f55051a0c12345af1ba9cbf84db0a2940d69eabe0b2ef67d638192c528ebfc9a6f272992e751e9efb91cdd95710edb75e555ae857164"}, 0x80, &(0x7f0000000440)=[{&(0x7f0000000380)="4ddfb31e5798c262379e3c7686f4d77148a2500e406ca42303d905778ce0bbd34849c8db0168cafe7b4f707709c586428336208ed43edbb0923ae67c71aa2619486da0b02ed5fa71be2a0f1aebf2371168a0945679af86adb72e1f5f73d6b8e100e66bc8e3dcfc6067bf1bacbda451739d625ee90da4c20feeb58809cd0dcef7c7a9aea224a7b069a562a25a", 0x8c}], 0x1}, 0x20000000) (async) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r3, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r3}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r4}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480e0020000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.242396][ T1094] bridge0: port 3(team0) entered blocking state [ 966.242465][ T1094] bridge0: port 3(team0) entered disabled state 20:58:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000400000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 966.244222][ T1097] device team0 entered promiscuous mode [ 966.244238][ T1097] device team_slave_0 entered promiscuous mode 20:58:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca74817f410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca74814f410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000c00000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 966.244385][ T1097] device team_slave_1 entered promiscuous mode [ 966.260050][ T1097] bond0: (slave team0): Releasing backup interface 20:58:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ff410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:28 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$kcm(r2, &(0x7f00000018c0)={&(0x7f00000003c0)=@generic={0x38, "0cdc10e825e2db4ca194b45a53efd5d07355410f01bccea457d621d61bd3f2182fb91b279d58d6afde77888b09f47a707858c6fc87560358fb0835417aa0f018dfb47cec32dcae7c9745a12bdd489a22004af2550d7b19e590debd9254cd06718d6ef8125dad775ff4bc08453d07486b08f02c4bd02a353b69fb41d8a7aa"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000500)="86b016c9a9144044188c5079e0427a7aa6510af6e41b7f0bcdc78c80c13c9236346e3e074031fc7727a9a743183093bc2b0c8d98f7dfff98e33f46bcaa70380b9e7d178aad6d0b00264012e90f2d8b66a53e1b2f8dd5a2bed5a98d5711e083d4f854865dcdd71074b1d36708984c91c5e43ed602fdc931a8e631663ee8d84c525421bfb355c42ee1bfc9ce0d9019431c3898c6b8c3828b468234325a99fe60fb89b8eaed73598e642b9c86577d1ee24a18b1b4dbec7249d6fc859607ac3075cfb9f27b42413f06941e3f206b21773fe565a5eea6aeac5808e60d60e4aace3e066195c4ba3d3dc9c691e5164083", 0xed}, {&(0x7f0000000440)="6a2504ec6218294aa4752fec799d60b81cef18e73cdb3dab2b141dec8af8d7f5a50725acccf42b34d00211d04fab9c66dcef195ec3eeca762dd37d91ed2d2cff2d1e6fa78934ad6ffee6e6365cac2fa93021ac100a11edcc21", 0x59}], 0x2, &(0x7f0000000680)=[{0x30, 0x10d, 0x7fffffff, "5b2690d8d267b15a4780369d790bab450d56cfb216fe13b8af4acc489a"}, {0x1010, 0x10f, 0x6, "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"}, {0xb8, 0x88, 0x2, "04262fb539cf7dc616b30a48b7aa5e1dce9d616acec2c5a2e02cba8782ad18a4228be605858e48c48ea3bb420f5593d6e11ee974602c32fd89c9c0f6fb0c4e3c6f8d6dc64b092e1162867a870ac8b88a7eb9f0c65148b006fa69eb023b99c32135b630f81d401f2f9e259ad1fe6730002eb1fdaf30a6e4189eec362a170858afbc57141353e91d97d36fd2206ee48b1a2dd19fe219d423b596326ede4f56a23a747d88ad"}, {0xd8, 0x0, 0x5, "1fa8c63799ea63c60f4c8e1d3bb6be613d5b33f0d1a6ecf5b6d1819b1b1188f5ed52316f6f281e8077d86e3295b2dd6d6e40f9fc541e48c6fb8a3d99dd252c8f8081d02c0d703898395526ebdd742a909756fc3134fdff44032c0c684d4f0ca31372cb310b36e3eb0b986de2e42a1c4afbf108b774e449a8aa7a7973c67afdf39f7e692cf1d35fcdfe46e7d19ca7f6509b8c5f7f5f70e99cbb7ec2e029960315e3b8955e255a87c3ebe33f17d9928631dd6ef9549ca606c8c606217b42727cc6d1f2001e770d50c4"}, {0x38, 0x117, 0x40000000, "a4a404080d508f902446e293f1c91201fb1e8a8dd9aace0b1fb5d2e76ab4600627fcd3aff3095a"}], 0x1208}, 0x1) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000380)=@usbdevfs_driver={0x81, 0x2, &(0x7f0000000300)="322968f55c7e548699d5475ce74d2d4670e74445cbad49d86abbc4082eb1caa12995f5095e3f9bd0a1da852a0922ca62997d7e591f7b247d8a3fb1218f2606581b3ca1127a50831d6363592441295c4c5ddce6169df01428283961"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.262857][ T1097] bridge0: port 3(team0) entered blocking state [ 966.262920][ T1097] bridge0: port 3(team0) entered disabled state [ 966.399331][ T1121] device team0 left promiscuous mode 20:58:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ff410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.399347][ T1121] device team_slave_1 left promiscuous mode [ 966.399602][ T1121] bridge0: port 13(team0) entered disabled state 20:58:28 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca70020f410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.413524][ T1121] 8021q: adding VLAN 0 to HW filter on device team0 [ 966.424587][ T1121] device team0 entered promiscuous mode 20:58:28 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca70020f410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:28 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000e00000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 966.424604][ T1121] device team_slave_1 entered promiscuous mode [ 966.425470][ T1121] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:28 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb08b9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.428662][ T1123] device team0 left promiscuous mode [ 966.428676][ T1123] device team_slave_0 left promiscuous mode [ 966.428817][ T1123] device team_slave_1 left promiscuous mode 20:58:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188042546ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.429097][ T1123] bridge0: port 3(team0) entered disabled state [ 966.449146][ T1123] 8021q: adding VLAN 0 to HW filter on device team0 [ 966.453347][ T1123] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendmsg$kcm(r2, &(0x7f00000018c0)={&(0x7f00000003c0)=@generic={0x38, "0cdc10e825e2db4ca194b45a53efd5d07355410f01bccea457d621d61bd3f2182fb91b279d58d6afde77888b09f47a707858c6fc87560358fb0835417aa0f018dfb47cec32dcae7c9745a12bdd489a22004af2550d7b19e590debd9254cd06718d6ef8125dad775ff4bc08453d07486b08f02c4bd02a353b69fb41d8a7aa"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000500)="86b016c9a9144044188c5079e0427a7aa6510af6e41b7f0bcdc78c80c13c9236346e3e074031fc7727a9a743183093bc2b0c8d98f7dfff98e33f46bcaa70380b9e7d178aad6d0b00264012e90f2d8b66a53e1b2f8dd5a2bed5a98d5711e083d4f854865dcdd71074b1d36708984c91c5e43ed602fdc931a8e631663ee8d84c525421bfb355c42ee1bfc9ce0d9019431c3898c6b8c3828b468234325a99fe60fb89b8eaed73598e642b9c86577d1ee24a18b1b4dbec7249d6fc859607ac3075cfb9f27b42413f06941e3f206b21773fe565a5eea6aeac5808e60d60e4aace3e066195c4ba3d3dc9c691e5164083", 0xed}, {&(0x7f0000000440)="6a2504ec6218294aa4752fec799d60b81cef18e73cdb3dab2b141dec8af8d7f5a50725acccf42b34d00211d04fab9c66dcef195ec3eeca762dd37d91ed2d2cff2d1e6fa78934ad6ffee6e6365cac2fa93021ac100a11edcc21", 0x59}], 0x2, &(0x7f0000000680)=[{0x30, 0x10d, 0x7fffffff, "5b2690d8d267b15a4780369d790bab450d56cfb216fe13b8af4acc489a"}, {0x1010, 0x10f, 0x6, "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"}, {0xb8, 0x88, 0x2, "04262fb539cf7dc616b30a48b7aa5e1dce9d616acec2c5a2e02cba8782ad18a4228be605858e48c48ea3bb420f5593d6e11ee974602c32fd89c9c0f6fb0c4e3c6f8d6dc64b092e1162867a870ac8b88a7eb9f0c65148b006fa69eb023b99c32135b630f81d401f2f9e259ad1fe6730002eb1fdaf30a6e4189eec362a170858afbc57141353e91d97d36fd2206ee48b1a2dd19fe219d423b596326ede4f56a23a747d88ad"}, {0xd8, 0x0, 0x5, "1fa8c63799ea63c60f4c8e1d3bb6be613d5b33f0d1a6ecf5b6d1819b1b1188f5ed52316f6f281e8077d86e3295b2dd6d6e40f9fc541e48c6fb8a3d99dd252c8f8081d02c0d703898395526ebdd742a909756fc3134fdff44032c0c684d4f0ca31372cb310b36e3eb0b986de2e42a1c4afbf108b774e449a8aa7a7973c67afdf39f7e692cf1d35fcdfe46e7d19ca7f6509b8c5f7f5f70e99cbb7ec2e029960315e3b8955e255a87c3ebe33f17d9928631dd6ef9549ca606c8c606217b42727cc6d1f2001e770d50c4"}, {0x38, 0x117, 0x40000000, "a4a404080d508f902446e293f1c91201fb1e8a8dd9aace0b1fb5d2e76ab4600627fcd3aff3095a"}], 0x1208}, 0x1) (async) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000380)=@usbdevfs_driver={0x81, 0x2, &(0x7f0000000300)="322968f55c7e548699d5475ce74d2d4670e74445cbad49d86abbc4082eb1caa12995f5095e3f9bd0a1da852a0922ca62997d7e591f7b247d8a3fb1218f2606581b3ca1127a50831d6363592441295c4c5ddce6169df01428283961"}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.456486][ T1121] bond0: (slave team0): Releasing backup interface [ 966.468920][ T1121] bridge0: port 13(team0) entered blocking state [ 966.469066][ T1121] bridge0: port 13(team0) entered disabled state 20:58:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188042546ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r2) (async) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendmsg$kcm(r2, &(0x7f00000018c0)={&(0x7f00000003c0)=@generic={0x38, "0cdc10e825e2db4ca194b45a53efd5d07355410f01bccea457d621d61bd3f2182fb91b279d58d6afde77888b09f47a707858c6fc87560358fb0835417aa0f018dfb47cec32dcae7c9745a12bdd489a22004af2550d7b19e590debd9254cd06718d6ef8125dad775ff4bc08453d07486b08f02c4bd02a353b69fb41d8a7aa"}, 0x80, &(0x7f0000000640)=[{&(0x7f0000000500)="86b016c9a9144044188c5079e0427a7aa6510af6e41b7f0bcdc78c80c13c9236346e3e074031fc7727a9a743183093bc2b0c8d98f7dfff98e33f46bcaa70380b9e7d178aad6d0b00264012e90f2d8b66a53e1b2f8dd5a2bed5a98d5711e083d4f854865dcdd71074b1d36708984c91c5e43ed602fdc931a8e631663ee8d84c525421bfb355c42ee1bfc9ce0d9019431c3898c6b8c3828b468234325a99fe60fb89b8eaed73598e642b9c86577d1ee24a18b1b4dbec7249d6fc859607ac3075cfb9f27b42413f06941e3f206b21773fe565a5eea6aeac5808e60d60e4aace3e066195c4ba3d3dc9c691e5164083", 0xed}, {&(0x7f0000000440)="6a2504ec6218294aa4752fec799d60b81cef18e73cdb3dab2b141dec8af8d7f5a50725acccf42b34d00211d04fab9c66dcef195ec3eeca762dd37d91ed2d2cff2d1e6fa78934ad6ffee6e6365cac2fa93021ac100a11edcc21", 0x59}], 0x2, &(0x7f0000000680)=[{0x30, 0x10d, 0x7fffffff, "5b2690d8d267b15a4780369d790bab450d56cfb216fe13b8af4acc489a"}, {0x1010, 0x10f, 0x6, "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"}, {0xb8, 0x88, 0x2, "04262fb539cf7dc616b30a48b7aa5e1dce9d616acec2c5a2e02cba8782ad18a4228be605858e48c48ea3bb420f5593d6e11ee974602c32fd89c9c0f6fb0c4e3c6f8d6dc64b092e1162867a870ac8b88a7eb9f0c65148b006fa69eb023b99c32135b630f81d401f2f9e259ad1fe6730002eb1fdaf30a6e4189eec362a170858afbc57141353e91d97d36fd2206ee48b1a2dd19fe219d423b596326ede4f56a23a747d88ad"}, {0xd8, 0x0, 0x5, "1fa8c63799ea63c60f4c8e1d3bb6be613d5b33f0d1a6ecf5b6d1819b1b1188f5ed52316f6f281e8077d86e3295b2dd6d6e40f9fc541e48c6fb8a3d99dd252c8f8081d02c0d703898395526ebdd742a909756fc3134fdff44032c0c684d4f0ca31372cb310b36e3eb0b986de2e42a1c4afbf108b774e449a8aa7a7973c67afdf39f7e692cf1d35fcdfe46e7d19ca7f6509b8c5f7f5f70e99cbb7ec2e029960315e3b8955e255a87c3ebe33f17d9928631dd6ef9549ca606c8c606217b42727cc6d1f2001e770d50c4"}, {0x38, 0x117, 0x40000000, "a4a404080d508f902446e293f1c91201fb1e8a8dd9aace0b1fb5d2e76ab4600627fcd3aff3095a"}], 0x1208}, 0x1) (async) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000380)=@usbdevfs_driver={0x81, 0x2, &(0x7f0000000300)="322968f55c7e548699d5475ce74d2d4670e74445cbad49d86abbc4082eb1caa12995f5095e3f9bd0a1da852a0922ca62997d7e591f7b247d8a3fb1218f2606581b3ca1127a50831d6363592441295c4c5ddce6169df01428283961"}) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r3}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e006558000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 966.519687][ T1123] device team0 entered promiscuous mode [ 966.519704][ T1123] device team_slave_0 entered promiscuous mode [ 966.519866][ T1123] device team_slave_1 entered promiscuous mode [ 966.553075][ T1123] bond0: (slave team0): Releasing backup interface 20:58:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188041746ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.567995][ T1123] bridge0: port 3(team0) entered blocking state [ 966.568057][ T1123] bridge0: port 3(team0) entered disabled state 20:58:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e00000e000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 966.575736][ T1125] device team0 entered promiscuous mode [ 966.575753][ T1125] device team_slave_0 entered promiscuous mode 20:58:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188041246ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000ed000095adf733d703a2d2bb49a440e04f8b2f64321b50251d072449529590a62f4418232a7f4ad3f86774c05e28"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188042546ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.575901][ T1125] device team_slave_1 entered promiscuous mode [ 966.584678][ T1125] bond0: (slave team0): Releasing backup interface [ 966.586830][ T1125] bridge0: port 3(team0) entered blocking state [ 966.586893][ T1125] bridge0: port 3(team0) entered disabled state 20:58:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e00fffff00000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040e46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.650333][ T1145] device team0 left promiscuous mode [ 966.650350][ T1145] device team_slave_1 left promiscuous mode [ 966.650644][ T1145] bridge0: port 13(team0) entered disabled state [ 966.666421][ T1145] 8021q: adding VLAN 0 to HW filter on device team0 [ 966.682752][ T1145] device team0 entered promiscuous mode [ 966.682770][ T1145] device team_slave_1 entered promiscuous mode 20:58:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000ed000095adf733d703a2d2bb49a440e04f8b2f64321b50251d072449529590a62f4418232a7f4ad3f86774c05e28"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) socket$inet_tcp(0x2, 0x1, 0x0) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.683614][ T1145] bond0: (slave team0): Enslaving as an active interface with an up link [ 966.683881][ T1144] device team0 left promiscuous mode [ 966.683895][ T1144] device team_slave_0 left promiscuous mode [ 966.684039][ T1144] device team_slave_1 left promiscuous mode 20:58:29 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040e46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040d46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.684345][ T1144] bridge0: port 3(team0) entered disabled state [ 966.720003][ T1144] 8021q: adding VLAN 0 to HW filter on device team0 [ 966.727522][ T1144] bond0: (slave team0): Enslaving as an active interface with an up link [ 966.744038][ T1145] bond0: (slave team0): Releasing backup interface 20:58:29 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040b46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:29 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000ed000095adf733d703a2d2bb49a440e04f8b2f64321b50251d072449529590a62f4418232a7f4ad3f86774c05e28"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) socket$inet_tcp(0x2, 0x1, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.755360][ T1145] bridge0: port 13(team0) entered blocking state [ 966.755424][ T1145] bridge0: port 13(team0) entered disabled state [ 966.758050][ T1150] device team0 entered promiscuous mode [ 966.758067][ T1150] device team_slave_0 entered promiscuous mode [ 966.758198][ T1150] device team_slave_1 entered promiscuous mode 20:58:29 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000e00000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:29 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e006000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 966.762564][ T1150] bond0: (slave team0): Releasing backup interface [ 966.826478][ T1156] bridge0: port 3(team0) entered disabled state [ 966.835937][ T1148] device team0 left promiscuous mode 20:58:29 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040946ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.835962][ T1148] device team_slave_0 left promiscuous mode 20:58:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040846ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.836098][ T1148] device team_slave_1 left promiscuous mode [ 966.836356][ T1148] bridge0: port 3(team0) entered disabled state [ 966.841554][ T1148] 8021q: adding VLAN 0 to HW filter on device team0 [ 966.842953][ T1148] bond0: (slave team0): Enslaving as an active interface with an up link [ 966.843151][ T1152] device team0 left promiscuous mode [ 966.843166][ T1152] device team_slave_0 left promiscuous mode [ 966.843326][ T1152] device team_slave_1 left promiscuous mode [ 966.845192][ T1152] 8021q: adding VLAN 0 to HW filter on device team0 [ 966.847850][ T1152] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$USBDEVFS_RELEASE_PORT(r1, 0x80045519, &(0x7f0000000300)=0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip6_flowlabel\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000900ed00009f97"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040746ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000e00000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 966.856296][ T1154] device team0 entered promiscuous mode [ 966.856313][ T1154] device team_slave_0 entered promiscuous mode 20:58:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040446ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 966.856472][ T1154] device team_slave_1 entered promiscuous mode [ 966.861399][ T1154] bond0: (slave team0): Releasing backup interface 20:58:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040446ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.082339][ T1173] device team0 entered promiscuous mode [ 967.082359][ T1173] device team_slave_0 entered promiscuous mode 20:58:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040346ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.082592][ T1173] device team_slave_1 entered promiscuous mode 20:58:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040346ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.094177][ T1173] bond0: (slave team0): Releasing backup interface [ 967.112235][ T1173] bridge0: port 3(team0) entered blocking state [ 967.112381][ T1173] bridge0: port 3(team0) entered disabled state 20:58:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000017f0000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$USBDEVFS_RELEASE_PORT(r1, 0x80045519, &(0x7f0000000300)=0x1) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip6_flowlabel\x00') (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000900ed00009f97"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.114630][ T1175] device team0 left promiscuous mode [ 967.114647][ T1175] device team_slave_0 left promiscuous mode [ 967.114796][ T1175] device team_slave_1 left promiscuous mode [ 967.118371][ T1175] 8021q: adding VLAN 0 to HW filter on device team0 [ 967.124444][ T1175] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:30 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$USBDEVFS_RELEASE_PORT(r1, 0x80045519, &(0x7f0000000300)=0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip6_flowlabel\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000900ed00009f97"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000600000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 967.197142][ T1175] device team0 entered promiscuous mode [ 967.197160][ T1175] device team_slave_0 entered promiscuous mode [ 967.197297][ T1175] device team_slave_1 entered promiscuous mode 20:58:30 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188002046ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:30 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$USBDEVFS_RELEASE_PORT(r1, 0x80045519, &(0x7f0000000300)=0x1) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip6_flowlabel\x00') bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000900ed00009f97"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$USBDEVFS_RELEASE_PORT(r1, 0x80045519, &(0x7f0000000300)=0x1) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000100)='net/ip6_flowlabel\x00') (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000900ed00009f97"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) [ 967.212606][ T1175] bond0: (slave team0): Releasing backup interface [ 967.298977][ T1192] device team0 left promiscuous mode [ 967.298994][ T1192] device team_slave_0 left promiscuous mode [ 967.299235][ T1192] device team_slave_1 left promiscuous mode [ 967.299506][ T1192] bridge0: port 3(team0) entered disabled state [ 967.315446][ T1192] 8021q: adding VLAN 0 to HW filter on device team0 20:58:30 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188002046ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.328979][ T1192] bond0: (slave team0): Enslaving as an active interface with an up link [ 967.329321][ T1191] device team0 left promiscuous mode [ 967.329334][ T1191] device team_slave_1 left promiscuous mode [ 967.329619][ T1191] bridge0: port 13(team0) entered disabled state 20:58:30 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000500000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 967.350252][ T1191] 8021q: adding VLAN 0 to HW filter on device team0 [ 967.384597][ T1191] device team0 entered promiscuous mode [ 967.384613][ T1191] device team_slave_1 entered promiscuous mode 20:58:30 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188ac0f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188ac0f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000dc3b8cc8f1fd11d48b8ba80100000000000000ed000895"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.385372][ T1191] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188940f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188940f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.385419][ T1196] __nla_validate_parse: 1 callbacks suppressed [ 967.387158][ T1196] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:58:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000810000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 967.401564][ T1198] device team0 left promiscuous mode [ 967.401579][ T1198] device team_slave_0 left promiscuous mode [ 967.401719][ T1198] device team_slave_1 left promiscuous mode [ 967.407535][ T1198] 8021q: adding VLAN 0 to HW filter on device team0 20:58:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188700f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.424721][ T1198] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188380f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000dc3b8cc8f1fd11d48b8ba80100000000000000ed000895"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.439321][ T1191] bond0: (slave team0): Releasing backup interface [ 967.458155][ T1191] bridge0: port 13(team0) entered blocking state 20:58:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188380f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.458212][ T1191] bridge0: port 13(team0) entered disabled state [ 967.569652][ T1206] device team0 left promiscuous mode [ 967.569670][ T1206] device team_slave_0 left promiscuous mode [ 967.569815][ T1206] device team_slave_1 left promiscuous mode 20:58:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188340f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.580023][ T1206] 8021q: adding VLAN 0 to HW filter on device team0 20:58:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e030000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188250f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.581365][ T1206] bond0: (slave team0): Enslaving as an active interface with an up link [ 967.581504][ T1203] device team0 entered promiscuous mode [ 967.581517][ T1203] device team_slave_0 entered promiscuous mode 20:58:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async, rerun: 64) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (rerun: 64) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000dc3b8cc8f1fd11d48b8ba80100000000000000ed000895"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.581648][ T1203] device team_slave_1 entered promiscuous mode [ 967.582682][ T1203] bond0: (slave team0): Releasing backup interface 20:58:31 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188250f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188210f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.607088][ T1206] device team0 entered promiscuous mode [ 967.607105][ T1206] device team_slave_0 entered promiscuous mode [ 967.607250][ T1206] device team_slave_1 entered promiscuous mode 20:58:31 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188210f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:31 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0000000f0000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 967.635458][ T1206] bond0: (slave team0): Releasing backup interface [ 967.673578][ T1216] device team0 left promiscuous mode 20:58:31 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = socket(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff00000050da146967a16767d221aa6af82e9d7ba78de2193eb1dbc6372b7a29ce7323bb1fa9ee4ede93a143401c37a54e73da28a5517fd3dd902a2513821028fac8f48c8466ba0c06e9f10d8fba5cdda024cef49935a07d5ffc6f397272db5e334a9ed8488f2e48db33a2769a61db9c518f8ca4b58ee06d9a03", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r6}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.673595][ T1216] device team_slave_1 left promiscuous mode [ 967.673871][ T1216] bridge0: port 13(team0) entered disabled state 20:58:31 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188190f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.686862][ T1216] 8021q: adding VLAN 0 to HW filter on device team0 [ 967.687986][ T1216] device team0 entered promiscuous mode [ 967.688001][ T1216] device team_slave_1 entered promiscuous mode 20:58:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188190f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.688742][ T1216] bond0: (slave team0): Enslaving as an active interface with an up link [ 967.707380][ T1222] device team0 left promiscuous mode 20:58:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188170f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188100f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.707397][ T1222] device team_slave_0 left promiscuous mode 20:58:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188100f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.707546][ T1222] device team_slave_1 left promiscuous mode [ 967.719304][ T1222] 8021q: adding VLAN 0 to HW filter on device team0 20:58:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000060000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = socket(0x10, 0x3, 0x0) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) (async) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff00000050da146967a16767d221aa6af82e9d7ba78de2193eb1dbc6372b7a29ce7323bb1fa9ee4ede93a143401c37a54e73da28a5517fd3dd902a2513821028fac8f48c8466ba0c06e9f10d8fba5cdda024cef49935a07d5ffc6f397272db5e334a9ed8488f2e48db33a2769a61db9c518f8ca4b58ee06d9a03", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r6}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.720665][ T1222] bond0: (slave team0): Enslaving as an active interface with an up link [ 967.756404][ T1222] device team0 entered promiscuous mode [ 967.756420][ T1222] device team_slave_0 entered promiscuous mode [ 967.756657][ T1222] device team_slave_1 entered promiscuous mode [ 967.803890][ T1222] bond0: (slave team0): Releasing backup interface 20:58:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = socket(0x10, 0x3, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff00000050da146967a16767d221aa6af82e9d7ba78de2193eb1dbc6372b7a29ce7323bb1fa9ee4ede93a143401c37a54e73da28a5517fd3dd902a2513821028fac8f48c8466ba0c06e9f10d8fba5cdda024cef49935a07d5ffc6f397272db5e334a9ed8488f2e48db33a2769a61db9c518f8ca4b58ee06d9a03", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r6}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000900000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 967.854648][ T1233] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. 20:58:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e000000100081880a0f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = socket(0x10, 0x3, 0x0) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r4) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff00000050da146967a16767d221aa6af82e9d7ba78de2193eb1dbc6372b7a29ce7323bb1fa9ee4ede93a143401c37a54e73da28a5517fd3dd902a2513821028fac8f48c8466ba0c06e9f10d8fba5cdda024cef49935a07d5ffc6f397272db5e334a9ed8488f2e48db33a2769a61db9c518f8ca4b58ee06d9a03", @ANYRES32=r5, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r5, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r6 = fcntl$dupfd(0xffffffffffffffff, 0x406, r3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r6}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.863090][ T1233] bond0: (slave team0): Releasing backup interface 20:58:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188050f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 967.864647][ T1233] bridge0: port 13(team0) entered blocking state [ 967.864704][ T1233] bridge0: port 13(team0) entered disabled state 20:58:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000a00000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 967.977558][ T1250] device team0 left promiscuous mode [ 967.977576][ T1250] device team_slave_0 left promiscuous mode [ 967.977727][ T1250] device team_slave_1 left promiscuous mode [ 967.986931][ T1250] 8021q: adding VLAN 0 to HW filter on device team0 [ 967.988353][ T1250] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188030f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000340)=@sco, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="73564818562f3f9246a232c96a51b4cb1e18ec241c77ece289d673191f1891f527eb60cab51f6f8ca7fc0b9c3a", 0x2d}], 0x1, &(0x7f0000000640)=[{0xa0, 0x115, 0x5, "7cbd85b6ec9039c5a690e9e83311d52a444b4e9e00dfc9504d851d2545994fa137542ccfa9e59efd4816bc42d933a684033f1c0e94f04c2ac204cda3bbc73976b2232d8baae429357086563f265c2d76bc5ac74f8402bf0e8ab974d5bbf705629ac40540cf73a503e6eaab9b77a8f2828eddc2375437f211042e3f5b1e382e702329e62c62fa6ba204"}, {0xd8, 0x103, 0x93, "9ab6dd0eee91735e608cea756ad6c8853a026e5c9abedf71d4b299456e0f7f868fc4f1b2204dbff9bb94aa2110ba430430a8470b2df23579205d5850fb603657d9a37b16c0818ecf740c0d0549bc914a6efd59847eb5a1f81533132d3787f0bcda01239022d18ed7f0ab68179d7b09bdaa7a4b7d58106498c3aaaa8fad14973ca93f6d0598b8d83e8e901221b5ce19de5c517ff37d5094e6f418f1cf3703d2bd331ee9f438bb929b6dbbc5f8363059074d3c813fceb821fc6ac34d5897ac095eb48302854b"}, {0xc8, 0x109, 0x10000, "9f3ab5179b8d136dd3cc99c63f2f0f439660238fd8fa790a4935c3ab146885c8121bb656ae1239af625384a5390f262beef8266a2e55d58fa72fbeff86a47ae968aa77438f0ed25bcfc65ce74634fbcfd9dbb7ecc806baa5772934a749acd0161b69a64001bb5afd25141cb413115f4c519c9b4b8444d2178ec537347abec8f2b3fe07c698403971d05e8977151d66056b3382716de967302a7c990647befe1e313f8da7cfae002e25191dbe709b5f969d37f1"}, {0x70, 0x103, 0x3, "a4c5afff87855bc7f76a8530c2db8c0782e4fd753da40ff53d7770cb8b0bef4f95c8e41e7eb3a9572a1f4369c6613384aea21ced0b5670748260e6f43f0add4d989a987a2a926f33ced27cf208e1967c06111104edc0d23ce027620e0a20c6"}, {0x30, 0x29, 0x101, "8f4d75dfb9a859d1f2d41f84fa6ada73261577b131e4f350605f7e7daa54b203"}], 0x2e0}, 0x44) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000300)={'veth0_to_bridge\x00', {0x2, 0x0, @local}}) preadv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000500)=""/211, 0xd3}, {&(0x7f0000000940)=""/99, 0x63}, {&(0x7f00000009c0)=""/174, 0xae}], 0x3, 0x80000000, 0x7ff) recvfrom$l2tp6(r1, &(0x7f0000000a80)=""/194, 0xc2, 0x0, &(0x7f0000000b80)={0xa, 0x0, 0x0, @local}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r3, r4, 0x12}, 0x10) dup2(r4, r5) ioctl$TIOCL_SETVESABLANK(r4, 0x541c, &(0x7f0000000bc0)) [ 968.027945][ T1252] device team0 left promiscuous mode [ 968.028045][ T1252] device team_slave_0 left promiscuous mode [ 968.028201][ T1252] device team_slave_1 left promiscuous mode [ 968.030133][ T1252] 8021q: adding VLAN 0 to HW filter on device team0 [ 968.044190][ T1252] bond0: (slave team0): Enslaving as an active interface with an up link [ 968.046602][ T1256] device team0 entered promiscuous mode [ 968.046618][ T1256] device team_slave_0 entered promiscuous mode [ 968.046758][ T1256] device team_slave_1 entered promiscuous mode [ 968.051456][ T1256] bond0: (slave team0): Releasing backup interface [ 968.053786][ T1250] device team0 entered promiscuous mode 20:58:32 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188020f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 968.053802][ T1250] device team_slave_0 entered promiscuous mode [ 968.053938][ T1250] device team_slave_1 entered promiscuous mode 20:58:32 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000e00000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.059919][ T1250] bond0: (slave team0): Releasing backup interface [ 968.100063][ T1252] device team0 entered promiscuous mode 20:58:32 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000340)=@sco, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="73564818562f3f9246a232c96a51b4cb1e18ec241c77ece289d673191f1891f527eb60cab51f6f8ca7fc0b9c3a", 0x2d}], 0x1, &(0x7f0000000640)=[{0xa0, 0x115, 0x5, "7cbd85b6ec9039c5a690e9e83311d52a444b4e9e00dfc9504d851d2545994fa137542ccfa9e59efd4816bc42d933a684033f1c0e94f04c2ac204cda3bbc73976b2232d8baae429357086563f265c2d76bc5ac74f8402bf0e8ab974d5bbf705629ac40540cf73a503e6eaab9b77a8f2828eddc2375437f211042e3f5b1e382e702329e62c62fa6ba204"}, {0xd8, 0x103, 0x93, "9ab6dd0eee91735e608cea756ad6c8853a026e5c9abedf71d4b299456e0f7f868fc4f1b2204dbff9bb94aa2110ba430430a8470b2df23579205d5850fb603657d9a37b16c0818ecf740c0d0549bc914a6efd59847eb5a1f81533132d3787f0bcda01239022d18ed7f0ab68179d7b09bdaa7a4b7d58106498c3aaaa8fad14973ca93f6d0598b8d83e8e901221b5ce19de5c517ff37d5094e6f418f1cf3703d2bd331ee9f438bb929b6dbbc5f8363059074d3c813fceb821fc6ac34d5897ac095eb48302854b"}, {0xc8, 0x109, 0x10000, "9f3ab5179b8d136dd3cc99c63f2f0f439660238fd8fa790a4935c3ab146885c8121bb656ae1239af625384a5390f262beef8266a2e55d58fa72fbeff86a47ae968aa77438f0ed25bcfc65ce74634fbcfd9dbb7ecc806baa5772934a749acd0161b69a64001bb5afd25141cb413115f4c519c9b4b8444d2178ec537347abec8f2b3fe07c698403971d05e8977151d66056b3382716de967302a7c990647befe1e313f8da7cfae002e25191dbe709b5f969d37f1"}, {0x70, 0x103, 0x3, "a4c5afff87855bc7f76a8530c2db8c0782e4fd753da40ff53d7770cb8b0bef4f95c8e41e7eb3a9572a1f4369c6613384aea21ced0b5670748260e6f43f0add4d989a987a2a926f33ced27cf208e1967c06111104edc0d23ce027620e0a20c6"}, {0x30, 0x29, 0x101, "8f4d75dfb9a859d1f2d41f84fa6ada73261577b131e4f350605f7e7daa54b203"}], 0x2e0}, 0x44) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000300)={'veth0_to_bridge\x00', {0x2, 0x0, @local}}) preadv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000500)=""/211, 0xd3}, {&(0x7f0000000940)=""/99, 0x63}, {&(0x7f00000009c0)=""/174, 0xae}], 0x3, 0x80000000, 0x7ff) recvfrom$l2tp6(r1, &(0x7f0000000a80)=""/194, 0xc2, 0x0, &(0x7f0000000b80)={0xa, 0x0, 0x0, @local}, 0x20) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r3, r4, 0x12}, 0x10) dup2(r4, r5) ioctl$TIOCL_SETVESABLANK(r4, 0x541c, &(0x7f0000000bc0)) socket$kcm(0x10, 0x2, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000340)=@sco, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="73564818562f3f9246a232c96a51b4cb1e18ec241c77ece289d673191f1891f527eb60cab51f6f8ca7fc0b9c3a", 0x2d}], 0x1, &(0x7f0000000640)=[{0xa0, 0x115, 0x5, "7cbd85b6ec9039c5a690e9e83311d52a444b4e9e00dfc9504d851d2545994fa137542ccfa9e59efd4816bc42d933a684033f1c0e94f04c2ac204cda3bbc73976b2232d8baae429357086563f265c2d76bc5ac74f8402bf0e8ab974d5bbf705629ac40540cf73a503e6eaab9b77a8f2828eddc2375437f211042e3f5b1e382e702329e62c62fa6ba204"}, {0xd8, 0x103, 0x93, "9ab6dd0eee91735e608cea756ad6c8853a026e5c9abedf71d4b299456e0f7f868fc4f1b2204dbff9bb94aa2110ba430430a8470b2df23579205d5850fb603657d9a37b16c0818ecf740c0d0549bc914a6efd59847eb5a1f81533132d3787f0bcda01239022d18ed7f0ab68179d7b09bdaa7a4b7d58106498c3aaaa8fad14973ca93f6d0598b8d83e8e901221b5ce19de5c517ff37d5094e6f418f1cf3703d2bd331ee9f438bb929b6dbbc5f8363059074d3c813fceb821fc6ac34d5897ac095eb48302854b"}, {0xc8, 0x109, 0x10000, "9f3ab5179b8d136dd3cc99c63f2f0f439660238fd8fa790a4935c3ab146885c8121bb656ae1239af625384a5390f262beef8266a2e55d58fa72fbeff86a47ae968aa77438f0ed25bcfc65ce74634fbcfd9dbb7ecc806baa5772934a749acd0161b69a64001bb5afd25141cb413115f4c519c9b4b8444d2178ec537347abec8f2b3fe07c698403971d05e8977151d66056b3382716de967302a7c990647befe1e313f8da7cfae002e25191dbe709b5f969d37f1"}, {0x70, 0x103, 0x3, "a4c5afff87855bc7f76a8530c2db8c0782e4fd753da40ff53d7770cb8b0bef4f95c8e41e7eb3a9572a1f4369c6613384aea21ced0b5670748260e6f43f0add4d989a987a2a926f33ced27cf208e1967c06111104edc0d23ce027620e0a20c6"}, {0x30, 0x29, 0x101, "8f4d75dfb9a859d1f2d41f84fa6ada73261577b131e4f350605f7e7daa54b203"}], 0x2e0}, 0x44) (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000300)={'veth0_to_bridge\x00', {0x2, 0x0, @local}}) (async) preadv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000500)=""/211, 0xd3}, {&(0x7f0000000940)=""/99, 0x63}, {&(0x7f00000009c0)=""/174, 0xae}], 0x3, 0x80000000, 0x7ff) (async) recvfrom$l2tp6(r1, &(0x7f0000000a80)=""/194, 0xc2, 0x0, &(0x7f0000000b80)={0xa, 0x0, 0x0, @local}, 0x20) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) (async) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) (async) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r3, r4, 0x12}, 0x10) (async) dup2(r4, r5) (async) ioctl$TIOCL_SETVESABLANK(r4, 0x541c, &(0x7f0000000bc0)) (async) [ 968.100081][ T1252] device team_slave_0 entered promiscuous mode 20:58:32 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008100200f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:32 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e000000100081c0040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:32 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e0c0000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 968.100242][ T1252] device team_slave_1 entered promiscuous mode [ 968.109204][ T1252] bond0: (slave team0): Releasing backup interface [ 968.126791][ T1261] device team0 left promiscuous mode [ 968.126807][ T1261] device team_slave_1 left promiscuous mode 20:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e000000100081c0040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 968.127094][ T1261] bridge0: port 13(team0) entered disabled state [ 968.132307][ T1261] 8021q: adding VLAN 0 to HW filter on device team0 [ 968.136587][ T1261] device team0 entered promiscuous mode [ 968.136603][ T1261] device team_slave_1 entered promiscuous mode [ 968.137397][ T1261] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005ea40100000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.179897][ T1261] bond0: (slave team0): Releasing backup interface [ 968.212363][ T1261] bridge0: port 13(team0) entered blocking state [ 968.212426][ T1261] bridge0: port 13(team0) entered disabled state 20:58:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e060000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') sendmsg$kcm(r1, &(0x7f0000000440)={&(0x7f0000000340)=@sco, 0x80, &(0x7f0000000400)=[{&(0x7f00000003c0)="73564818562f3f9246a232c96a51b4cb1e18ec241c77ece289d673191f1891f527eb60cab51f6f8ca7fc0b9c3a", 0x2d}], 0x1, &(0x7f0000000640)=[{0xa0, 0x115, 0x5, "7cbd85b6ec9039c5a690e9e83311d52a444b4e9e00dfc9504d851d2545994fa137542ccfa9e59efd4816bc42d933a684033f1c0e94f04c2ac204cda3bbc73976b2232d8baae429357086563f265c2d76bc5ac74f8402bf0e8ab974d5bbf705629ac40540cf73a503e6eaab9b77a8f2828eddc2375437f211042e3f5b1e382e702329e62c62fa6ba204"}, {0xd8, 0x103, 0x93, "9ab6dd0eee91735e608cea756ad6c8853a026e5c9abedf71d4b299456e0f7f868fc4f1b2204dbff9bb94aa2110ba430430a8470b2df23579205d5850fb603657d9a37b16c0818ecf740c0d0549bc914a6efd59847eb5a1f81533132d3787f0bcda01239022d18ed7f0ab68179d7b09bdaa7a4b7d58106498c3aaaa8fad14973ca93f6d0598b8d83e8e901221b5ce19de5c517ff37d5094e6f418f1cf3703d2bd331ee9f438bb929b6dbbc5f8363059074d3c813fceb821fc6ac34d5897ac095eb48302854b"}, {0xc8, 0x109, 0x10000, "9f3ab5179b8d136dd3cc99c63f2f0f439660238fd8fa790a4935c3ab146885c8121bb656ae1239af625384a5390f262beef8266a2e55d58fa72fbeff86a47ae968aa77438f0ed25bcfc65ce74634fbcfd9dbb7ecc806baa5772934a749acd0161b69a64001bb5afd25141cb413115f4c519c9b4b8444d2178ec537347abec8f2b3fe07c698403971d05e8977151d66056b3382716de967302a7c990647befe1e313f8da7cfae002e25191dbe709b5f969d37f1"}, {0x70, 0x103, 0x3, "a4c5afff87855bc7f76a8530c2db8c0782e4fd753da40ff53d7770cb8b0bef4f95c8e41e7eb3a9572a1f4369c6613384aea21ced0b5670748260e6f43f0add4d989a987a2a926f33ced27cf208e1967c06111104edc0d23ce027620e0a20c6"}, {0x30, 0x29, 0x101, "8f4d75dfb9a859d1f2d41f84fa6ada73261577b131e4f350605f7e7daa54b203"}], 0x2e0}, 0x44) (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000300)={'veth0_to_bridge\x00', {0x2, 0x0, @local}}) preadv(0xffffffffffffffff, &(0x7f0000000480)=[{&(0x7f0000000500)=""/211, 0xd3}, {&(0x7f0000000940)=""/99, 0x63}, {&(0x7f00000009c0)=""/174, 0xae}], 0x3, 0x80000000, 0x7ff) recvfrom$l2tp6(r1, &(0x7f0000000a80)=""/194, 0xc2, 0x0, &(0x7f0000000b80)={0xa, 0x0, 0x0, @local}, 0x20) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYRESHEX=r0], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) (async) r4 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r5 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r3, r4, 0x12}, 0x10) dup2(r4, r5) (async) ioctl$TIOCL_SETVESABLANK(r4, 0x541c, &(0x7f0000000bc0)) [ 968.260196][ T1269] validate_nla: 77 callbacks suppressed 20:58:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e060000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 968.260216][ T1269] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 968.260284][ T1269] device team0 left promiscuous mode [ 968.260297][ T1269] device team_slave_0 left promiscuous mode 20:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000605e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e030000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 968.260447][ T1269] device team_slave_1 left promiscuous mode [ 968.275300][ T1269] 8021q: adding VLAN 0 to HW filter on device team0 20:58:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8481000000e5e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e020000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.278844][ T1269] bond0: (slave team0): Enslaving as an active interface with an up link [ 968.309488][ T1272] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 20:58:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000025e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000340), 0x42042, 0x40) r4 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r1, r3, 0xd}, 0x10) dup2(r2, r4) ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18ff010000000000335e1dfd1441781d7b2a95"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 968.309514][ T1272] device team0 left promiscuous mode 20:58:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000605e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100065585e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 968.309526][ T1272] device team_slave_0 left promiscuous mode [ 968.309676][ T1272] device team_slave_1 left promiscuous mode [ 968.348463][ T1272] 8021q: adding VLAN 0 to HW filter on device team0 20:58:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8481000000e5e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100058655e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f84810000c005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 968.349926][ T1272] bond0: (slave team0): Enslaving as an active interface with an up link [ 968.370318][ T1274] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 968.370492][ T1274] device team0 left promiscuous mode 20:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100005005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 968.370505][ T1274] device team_slave_1 left promiscuous mode 20:58:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f84810017f005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 968.370785][ T1274] bridge0: port 13(team0) entered disabled state [ 968.397797][ T1274] 8021q: adding VLAN 0 to HW filter on device team0 20:58:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f84810000f005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100003005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.398704][ T1274] device team0 entered promiscuous mode [ 968.398718][ T1274] device team_slave_1 entered promiscuous mode 20:58:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000340), 0x42042, 0x40) r4 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r1, r3, 0xd}, 0x10) dup2(r2, r4) (async) ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18ff010000000000335e1dfd1441781d7b2a95"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010078188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f84810000a005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848107f01005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 968.399385][ T1274] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:33 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f84810f000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 968.407734][ T1272] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 968.407770][ T1272] device team0 entered promiscuous mode 20:58:33 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f84810000a005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:33 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) (async) r3 = openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000340), 0x42042, 0x40) r4 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r1, r3, 0xd}, 0x10) dup2(r2, r4) (async) ioctl$USBDEVFS_CONNECTINFO(r2, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="18ff010000000000335e1dfd1441781d7b2a95"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:33 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000000d008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:33 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100006005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.407782][ T1272] device team_slave_0 entered promiscuous mode [ 968.408033][ T1272] device team_slave_1 entered promiscuous mode 20:58:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000000b008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000f3ec000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0xc, 0x0, 0x0, 0x0, {{0x0, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x50}}, 0x0) readv(r3, &(0x7f0000001680)=[{&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/82, 0x52}, {&(0x7f0000000500)=""/148, 0x94}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000005c0)=""/43, 0x2b}, {&(0x7f0000001640)=""/27, 0x1b}], 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 968.422984][ T1272] bond0: (slave team0): Releasing backup interface [ 968.455768][ T1283] netlink: 'syz-executor.1': attribute type 10 has an invalid length. 20:58:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000009008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f84810f000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100c00005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.455797][ T1283] device team0 left promiscuous mode [ 968.455811][ T1283] device team_slave_0 left promiscuous mode [ 968.455961][ T1283] device team_slave_1 left promiscuous mode 20:58:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000f010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 968.457940][ T1283] 8021q: adding VLAN 0 to HW filter on device team0 [ 968.459366][ T1283] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100400005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000000f008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00006810008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0a13a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 968.487715][ T1287] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 968.516982][ T1283] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 968.517024][ T1283] device team0 entered promiscuous mode [ 968.517037][ T1283] device team_slave_0 entered promiscuous mode [ 968.517190][ T1283] device team_slave_1 entered promiscuous mode 20:58:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000910008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000710008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000310008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000f3ec000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0xc, 0x0, 0x0, 0x0, {{0x0, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x50}}, 0x0) readv(r3, &(0x7f0000001680)=[{&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/82, 0x52}, {&(0x7f0000000500)=""/148, 0x94}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000005c0)=""/43, 0x2b}, {&(0x7f0000001640)=""/27, 0x1b}], 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000f3ec000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) (async) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) (async) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0xc, 0x0, 0x0, 0x0, {{0x0, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x50}}, 0x0) (async) readv(r3, &(0x7f0000001680)=[{&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/82, 0x52}, {&(0x7f0000000500)=""/148, 0x94}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000005c0)=""/43, 0x2b}, {&(0x7f0000001640)=""/27, 0x1b}], 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) 20:58:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000f3ec000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0xc, 0x0, 0x0, 0x0, {{0x0, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x50}}, 0x0) readv(r3, &(0x7f0000001680)=[{&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/82, 0x52}, {&(0x7f0000000500)=""/148, 0x94}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000005c0)=""/43, 0x2b}, {&(0x7f0000001640)=""/27, 0x1b}], 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 968.518621][ T1283] bond0: (slave team0): Releasing backup interface [ 968.566861][ T1290] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 20:58:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000f3ec000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0xc, 0x0, 0x0, 0x0, {{0x0, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x50}}, 0x0) readv(r3, &(0x7f0000001680)=[{&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/82, 0x52}, {&(0x7f0000000500)=""/148, 0x94}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000005c0)=""/43, 0x2b}, {&(0x7f0000001640)=""/27, 0x1b}], 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 968.580077][ T1293] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 20:58:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000007b008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010058188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.604744][ T1293] bond0: (slave team0): Releasing backup interface 20:58:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000000f008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.608903][ T1293] bridge0: port 13(team0) entered blocking state [ 968.625286][ T1293] bridge0: port 13(team0) entered disabled state [ 968.668278][ T1297] netlink: 'syz-executor.4': attribute type 10 has an invalid length. 20:58:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00090010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 968.668304][ T1297] device team0 left promiscuous mode 20:58:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e004c0010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 968.668317][ T1297] device team_slave_0 left promiscuous mode 20:58:34 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000f3ec000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0xc, 0x0, 0x0, 0x0, {{0x0, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x50}}, 0x0) readv(r3, &(0x7f0000001680)=[{&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/82, 0x52}, {&(0x7f0000000500)=""/148, 0x94}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000005c0)=""/43, 0x2b}, {&(0x7f0000001640)=""/27, 0x1b}], 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="180000000000000000000000f3ec000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) (async) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r7, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) (async) sendmsg$nl_route_sched(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000440)=@newtfilter={0x50, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {}, {0x7}}, [@filter_kind_options=@f_basic={{0xa}, {0x20, 0x2, [@TCA_BASIC_EMATCHES={0x1c, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x10, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0xc, 0x0, 0x0, 0x0, {{0x0, 0x7}}}]}, @TCA_EMATCH_TREE_HDR={0x8}]}]}}]}, 0x50}}, 0x0) (async) readv(r3, &(0x7f0000001680)=[{&(0x7f0000000300)=""/167, 0xa7}, {&(0x7f00000003c0)=""/82, 0x52}, {&(0x7f0000000500)=""/148, 0x94}, {&(0x7f0000000440)=""/28, 0x1c}, {&(0x7f0000000640)=""/4096, 0x1000}, {&(0x7f0000000480)=""/23, 0x17}, {&(0x7f00000005c0)=""/43, 0x2b}, {&(0x7f0000001640)=""/27, 0x1b}], 0x8) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) 20:58:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000a10008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.668454][ T1297] device team_slave_1 left promiscuous mode [ 968.676955][ T1297] 8021q: adding VLAN 0 to HW filter on device team0 20:58:34 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000f010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 968.678519][ T1297] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:34 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e0000000a008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:34 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00008110008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 968.741392][ T1303] device team0 left promiscuous mode 20:58:34 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00586510008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:34 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00070010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 968.741409][ T1303] device team_slave_0 left promiscuous mode [ 968.742861][ T1303] device team_slave_1 left promiscuous mode 20:58:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00040010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e05000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 968.758093][ T1303] 8021q: adding VLAN 0 to HW filter on device team0 [ 968.759536][ T1303] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00655810008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.777872][ T1304] device team0 left promiscuous mode 20:58:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r4 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) dup2(r3, r4) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000300)=@usbdevfs_connect={0x80}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) socket$inet(0x2, 0x1, 0x101) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00a00110008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000a10008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.777889][ T1304] device team_slave_1 left promiscuous mode [ 968.778145][ T1304] bridge0: port 13(team0) entered disabled state 20:58:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00040010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 968.826527][ T1304] 8021q: adding VLAN 0 to HW filter on device team0 [ 968.847398][ T1304] device team0 entered promiscuous mode 20:58:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e000c0010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.847416][ T1304] device team_slave_1 entered promiscuous mode [ 968.848290][ T1304] bond0: (slave team0): Enslaving as an active interface with an up link [ 968.862794][ T1308] bond0: (slave team0): Releasing backup interface [ 968.887059][ T1308] bridge0: port 13(team0) entered blocking state 20:58:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00500010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00600010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.889993][ T1308] bridge0: port 13(team0) entered disabled state [ 968.947786][ T1310] device team0 entered promiscuous mode 20:58:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x6000000, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2ea4010010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 968.947804][ T1310] device team_slave_0 entered promiscuous mode [ 968.947955][ T1310] device team_slave_1 entered promiscuous mode 20:58:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e07000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0e000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 968.962489][ T1310] bond0: (slave team0): Releasing backup interface [ 969.009712][ T1317] device team0 entered promiscuous mode [ 969.009730][ T1317] device team_slave_0 entered promiscuous mode 20:58:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xc00, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 969.009876][ T1317] device team_slave_1 entered promiscuous mode [ 969.021937][ T1317] bond0: (slave team0): Releasing backup interface 20:58:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r4 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) dup2(r3, r4) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000300)=@usbdevfs_connect={0x80}) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) (async) socket$inet(0x2, 0x1, 0x101) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xa00, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x500, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 969.087388][ T1320] device team0 left promiscuous mode 20:58:35 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r4 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) dup2(r3, r4) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000300)=@usbdevfs_connect={0x80}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) socket$inet(0x2, 0x1, 0x101) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x1ee, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) 20:58:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000000e008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 969.087404][ T1320] device team_slave_1 left promiscuous mode [ 969.087718][ T1320] bridge0: port 13(team0) entered disabled state [ 969.107186][ T1320] 8021q: adding VLAN 0 to HW filter on device team0 [ 969.126192][ T1320] device team0 entered promiscuous mode [ 969.126210][ T1320] device team_slave_1 entered promiscuous mode 20:58:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) (async) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) (async) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r4 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) dup2(r3, r4) (async, rerun: 64) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000300)=@usbdevfs_connect={0x80}) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) socket$inet(0x2, 0x1, 0x101) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r5}, 0x10) (async, rerun: 64) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="1000000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 969.126977][ T1320] bond0: (slave team0): Enslaving as an active interface with an up link 20:58:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:35 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e0000000a008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 969.206853][ T1332] device team0 entered promiscuous mode [ 969.206870][ T1332] device team_slave_0 entered promiscuous mode 20:58:35 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xc, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) fcntl$dupfd(r0, 0x0, r1) [ 969.207027][ T1332] device team_slave_1 entered promiscuous mode [ 969.245283][ T1332] bond0: (slave team0): Releasing backup interface 20:58:35 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000006008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 969.249506][ T1332] bridge0: port 3(team0) entered blocking state 20:58:35 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0xfffff000, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:35 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$FITHAW(r2, 0xc0045878) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x406, r7) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x60000000, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) 20:58:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x9effffff, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) 20:58:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x10000000, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00'}, 0x10) [ 969.249732][ T1332] bridge0: port 3(team0) entered disabled state [ 969.319718][ T1336] bond0: (slave team0): Releasing backup interface 20:58:36 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x81000000, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 969.321395][ T1336] bridge0: port 13(team0) entered blocking state [ 969.321530][ T1336] bridge0: port 13(team0) entered disabled state 20:58:36 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="1000000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:36 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="0f00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) [ 969.400962][ T1344] device team0 left promiscuous mode 20:58:36 executing program 4: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x60000000, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(r0, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) [ 969.400979][ T1344] device team_slave_0 left promiscuous mode [ 969.401135][ T1344] device team_slave_1 left promiscuous mode [ 969.403174][ T1344] 8021q: adding VLAN 0 to HW filter on device team0 20:58:36 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x2000, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) 20:58:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) (fail_nth: 1) 20:58:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) (fail_nth: 1) [ 969.404560][ T1344] bond0: (slave team0): Enslaving as an active interface with an up link [ 969.418228][ T1346] device team0 left promiscuous mode [ 969.418252][ T1346] device team_slave_0 left promiscuous mode 20:58:36 executing program 3: r0 = socket$kcm(0x10, 0x2, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) r2 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) ioctl$FITHAW(r2, 0xc0045878) r3 = socket(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) fcntl$dupfd(r3, 0x406, r7) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) socket$kcm(0x10, 0x2, 0x0) (async) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') (async) ioctl$USBDEVFS_CONNECTINFO(r1, 0x40085511, &(0x7f00000002c0)) (async) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f0000000180)={r1}) (async) sendmsg$kcm(r0, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f848100000005e000000000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="18000000000000000000000000ed000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) (async) ioctl$FITHAW(r2, 0xc0045878) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x803, 0x0) (async) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r5) (async) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000080)=0x14) (async) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11ffffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) (async) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x48, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_htb={{0x8}, {0x1c, 0x2, [@TCA_HTB_INIT={0x18}]}}]}, 0x48}}, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) socket(0x10, 0x3, 0x0) (async) socket$nl_route(0x10, 0x3, 0x0) (async) fcntl$dupfd(r3, 0x406, r7) (async) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0xa7, &(0x7f0000000040)=[{&(0x7f00000000c0)="2e00000010008188040f46ecdb4cb9cca7480ef410000000e3bd6efb440309000e000a000d000000ba8000001201", 0x2e}], 0x1}, 0x0) (async) 20:58:36 executing program 1: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) r4 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) dup2(r3, r4) (fail_nth: 1) [ 969.418407][ T1346] device team_slave_1 left promiscuous mode [ 969.433244][ T1346] 8021q: adding VLAN 0 to HW filter on device team0 20:58:36 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000300)=""/202, 0xca}], 0x1, 0x0, 0x0) (fail_nth: 1) 20:58:36 executing program 2: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) (fail_nth: 2) 20:58:36 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r0, r1, 0x12}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000240)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r2, r3, 0x12}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x17, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup\x00', 0x0, 0x0) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r4, r5, 0x12}, 0x10) (fail_nth: 2) [ 969.438838][ T1346] bond0: (slave team0): Enslaving as an active interface with an up link [ 969.440206][ T1347] device team0 left promiscuous mode 20:58:36 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='limits\x00') preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000300)=""/202, 0xca}], 0x1, 0x0, 0x0) (fail_nth: 2) [ 969.440220][ T1347] device team_slave_1 left promiscuous mode [ 969.440511][ T1347] bridge0: port 13(team0) entered disabled state [ 969.440511][ T1347] bridge0: port 13(team0) entered disabled state [ 969.492713][ T1347] 8021q: adding VLAN 0 to HW filter on device team0 [ 969.531389][ T1347] device team0 entered promiscuous mode [ 969.531408][ T1347] device team_slave_1 entered promiscuous mode [ 969.532172][ T1347] bond0: (slave team0): Enslaving as an active interface with an up link [ 969.532317][ T1344] device team0 entered promiscuous mode [ 969.532330][ T1344] device team_slave_0 entered promiscuous mode [ 969.532538][ T1344] device team_slave_1 entered promiscuous mode [ 969.553610][ T1344] bond0: (slave team0): Releasing backup interface [ 969.587111][ T1353] device team0 left promiscuous mode [ 969.587128][ T1353] device team_slave_0 left promiscuous mode [ 969.587263][ T1353] device team_slave_1 left promiscuous mode [ 969.587520][ T1353] bridge0: port 3(team0) entered disabled state [ 969.610142][ T1353] 8021q: adding VLAN 0 to HW filter on device team0 [ 969.611551][ T1353] bond0: (slave team0): Enslaving as an active interface with an up link [ 969.614448][ T1354] bond0: (slave team0): Releasing backup interface [ 969.628096][ T1354] bridge0: port 13(team0) entered blocking state [ 969.628191][ T1354] bridge0: port 13(team0) entered disabled state [ 969.648343][ T1356] device team0 entered promiscuous mode [ 969.648360][ T1356] device team_slave_0 entered promiscuous mode [ 969.648505][ T1356] device team_slave_1 entered promiscuous mode [ 969.656917][ T1356] bond0: (slave team0): Releasing backup interface [ 969.695127][ T1361] device team0 entered promiscuous mode [ 969.695144][ T1361] device team_slave_0 entered promiscuous mode [ 969.695276][ T1361] device team_slave_1 entered promiscuous mode [ 969.734648][ T1361] bond0: (slave team0): Releasing backup interface [ 969.817759][ T1370] device team0 left promiscuous mode [ 969.817776][ T1370] device team_slave_0 left promiscuous mode [ 969.817928][ T1370] device team_slave_1 left promiscuous mode [ 969.819843][ T1370] 8021q: adding VLAN 0 to HW filter on device team0 [ 969.821242][ T1370] bond0: (slave team0): Enslaving as an active interface with an up link [ 969.864390][ T1370] device team0 entered promiscuous mode [ 969.864408][ T1370] device team_slave_0 entered promiscuous mode [ 969.864567][ T1370] device team_slave_1 entered promiscuous mode [ 969.886891][ T1370] bond0: (slave team0): Releasing backup interface [ 969.923784][ T1375] device team0 left promiscuous mode [ 969.923800][ T1375] device team_slave_0 left promiscuous mode [ 969.923934][ T1375] device team_slave_1 left promiscuous mode [ 969.959073][ T1375] 8021q: adding VLAN 0 to HW filter on device team0 [ 969.969603][ T1375] bond0: (slave team0): Enslaving as an active interface with an up link [ 969.969711][ T1378] device team0 left promiscuous mode [ 969.969725][ T1378] device team_slave_0 left promiscuous mode [ 969.969852][ T1378] device team_slave_1 left promiscuous mode [ 969.971586][ T1378] 8021q: adding VLAN 0 to HW filter on device team0 [ 969.972883][ T1378] bond0: (slave team0): Enslaving as an active interface with an up link [ 970.005234][ T1375] device team0 entered promiscuous mode [ 970.005251][ T1375] device team_slave_0 entered promiscuous mode [ 970.005404][ T1375] device team_slave_1 entered promiscuous mode [ 970.009678][ T1375] bond0: (slave team0): Releasing backup interface [ 970.035447][ T1375] bridge0: port 3(team0) entered blocking state [ 970.036102][ T1375] bridge0: port 3(team0) entered disabled state [ 970.043424][ T1378] device team0 entered promiscuous mode [ 970.043441][ T1378] device team_slave_0 entered promiscuous mode [ 970.043594][ T1378] device team_slave_1 entered promiscuous mode [ 970.048242][ T1378] bond0: (slave team0): Releasing backup interface [ 970.101195][ T1390] device team0 left promiscuous mode [ 970.101212][ T1390] device team_slave_0 left promiscuous mode [ 970.101357][ T1390] device team_slave_1 left promiscuous mode [ 970.114023][ T1390] 8021q: adding VLAN 0 to HW filter on device team0 [ 970.141426][ T1390] bond0: (slave team0): Enslaving as an active interface with an up link [ 970.164109][ T1390] device team0 entered promiscuous mode [ 970.164127][ T1390] device team_slave_0 entered promiscuous mode [ 970.164280][ T1390] device team_slave_1 entered promiscuous mode [ 970.186414][ T1390] bond0: (slave team0): Releasing backup interface [ 970.239051][ T1397] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 970.239568][ T1397] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 970.288709][ T1397] device team0 left promiscuous mode [ 970.288726][ T1397] device team_slave_1 left promiscuous mode [ 970.289032][ T1397] bridge0: port 13(team0) entered disabled state [ 970.306187][ T1397] 8021q: adding VLAN 0 to HW filter on device team0 [ 970.320714][ T1397] device team0 entered promiscuous mode [ 970.320731][ T1397] device team_slave_1 entered promiscuous mode [ 970.322695][ T1397] bond0: (slave team0): Enslaving as an active interface with an up link [ 970.377403][ T1397] bond0: (slave team0): Releasing backup interface [ 970.422751][ T1397] bridge0: port 13(team0) entered blocking state [ 970.422814][ T1397] bridge0: port 13(team0) entered disabled state [ 970.431086][ T1406] device team0 left promiscuous mode [ 970.431103][ T1406] device team_slave_0 left promiscuous mode [ 970.431232][ T1406] device team_slave_1 left promiscuous mode [ 970.431543][ T1406] bridge0: port 3(team0) entered disabled state [ 970.441517][ T1406] 8021q: adding VLAN 0 to HW filter on device team0 [ 970.446612][ T1406] bond0: (slave team0): Enslaving as an active interface with an up link [ 970.446707][ T1408] device team0 left promiscuous mode [ 970.446720][ T1408] device team_slave_0 left promiscuous mode [ 970.446851][ T1408] device team_slave_1 left promiscuous mode [ 970.450571][ T1408] 8021q: adding VLAN 0 to HW filter on device team0 [ 970.453384][ T1408] bond0: (slave team0): Enslaving as an active interface with an up link [ 970.453577][ T1409] device team0 left promiscuous mode [ 970.453594][ T1409] device team_slave_0 left promiscuous mode [ 970.453735][ T1409] device team_slave_1 left promiscuous mode [ 970.458656][ T1409] 8021q: adding VLAN 0 to HW filter on device team0 [ 970.460108][ T1409] bond0: (slave team0): Enslaving as an active interface with an up link [ 970.460273][ T1411] device team0 entered promiscuous mode [ 970.460286][ T1411] device team_slave_0 entered promiscuous mode [ 970.460419][ T1411] device team_slave_1 entered promiscuous mode [ 970.483185][ T1411] bond0: (slave team0): Releasing backup interface [ 970.614954][ T1419] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 970.618190][ T1419] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 970.677965][ T1427] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 970.678671][ T1427] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 970.729939][ T1424] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 970.745203][ T1420] device team0 left promiscuous mode [ 970.745220][ T1420] device team_slave_1 left promiscuous mode [ 970.745543][ T1420] bridge0: port 13(team0) entered disabled state [ 970.776706][ T1420] 8021q: adding VLAN 0 to HW filter on device team0 [ 970.779985][ T1420] device team0 entered promiscuous mode [ 970.780001][ T1420] device team_slave_1 entered promiscuous mode [ 970.780968][ T1420] bond0: (slave team0): Enslaving as an active interface with an up link [ 970.781051][ T1433] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 970.858348][ T1427] device team0 entered promiscuous mode [ 970.858373][ T1427] device team_slave_0 entered promiscuous mode [ 970.858515][ T1427] device team_slave_1 entered promiscuous mode [ 970.868816][ T1427] bond0: (slave team0): Releasing backup interface [ 970.880531][ T1427] bridge0: port 3(team0) entered blocking state [ 970.895776][ T1427] bridge0: port 3(team0) entered disabled state [ 970.911681][ T1438] device team0 left promiscuous mode [ 970.911697][ T1438] device team_slave_0 left promiscuous mode [ 970.911842][ T1438] device team_slave_1 left promiscuous mode [ 970.933921][ T1438] 8021q: adding VLAN 0 to HW filter on device team0 [ 970.942760][ T1438] bond0: (slave team0): Enslaving as an active interface with an up link [ 970.984434][ T1424] device team0 entered promiscuous mode [ 970.984452][ T1424] device team_slave_0 entered promiscuous mode [ 970.984598][ T1424] device team_slave_1 entered promiscuous mode [ 970.988510][ T1424] bond0: (slave team0): Releasing backup interface [ 970.998971][ T1424] bridge0: port 3(team0) entered blocking state [ 970.999036][ T1424] bridge0: port 3(team0) entered disabled state [ 971.014985][ T1438] device team0 entered promiscuous mode [ 971.015004][ T1438] device team_slave_0 entered promiscuous mode [ 971.015166][ T1438] device team_slave_1 entered promiscuous mode [ 971.049506][ T1438] bond0: (slave team0): Releasing backup interface [ 971.135738][ T1449] device team0 left promiscuous mode [ 971.135756][ T1449] device team_slave_0 left promiscuous mode [ 971.135911][ T1449] device team_slave_1 left promiscuous mode [ 971.136170][ T1449] bridge0: port 3(team0) entered disabled state [ 971.153177][ T1449] 8021q: adding VLAN 0 to HW filter on device team0 [ 971.154563][ T1449] bond0: (slave team0): Enslaving as an active interface with an up link [ 971.154672][ T1451] device team0 entered promiscuous mode [ 971.154685][ T1451] device team_slave_0 entered promiscuous mode [ 971.154821][ T1451] device team_slave_1 entered promiscuous mode [ 971.171892][ T1451] bond0: (slave team0): Releasing backup interface [ 971.220141][ T1455] device team0 left promiscuous mode [ 971.220159][ T1455] device team_slave_0 left promiscuous mode [ 971.220290][ T1455] device team_slave_1 left promiscuous mode [ 971.220548][ T1455] bridge0: port 3(team0) entered disabled state [ 971.242835][ T1455] 8021q: adding VLAN 0 to HW filter on device team0 [ 971.244253][ T1455] bond0: (slave team0): Enslaving as an active interface with an up link [ 971.270685][ T1460] bond0: (slave team0): Releasing backup interface [ 971.279578][ T1460] bridge0: port 13(team0) entered blocking state [ 971.282245][ T1460] bridge0: port 13(team0) entered disabled state [ 971.288039][ T1455] device team0 entered promiscuous mode [ 971.288056][ T1455] device team_slave_0 entered promiscuous mode [ 971.288205][ T1455] device team_slave_1 entered promiscuous mode [ 971.292141][ T1455] bond0: (slave team0): Releasing backup interface [ 971.310981][ T1461] device team0 left promiscuous mode [ 971.310999][ T1461] device team_slave_0 left promiscuous mode [ 971.311136][ T1461] device team_slave_1 left promiscuous mode [ 971.313032][ T1461] 8021q: adding VLAN 0 to HW filter on device team0 [ 971.314464][ T1461] bond0: (slave team0): Enslaving as an active interface with an up link [ 971.459826][ T1469] device team0 left promiscuous mode [ 971.459841][ T1469] device team_slave_1 left promiscuous mode [ 971.460083][ T1469] bridge0: port 13(team0) entered disabled state [ 971.511606][ T1469] 8021q: adding VLAN 0 to HW filter on device team0 [ 971.514087][ T1469] device team0 entered promiscuous mode [ 971.514102][ T1469] device team_slave_1 entered promiscuous mode [ 971.514797][ T1469] bond0: (slave team0): Enslaving as an active interface with an up link [ 971.514923][ T1472] device team0 left promiscuous mode [ 971.514938][ T1472] device team_slave_0 left promiscuous mode [ 971.515060][ T1472] device team_slave_1 left promiscuous mode [ 971.518569][ T1472] 8021q: adding VLAN 0 to HW filter on device team0 [ 971.527366][ T1472] bond0: (slave team0): Enslaving as an active interface with an up link [ 971.551137][ T1476] bond0: (slave team0): Releasing backup interface [ 971.567368][ T1476] bridge0: port 13(team0) entered blocking state [ 971.567430][ T1476] bridge0: port 13(team0) entered disabled state [ 971.605377][ T1472] device team0 entered promiscuous mode [ 971.605395][ T1472] device team_slave_0 entered promiscuous mode [ 971.605977][ T1472] device team_slave_1 entered promiscuous mode [ 971.610796][ T1472] bond0: (slave team0): Releasing backup interface [ 971.629167][ T1472] bridge0: port 3(team0) entered blocking state [ 971.629574][ T1472] bridge0: port 3(team0) entered disabled state [ 971.712029][ T1491] device team0 left promiscuous mode [ 971.712047][ T1491] device team_slave_0 left promiscuous mode [ 971.712192][ T1491] device team_slave_1 left promiscuous mode [ 971.725748][ T1491] 8021q: adding VLAN 0 to HW filter on device team0 [ 971.731806][ T1491] bond0: (slave team0): Enslaving as an active interface with an up link [ 971.842732][ T1498] device team0 left promiscuous mode [ 971.842749][ T1498] device team_slave_1 left promiscuous mode [ 971.843133][ T1498] bridge0: port 13(team0) entered disabled state [ 971.872367][ T1498] 8021q: adding VLAN 0 to HW filter on device team0 [ 971.874303][ T1498] device team0 entered promiscuous mode [ 971.874369][ T1498] device team_slave_1 entered promiscuous mode [ 971.879878][ T1498] bond0: (slave team0): Enslaving as an active interface with an up link [ 971.880014][ T1491] device team0 entered promiscuous mode [ 971.880028][ T1491] device team_slave_0 entered promiscuous mode [ 971.880166][ T1491] device team_slave_1 entered promiscuous mode [ 971.881557][ T1491] bond0: (slave team0): Releasing backup interface [ 971.899363][ T1499] device team0 left promiscuous mode [ 971.899380][ T1499] device team_slave_0 left promiscuous mode [ 971.899523][ T1499] device team_slave_1 left promiscuous mode [ 971.899795][ T1499] bridge0: port 3(team0) entered disabled state [ 971.911276][ T1499] 8021q: adding VLAN 0 to HW filter on device team0 [ 971.913710][ T1499] bond0: (slave team0): Enslaving as an active interface with an up link [ 971.919231][ T1498] bond0: (slave team0): Releasing backup interface [ 971.934157][ T1498] bridge0: port 13(team0) entered blocking state [ 971.934215][ T1498] bridge0: port 13(team0) entered disabled state [ 971.999842][ T1506] device team0 left promiscuous mode [ 971.999860][ T1506] device team_slave_0 left promiscuous mode [ 971.999996][ T1506] device team_slave_1 left promiscuous mode [ 972.000243][ T1506] bridge0: port 3(team0) entered disabled state [ 972.043405][ T1506] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.044887][ T1506] bond0: (slave team0): Enslaving as an active interface with an up link [ 972.045022][ T1499] device team0 entered promiscuous mode [ 972.045035][ T1499] device team_slave_0 entered promiscuous mode [ 972.045165][ T1499] device team_slave_1 entered promiscuous mode [ 972.058831][ T1499] bond0: (slave team0): Releasing backup interface [ 972.079350][ T1517] device team0 left promiscuous mode [ 972.079368][ T1517] device team_slave_0 left promiscuous mode [ 972.079515][ T1517] device team_slave_1 left promiscuous mode [ 972.081433][ T1517] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.082833][ T1517] bond0: (slave team0): Enslaving as an active interface with an up link [ 972.120352][ T1523] device team0 entered promiscuous mode [ 972.120371][ T1523] device team_slave_0 entered promiscuous mode [ 972.120528][ T1523] device team_slave_1 entered promiscuous mode [ 972.128620][ T1523] bond0: (slave team0): Releasing backup interface [ 972.130031][ T1517] device team0 entered promiscuous mode [ 972.130046][ T1517] device team_slave_0 entered promiscuous mode [ 972.130188][ T1517] device team_slave_1 entered promiscuous mode [ 972.131637][ T1517] bond0: (slave team0): Releasing backup interface [ 972.239550][ T1526] device team0 left promiscuous mode [ 972.239568][ T1526] device team_slave_1 left promiscuous mode [ 972.239859][ T1526] bridge0: port 13(team0) entered disabled state [ 972.274345][ T1526] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.277718][ T1526] device team0 entered promiscuous mode [ 972.277734][ T1526] device team_slave_1 entered promiscuous mode [ 972.278481][ T1526] bond0: (slave team0): Enslaving as an active interface with an up link [ 972.314056][ T1526] bond0: (slave team0): Releasing backup interface [ 972.342918][ T1526] bridge0: port 13(team0) entered blocking state [ 972.342982][ T1526] bridge0: port 13(team0) entered disabled state [ 972.348943][ T1535] device team0 left promiscuous mode [ 972.348958][ T1535] device team_slave_0 left promiscuous mode [ 972.349088][ T1535] device team_slave_1 left promiscuous mode [ 972.351040][ T1535] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.376628][ T1535] bond0: (slave team0): Enslaving as an active interface with an up link [ 972.376748][ T1532] device team0 left promiscuous mode [ 972.376762][ T1532] device team_slave_0 left promiscuous mode [ 972.376903][ T1532] device team_slave_1 left promiscuous mode [ 972.378644][ T1532] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.379975][ T1532] bond0: (slave team0): Enslaving as an active interface with an up link [ 972.388247][ T1536] device team0 entered promiscuous mode [ 972.388262][ T1536] device team_slave_0 entered promiscuous mode [ 972.388415][ T1536] device team_slave_1 entered promiscuous mode [ 972.396970][ T1536] bond0: (slave team0): Releasing backup interface [ 972.411748][ T1537] device team0 left promiscuous mode [ 972.411764][ T1537] device team_slave_0 left promiscuous mode [ 972.411925][ T1537] device team_slave_1 left promiscuous mode [ 972.414165][ T1537] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.419268][ T1537] bond0: (slave team0): Enslaving as an active interface with an up link [ 972.463287][ T1537] device team0 entered promiscuous mode [ 972.463304][ T1537] device team_slave_0 entered promiscuous mode [ 972.463454][ T1537] device team_slave_1 entered promiscuous mode [ 972.469349][ T1537] bond0: (slave team0): Releasing backup interface [ 972.528435][ T1543] device team0 left promiscuous mode [ 972.528452][ T1543] device team_slave_1 left promiscuous mode [ 972.528730][ T1543] bridge0: port 13(team0) entered disabled state [ 972.556603][ T1543] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.561180][ T1543] device team0 entered promiscuous mode [ 972.561200][ T1543] device team_slave_1 entered promiscuous mode [ 972.571259][ T1543] bond0: (slave team0): Enslaving as an active interface with an up link [ 972.677044][ T1552] device team0 entered promiscuous mode [ 972.677061][ T1552] device team_slave_0 entered promiscuous mode [ 972.677213][ T1552] device team_slave_1 entered promiscuous mode [ 972.689422][ T1552] bond0: (slave team0): Releasing backup interface [ 972.721315][ T1556] bond0: (slave team0): Releasing backup interface [ 972.723088][ T1556] bridge0: port 13(team0) entered blocking state [ 972.723296][ T1556] bridge0: port 13(team0) entered disabled state [ 972.725719][ T1551] device team0 entered promiscuous mode [ 972.725736][ T1551] device team_slave_0 entered promiscuous mode [ 972.725867][ T1551] device team_slave_1 entered promiscuous mode [ 972.727881][ T1551] bond0: (slave team0): Releasing backup interface [ 972.729390][ T1559] device team0 left promiscuous mode [ 972.729405][ T1559] device team_slave_0 left promiscuous mode [ 972.729538][ T1559] device team_slave_1 left promiscuous mode [ 972.731277][ T1559] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.732550][ T1559] bond0: (slave team0): Enslaving as an active interface with an up link [ 972.737173][ T1553] device team0 entered promiscuous mode [ 972.737187][ T1553] device team_slave_0 entered promiscuous mode [ 972.738010][ T1553] device team_slave_1 entered promiscuous mode [ 972.739986][ T1553] bond0: (slave team0): Releasing backup interface [ 972.786327][ T1559] device team0 entered promiscuous mode [ 972.786344][ T1559] device team_slave_0 entered promiscuous mode [ 972.786506][ T1559] device team_slave_1 entered promiscuous mode [ 972.806226][ T1559] bond0: (slave team0): Releasing backup interface [ 972.842682][ T1562] device team0 left promiscuous mode [ 972.842699][ T1562] device team_slave_0 left promiscuous mode [ 972.842842][ T1562] device team_slave_1 left promiscuous mode [ 972.851682][ T1562] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.862899][ T1562] bond0: (slave team0): Enslaving as an active interface with an up link [ 972.879498][ T1568] device team0 left promiscuous mode [ 972.879514][ T1568] device team_slave_1 left promiscuous mode [ 972.879788][ T1568] bridge0: port 13(team0) entered disabled state [ 972.900448][ T1568] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.902972][ T1568] device team0 entered promiscuous mode [ 972.902987][ T1568] device team_slave_1 entered promiscuous mode [ 972.905193][ T1568] bond0: (slave team0): Enslaving as an active interface with an up link [ 972.905319][ T1567] device team0 left promiscuous mode [ 972.905333][ T1567] device team_slave_0 left promiscuous mode [ 972.906024][ T1567] device team_slave_1 left promiscuous mode [ 972.907891][ T1567] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.909303][ T1567] bond0: (slave team0): Enslaving as an active interface with an up link [ 972.909457][ T1562] device team0 entered promiscuous mode [ 972.909470][ T1562] device team_slave_0 entered promiscuous mode [ 972.909612][ T1562] device team_slave_1 entered promiscuous mode [ 972.911195][ T1562] bond0: (slave team0): Releasing backup interface [ 972.931729][ T1564] device team0 left promiscuous mode [ 972.931747][ T1564] device team_slave_0 left promiscuous mode [ 972.931895][ T1564] device team_slave_1 left promiscuous mode [ 972.933667][ T1564] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.934978][ T1564] bond0: (slave team0): Enslaving as an active interface with an up link [ 972.942311][ T1568] __nla_validate_parse: 7 callbacks suppressed [ 972.942331][ T1568] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 972.953319][ T1570] device team0 left promiscuous mode [ 972.953338][ T1570] device team_slave_0 left promiscuous mode [ 972.953488][ T1570] device team_slave_1 left promiscuous mode [ 972.964333][ T1570] 8021q: adding VLAN 0 to HW filter on device team0 [ 972.981751][ T1570] bond0: (slave team0): Enslaving as an active interface with an up link [ 972.981882][ T1567] device team0 entered promiscuous mode [ 972.981896][ T1567] device team_slave_0 entered promiscuous mode [ 972.982037][ T1567] device team_slave_1 entered promiscuous mode [ 972.983495][ T1567] bond0: (slave team0): Releasing backup interface [ 973.021098][ T1568] bond0: (slave team0): Releasing backup interface [ 973.042174][ T1568] bridge0: port 13(team0) entered blocking state [ 973.042229][ T1568] bridge0: port 13(team0) entered disabled state [ 973.052443][ T1570] device team0 entered promiscuous mode [ 973.052461][ T1570] device team_slave_0 entered promiscuous mode [ 973.052599][ T1570] device team_slave_1 entered promiscuous mode [ 973.067019][ T1570] bond0: (slave team0): Releasing backup interface [ 973.098191][ T1577] device team0 left promiscuous mode [ 973.098209][ T1577] device team_slave_0 left promiscuous mode [ 973.098347][ T1577] device team_slave_1 left promiscuous mode [ 973.110682][ T1577] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.117462][ T1577] bond0: (slave team0): Enslaving as an active interface with an up link [ 973.150703][ T1580] device team0 left promiscuous mode [ 973.150722][ T1580] device team_slave_0 left promiscuous mode [ 973.150881][ T1580] device team_slave_1 left promiscuous mode [ 973.155383][ T1580] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.168244][ T1580] bond0: (slave team0): Enslaving as an active interface with an up link [ 973.168388][ T1578] device team0 entered promiscuous mode [ 973.168402][ T1578] device team_slave_0 entered promiscuous mode [ 973.168530][ T1578] device team_slave_1 entered promiscuous mode [ 973.176932][ T1578] bond0: (slave team0): Releasing backup interface [ 973.179897][ T1577] device team0 entered promiscuous mode [ 973.179912][ T1577] device team_slave_0 entered promiscuous mode [ 973.180054][ T1577] device team_slave_1 entered promiscuous mode [ 973.183681][ T1577] bond0: (slave team0): Releasing backup interface [ 973.213044][ T1583] device team0 left promiscuous mode [ 973.213060][ T1583] device team_slave_0 left promiscuous mode [ 973.213208][ T1583] device team_slave_1 left promiscuous mode [ 973.228142][ T1583] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.240899][ T1583] bond0: (slave team0): Enslaving as an active interface with an up link [ 973.247381][ T1591] device team0 left promiscuous mode [ 973.247399][ T1591] device team_slave_0 left promiscuous mode [ 973.247669][ T1591] device team_slave_1 left promiscuous mode [ 973.277441][ T1591] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.281481][ T1591] bond0: (slave team0): Enslaving as an active interface with an up link [ 973.288458][ T1585] validate_nla: 107 callbacks suppressed [ 973.288477][ T1585] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 973.289845][ T1585] device team0 left promiscuous mode [ 973.289858][ T1585] device team_slave_1 left promiscuous mode [ 973.290103][ T1585] bridge0: port 13(team0) entered disabled state [ 973.309840][ T1585] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.320059][ T1585] device team0 entered promiscuous mode [ 973.320074][ T1585] device team_slave_1 entered promiscuous mode [ 973.326639][ T1585] bond0: (slave team0): Enslaving as an active interface with an up link [ 973.327502][ T1580] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 973.327538][ T1580] device team0 entered promiscuous mode [ 973.327550][ T1580] device team_slave_0 entered promiscuous mode [ 973.327774][ T1580] device team_slave_1 entered promiscuous mode [ 973.340154][ T1580] bond0: (slave team0): Releasing backup interface [ 973.351001][ T1591] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 973.351041][ T1591] device team0 entered promiscuous mode [ 973.351053][ T1591] device team_slave_0 entered promiscuous mode [ 973.351199][ T1591] device team_slave_1 entered promiscuous mode [ 973.377457][ T1591] bond0: (slave team0): Releasing backup interface [ 973.381619][ T1593] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 973.381646][ T1593] device team0 left promiscuous mode [ 973.381659][ T1593] device team_slave_0 left promiscuous mode [ 973.381845][ T1593] device team_slave_1 left promiscuous mode [ 973.389776][ T1593] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.413422][ T1593] bond0: (slave team0): Enslaving as an active interface with an up link [ 973.413524][ T1595] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 973.413547][ T1595] device team0 left promiscuous mode [ 973.413560][ T1595] device team_slave_0 left promiscuous mode [ 973.413708][ T1595] device team_slave_1 left promiscuous mode [ 973.416452][ T1595] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.432163][ T1595] bond0: (slave team0): Enslaving as an active interface with an up link [ 973.432269][ T1597] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 973.486781][ T1599] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 973.486830][ T1599] device team0 entered promiscuous mode [ 973.486941][ T1599] device team_slave_0 entered promiscuous mode [ 973.487097][ T1599] device team_slave_1 entered promiscuous mode [ 973.491075][ T1599] bond0: (slave team0): Releasing backup interface [ 973.526933][ T1601] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 973.526961][ T1601] device team0 entered promiscuous mode [ 973.526974][ T1601] device team_slave_0 entered promiscuous mode [ 973.527130][ T1601] device team_slave_1 entered promiscuous mode [ 973.538888][ T1601] bond0: (slave team0): Releasing backup interface [ 973.540392][ T1610] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 973.540590][ T1612] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 973.540613][ T1612] device team0 left promiscuous mode [ 973.540625][ T1612] device team_slave_0 left promiscuous mode [ 973.540765][ T1612] device team_slave_1 left promiscuous mode [ 973.543156][ T1612] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.566674][ T1612] bond0: (slave team0): Enslaving as an active interface with an up link [ 973.566766][ T1610] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 973.578483][ T1613] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 973.578511][ T1613] device team0 left promiscuous mode [ 973.578524][ T1613] device team_slave_0 left promiscuous mode [ 973.578720][ T1613] device team_slave_1 left promiscuous mode [ 973.580749][ T1613] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.582214][ T1613] bond0: (slave team0): Enslaving as an active interface with an up link [ 973.608236][ T1610] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 973.697760][ T1612] device team0 entered promiscuous mode [ 973.697778][ T1612] device team_slave_0 entered promiscuous mode [ 973.697939][ T1612] device team_slave_1 entered promiscuous mode [ 973.707935][ T1612] bond0: (slave team0): Releasing backup interface [ 973.727562][ T1614] bond0: (slave team0): Releasing backup interface [ 973.754125][ T1614] bridge0: port 13(team0) entered blocking state [ 973.754188][ T1614] bridge0: port 13(team0) entered disabled state [ 973.756581][ T1618] device team0 entered promiscuous mode [ 973.756595][ T1618] device team_slave_0 entered promiscuous mode [ 973.756876][ T1618] device team_slave_1 entered promiscuous mode [ 973.765969][ T1618] bond0: (slave team0): Releasing backup interface [ 973.770104][ T1620] device team0 left promiscuous mode [ 973.770121][ T1620] device team_slave_0 left promiscuous mode [ 973.770271][ T1620] device team_slave_1 left promiscuous mode [ 973.772062][ T1620] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.773442][ T1620] bond0: (slave team0): Enslaving as an active interface with an up link [ 973.809741][ T1623] device team0 entered promiscuous mode [ 973.809759][ T1623] device team_slave_0 entered promiscuous mode [ 973.809918][ T1623] device team_slave_1 entered promiscuous mode [ 973.846261][ T1623] bond0: (slave team0): Releasing backup interface [ 973.898237][ T1629] device team0 left promiscuous mode [ 973.898256][ T1629] device team_slave_0 left promiscuous mode [ 973.898395][ T1629] device team_slave_1 left promiscuous mode [ 973.900222][ T1629] 8021q: adding VLAN 0 to HW filter on device team0 [ 973.901538][ T1629] bond0: (slave team0): Enslaving as an active interface with an up link [ 973.945010][ T1629] device team0 entered promiscuous mode [ 973.945027][ T1629] device team_slave_0 entered promiscuous mode [ 973.945162][ T1629] device team_slave_1 entered promiscuous mode [ 973.980789][ T1629] bond0: (slave team0): Releasing backup interface [ 973.996143][ T1632] device team0 entered promiscuous mode [ 973.996162][ T1632] device team_slave_0 entered promiscuous mode [ 973.996341][ T1632] device team_slave_1 entered promiscuous mode [ 974.025360][ T1632] bond0: (slave team0): Releasing backup interface [ 974.028712][ T1640] device team0 left promiscuous mode [ 974.028730][ T1640] device team_slave_0 left promiscuous mode [ 974.028879][ T1640] device team_slave_1 left promiscuous mode [ 974.033692][ T1640] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.039680][ T1640] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.041916][ T1639] device team0 left promiscuous mode [ 974.041932][ T1639] device team_slave_0 left promiscuous mode [ 974.042063][ T1639] device team_slave_1 left promiscuous mode [ 974.044000][ T1639] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.055927][ T1639] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.056074][ T1644] device team0 entered promiscuous mode [ 974.056088][ T1644] device team_slave_0 entered promiscuous mode [ 974.056244][ T1644] device team_slave_1 entered promiscuous mode [ 974.057687][ T1644] bond0: (slave team0): Releasing backup interface [ 974.092534][ T1640] device team0 entered promiscuous mode [ 974.092552][ T1640] device team_slave_0 entered promiscuous mode [ 974.092714][ T1640] device team_slave_1 entered promiscuous mode [ 974.128150][ T1640] bond0: (slave team0): Releasing backup interface [ 974.161851][ T1646] device team0 left promiscuous mode [ 974.161870][ T1646] device team_slave_0 left promiscuous mode [ 974.162018][ T1646] device team_slave_1 left promiscuous mode [ 974.163880][ T1646] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.189159][ T1646] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.195943][ T1648] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 974.196025][ T1650] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 974.250809][ T1653] device team0 left promiscuous mode [ 974.250828][ T1653] device team_slave_0 left promiscuous mode [ 974.250969][ T1653] device team_slave_1 left promiscuous mode [ 974.253178][ T1653] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.254989][ T1653] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.255092][ T1656] device team0 left promiscuous mode [ 974.255107][ T1656] device team_slave_0 left promiscuous mode [ 974.255262][ T1656] device team_slave_1 left promiscuous mode [ 974.259258][ T1656] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.260564][ T1656] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.265631][ T1646] device team0 entered promiscuous mode [ 974.265646][ T1646] device team_slave_0 entered promiscuous mode [ 974.265790][ T1646] device team_slave_1 entered promiscuous mode [ 974.284229][ T1646] bond0: (slave team0): Releasing backup interface [ 974.313950][ T1656] device team0 entered promiscuous mode [ 974.314445][ T1656] device team_slave_0 entered promiscuous mode [ 974.314623][ T1656] device team_slave_1 entered promiscuous mode [ 974.321472][ T1656] bond0: (slave team0): Releasing backup interface [ 974.357845][ T1661] device team0 left promiscuous mode [ 974.357863][ T1661] device team_slave_0 left promiscuous mode [ 974.358011][ T1661] device team_slave_1 left promiscuous mode [ 974.371009][ T1661] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.380528][ T1661] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.380968][ T1663] device team0 left promiscuous mode [ 974.380982][ T1663] device team_slave_1 left promiscuous mode [ 974.381278][ T1663] bridge0: port 13(team0) entered disabled state [ 974.396824][ T1663] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.410619][ T1663] device team0 entered promiscuous mode [ 974.410636][ T1663] device team_slave_1 entered promiscuous mode [ 974.416192][ T1663] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.447016][ T1663] bond0: (slave team0): Releasing backup interface [ 974.467196][ T1663] bridge0: port 13(team0) entered blocking state [ 974.467261][ T1663] bridge0: port 13(team0) entered disabled state [ 974.469024][ T1661] device team0 entered promiscuous mode [ 974.469040][ T1661] device team_slave_0 entered promiscuous mode [ 974.469174][ T1661] device team_slave_1 entered promiscuous mode [ 974.470778][ T1661] bond0: (slave team0): Releasing backup interface [ 974.522339][ T1671] device team0 left promiscuous mode [ 974.522356][ T1671] device team_slave_0 left promiscuous mode [ 974.522509][ T1671] device team_slave_1 left promiscuous mode [ 974.524420][ T1671] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.531960][ T1671] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.536134][ T1667] device team0 entered promiscuous mode [ 974.536150][ T1667] device team_slave_0 entered promiscuous mode [ 974.536307][ T1667] device team_slave_1 entered promiscuous mode [ 974.537586][ T1667] bond0: (slave team0): Releasing backup interface [ 974.554760][ T1671] device team0 entered promiscuous mode [ 974.554778][ T1671] device team_slave_0 entered promiscuous mode [ 974.554915][ T1671] device team_slave_1 entered promiscuous mode [ 974.558599][ T1671] bond0: (slave team0): Releasing backup interface [ 974.637908][ T1674] device team0 left promiscuous mode [ 974.637925][ T1674] device team_slave_0 left promiscuous mode [ 974.638069][ T1674] device team_slave_1 left promiscuous mode [ 974.640010][ T1674] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.647127][ T1674] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.677445][ T1679] device team0 left promiscuous mode [ 974.677462][ T1679] device team_slave_0 left promiscuous mode [ 974.677619][ T1679] device team_slave_1 left promiscuous mode [ 974.692474][ T1679] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.697894][ T1679] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.698041][ T1674] device team0 entered promiscuous mode [ 974.698055][ T1674] device team_slave_0 entered promiscuous mode [ 974.698193][ T1674] device team_slave_1 entered promiscuous mode [ 974.701250][ T1674] bond0: (slave team0): Releasing backup interface [ 974.723136][ T1681] device team0 left promiscuous mode [ 974.723155][ T1681] device team_slave_0 left promiscuous mode [ 974.723309][ T1681] device team_slave_1 left promiscuous mode [ 974.730072][ T1681] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.736962][ T1681] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.742984][ T1682] device team0 left promiscuous mode [ 974.743000][ T1682] device team_slave_0 left promiscuous mode [ 974.743137][ T1682] device team_slave_1 left promiscuous mode [ 974.756990][ T1682] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.760322][ T1682] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.760519][ T1679] device team0 entered promiscuous mode [ 974.760534][ T1679] device team_slave_0 entered promiscuous mode [ 974.760674][ T1679] device team_slave_1 entered promiscuous mode [ 974.762034][ T1679] bond0: (slave team0): Releasing backup interface [ 974.774059][ T1679] bridge0: port 3(team0) entered blocking state [ 974.774127][ T1679] bridge0: port 3(team0) entered disabled state [ 974.794173][ T1681] device team0 entered promiscuous mode [ 974.794192][ T1681] device team_slave_0 entered promiscuous mode [ 974.794356][ T1681] device team_slave_1 entered promiscuous mode [ 974.811958][ T1681] bond0: (slave team0): Releasing backup interface [ 974.828524][ T1682] device team0 entered promiscuous mode [ 974.828542][ T1682] device team_slave_0 entered promiscuous mode [ 974.828695][ T1682] device team_slave_1 entered promiscuous mode [ 974.836368][ T1682] bond0: (slave team0): Releasing backup interface [ 974.857563][ T1688] device team0 left promiscuous mode [ 974.857581][ T1688] device team_slave_0 left promiscuous mode [ 974.857726][ T1688] device team_slave_1 left promiscuous mode [ 974.859542][ T1688] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.860935][ T1688] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.861403][ T1690] device team0 entered promiscuous mode [ 974.861417][ T1690] device team_slave_0 entered promiscuous mode [ 974.861562][ T1690] device team_slave_1 entered promiscuous mode [ 974.868390][ T1690] bond0: (slave team0): Releasing backup interface [ 974.885813][ T1694] device team0 left promiscuous mode [ 974.885828][ T1694] device team_slave_1 left promiscuous mode [ 974.886178][ T1694] bridge0: port 13(team0) entered disabled state [ 974.908596][ T1694] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.909685][ T1694] device team0 entered promiscuous mode [ 974.909698][ T1694] device team_slave_1 entered promiscuous mode [ 974.910391][ T1694] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.935728][ T1693] bond0: (slave team0): Releasing backup interface [ 974.950261][ T1693] bridge0: port 13(team0) entered blocking state [ 974.950321][ T1693] bridge0: port 13(team0) entered disabled state [ 974.960716][ T1695] device team0 left promiscuous mode [ 974.960734][ T1695] device team_slave_0 left promiscuous mode [ 974.960948][ T1695] device team_slave_1 left promiscuous mode [ 974.963102][ T1695] 8021q: adding VLAN 0 to HW filter on device team0 [ 974.964835][ T1695] bond0: (slave team0): Enslaving as an active interface with an up link [ 974.965083][ T1697] device team0 left promiscuous mode [ 974.965096][ T1697] device team_slave_0 left promiscuous mode [ 974.965249][ T1697] device team_slave_1 left promiscuous mode [ 974.965863][ T1697] bridge0: port 3(team0) entered disabled state [ 975.019249][ T1697] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.020592][ T1697] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.020741][ T1698] device team0 entered promiscuous mode [ 975.020755][ T1698] device team_slave_0 entered promiscuous mode [ 975.020890][ T1698] device team_slave_1 entered promiscuous mode [ 975.040811][ T1698] bond0: (slave team0): Releasing backup interface [ 975.086674][ T1695] device team0 entered promiscuous mode [ 975.086692][ T1695] device team_slave_0 entered promiscuous mode [ 975.086845][ T1695] device team_slave_1 entered promiscuous mode [ 975.105299][ T1695] bond0: (slave team0): Releasing backup interface [ 975.121065][ T1702] device team0 left promiscuous mode [ 975.121083][ T1702] device team_slave_0 left promiscuous mode [ 975.121224][ T1702] device team_slave_1 left promiscuous mode [ 975.123622][ T1702] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.130892][ T1702] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.131003][ T1705] device team0 left promiscuous mode [ 975.131015][ T1705] device team_slave_0 left promiscuous mode [ 975.131172][ T1705] device team_slave_1 left promiscuous mode [ 975.133284][ T1705] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.134886][ T1705] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.135207][ T1706] device team0 left promiscuous mode [ 975.135221][ T1706] device team_slave_1 left promiscuous mode [ 975.135549][ T1706] bridge0: port 13(team0) entered disabled state [ 975.152387][ T1706] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.153600][ T1706] device team0 entered promiscuous mode [ 975.153614][ T1706] device team_slave_1 entered promiscuous mode [ 975.154454][ T1706] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.154573][ T1707] device team0 entered promiscuous mode [ 975.154587][ T1707] device team_slave_0 entered promiscuous mode [ 975.154711][ T1707] device team_slave_1 entered promiscuous mode [ 975.156281][ T1707] bond0: (slave team0): Releasing backup interface [ 975.188186][ T1708] device team0 entered promiscuous mode [ 975.188204][ T1708] device team_slave_0 entered promiscuous mode [ 975.188356][ T1708] device team_slave_1 entered promiscuous mode [ 975.189833][ T1708] bond0: (slave team0): Releasing backup interface [ 975.212970][ T1709] bond0: (slave team0): Releasing backup interface [ 975.225424][ T1709] bridge0: port 13(team0) entered blocking state [ 975.230046][ T1709] bridge0: port 13(team0) entered disabled state [ 975.252365][ T1711] device team0 left promiscuous mode [ 975.252384][ T1711] device team_slave_0 left promiscuous mode [ 975.252528][ T1711] device team_slave_1 left promiscuous mode [ 975.257557][ T1711] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.270709][ T1711] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.373551][ T1719] device team0 left promiscuous mode [ 975.373570][ T1719] device team_slave_0 left promiscuous mode [ 975.373727][ T1719] device team_slave_1 left promiscuous mode [ 975.380459][ T1719] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.391626][ T1719] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.391869][ T1722] device team0 left promiscuous mode [ 975.391883][ T1722] device team_slave_1 left promiscuous mode [ 975.392213][ T1722] bridge0: port 13(team0) entered disabled state [ 975.407635][ T1722] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.408700][ T1722] device team0 entered promiscuous mode [ 975.408713][ T1722] device team_slave_1 entered promiscuous mode [ 975.426034][ T1722] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.426135][ T1711] device team0 entered promiscuous mode [ 975.426149][ T1711] device team_slave_0 entered promiscuous mode [ 975.426293][ T1711] device team_slave_1 entered promiscuous mode [ 975.432654][ T1711] bond0: (slave team0): Releasing backup interface [ 975.447995][ T1723] device team0 left promiscuous mode [ 975.448056][ T1723] device team_slave_0 left promiscuous mode [ 975.448222][ T1723] device team_slave_1 left promiscuous mode [ 975.449983][ T1723] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.454014][ T1723] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.458879][ T1719] device team0 entered promiscuous mode [ 975.458894][ T1719] device team_slave_0 entered promiscuous mode [ 975.459026][ T1719] device team_slave_1 entered promiscuous mode [ 975.473731][ T1719] bond0: (slave team0): Releasing backup interface [ 975.489363][ T1720] bond0: (slave team0): Releasing backup interface [ 975.499423][ T1720] bridge0: port 13(team0) entered blocking state [ 975.499482][ T1720] bridge0: port 13(team0) entered disabled state [ 975.503203][ T1725] device team0 left promiscuous mode [ 975.503220][ T1725] device team_slave_0 left promiscuous mode [ 975.503373][ T1725] device team_slave_1 left promiscuous mode [ 975.505248][ T1725] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.507908][ T1725] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.508024][ T1723] device team0 entered promiscuous mode [ 975.508038][ T1723] device team_slave_0 entered promiscuous mode [ 975.508194][ T1723] device team_slave_1 entered promiscuous mode [ 975.509661][ T1723] bond0: (slave team0): Releasing backup interface [ 975.542400][ T1723] bridge0: port 3(team0) entered blocking state [ 975.542462][ T1723] bridge0: port 3(team0) entered disabled state [ 975.550478][ T1727] device team0 left promiscuous mode [ 975.550495][ T1727] device team_slave_0 left promiscuous mode [ 975.550639][ T1727] device team_slave_1 left promiscuous mode [ 975.552479][ T1727] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.553864][ T1727] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.554177][ T1725] device team0 entered promiscuous mode [ 975.554192][ T1725] device team_slave_0 entered promiscuous mode [ 975.554361][ T1725] device team_slave_1 entered promiscuous mode [ 975.556591][ T1725] bond0: (slave team0): Releasing backup interface [ 975.581057][ T1729] device team0 entered promiscuous mode [ 975.581075][ T1729] device team_slave_0 entered promiscuous mode [ 975.581244][ T1729] device team_slave_1 entered promiscuous mode [ 975.583586][ T1729] bond0: (slave team0): Releasing backup interface [ 975.627682][ T1731] device team0 left promiscuous mode [ 975.627701][ T1731] device team_slave_0 left promiscuous mode [ 975.627856][ T1731] device team_slave_1 left promiscuous mode [ 975.629962][ T1731] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.641800][ T1731] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.685108][ T1731] device team0 entered promiscuous mode [ 975.685127][ T1731] device team_slave_0 entered promiscuous mode [ 975.685262][ T1731] device team_slave_1 entered promiscuous mode [ 975.696080][ T1731] bond0: (slave team0): Releasing backup interface [ 975.728343][ T1740] device team0 left promiscuous mode [ 975.728362][ T1740] device team_slave_0 left promiscuous mode [ 975.728513][ T1740] device team_slave_1 left promiscuous mode [ 975.730468][ T1740] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.736620][ T1740] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.736874][ T1741] device team0 left promiscuous mode [ 975.736888][ T1741] device team_slave_0 left promiscuous mode [ 975.737030][ T1741] device team_slave_1 left promiscuous mode [ 975.737294][ T1741] bridge0: port 3(team0) entered disabled state [ 975.744311][ T1741] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.773397][ T1741] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.782237][ T1740] device team0 entered promiscuous mode [ 975.782253][ T1740] device team_slave_0 entered promiscuous mode [ 975.782411][ T1740] device team_slave_1 entered promiscuous mode [ 975.785189][ T1740] bond0: (slave team0): Releasing backup interface [ 975.803509][ T1743] device team0 left promiscuous mode [ 975.803527][ T1743] device team_slave_0 left promiscuous mode [ 975.803666][ T1743] device team_slave_1 left promiscuous mode [ 975.806214][ T1743] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.811246][ T1743] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.812207][ T1745] device team0 left promiscuous mode [ 975.812222][ T1745] device team_slave_0 left promiscuous mode [ 975.812369][ T1745] device team_slave_1 left promiscuous mode [ 975.818376][ T1745] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.825214][ T1745] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.826125][ T1741] device team0 entered promiscuous mode [ 975.826140][ T1741] device team_slave_0 entered promiscuous mode [ 975.826282][ T1741] device team_slave_1 entered promiscuous mode [ 975.834365][ T1741] bond0: (slave team0): Releasing backup interface [ 975.851412][ T1747] device team0 left promiscuous mode [ 975.851428][ T1747] device team_slave_1 left promiscuous mode [ 975.851794][ T1747] bridge0: port 13(team0) entered disabled state [ 975.857890][ T1747] 8021q: adding VLAN 0 to HW filter on device team0 [ 975.862373][ T1747] device team0 entered promiscuous mode [ 975.862390][ T1747] device team_slave_1 entered promiscuous mode [ 975.866558][ T1747] bond0: (slave team0): Enslaving as an active interface with an up link [ 975.866686][ T1743] device team0 entered promiscuous mode [ 975.866700][ T1743] device team_slave_0 entered promiscuous mode [ 975.866839][ T1743] device team_slave_1 entered promiscuous mode [ 975.868312][ T1743] bond0: (slave team0): Releasing backup interface [ 975.878224][ T1745] device team0 entered promiscuous mode [ 975.878241][ T1745] device team_slave_0 entered promiscuous mode [ 975.878394][ T1745] device team_slave_1 entered promiscuous mode [ 975.880713][ T1745] bond0: (slave team0): Releasing backup interface [ 975.903935][ T1747] bond0: (slave team0): Releasing backup interface [ 975.918508][ T1747] bridge0: port 13(team0) entered blocking state [ 975.918570][ T1747] bridge0: port 13(team0) entered disabled state [ 975.989234][ T1751] device team0 left promiscuous mode [ 975.989253][ T1751] device team_slave_0 left promiscuous mode [ 975.989408][ T1751] device team_slave_1 left promiscuous mode [ 976.011673][ T1751] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.020724][ T1751] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.063732][ T1751] device team0 entered promiscuous mode [ 976.063750][ T1751] device team_slave_0 entered promiscuous mode [ 976.063892][ T1751] device team_slave_1 entered promiscuous mode [ 976.077723][ T1751] bond0: (slave team0): Releasing backup interface [ 976.096081][ T1757] device team0 left promiscuous mode [ 976.096099][ T1757] device team_slave_0 left promiscuous mode [ 976.096253][ T1757] device team_slave_1 left promiscuous mode [ 976.100776][ T1757] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.103549][ T1757] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.103653][ T1754] device team0 left promiscuous mode [ 976.103667][ T1754] device team_slave_0 left promiscuous mode [ 976.103809][ T1754] device team_slave_1 left promiscuous mode [ 976.107876][ T1754] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.109205][ T1754] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.109309][ T1756] device team0 left promiscuous mode [ 976.109322][ T1756] device team_slave_0 left promiscuous mode [ 976.109447][ T1756] device team_slave_1 left promiscuous mode [ 976.111079][ T1756] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.112334][ T1756] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.112561][ T1759] device team0 left promiscuous mode [ 976.112573][ T1759] device team_slave_1 left promiscuous mode [ 976.112813][ T1759] bridge0: port 13(team0) entered disabled state [ 976.122634][ T1759] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.123698][ T1759] device team0 entered promiscuous mode [ 976.123710][ T1759] device team_slave_1 entered promiscuous mode [ 976.124446][ T1759] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.124553][ T1761] device team0 left promiscuous mode [ 976.124567][ T1761] device team_slave_0 left promiscuous mode [ 976.124685][ T1761] device team_slave_1 left promiscuous mode [ 976.126488][ T1761] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.127883][ T1761] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.166038][ T1761] device team0 entered promiscuous mode [ 976.166056][ T1761] device team_slave_0 entered promiscuous mode [ 976.166224][ T1761] device team_slave_1 entered promiscuous mode [ 976.167818][ T1761] bond0: (slave team0): Releasing backup interface [ 976.198380][ T1759] bond0: (slave team0): Releasing backup interface [ 976.212865][ T1759] bridge0: port 13(team0) entered blocking state [ 976.212923][ T1759] bridge0: port 13(team0) entered disabled state [ 976.218827][ T1756] device team0 entered promiscuous mode [ 976.218843][ T1756] device team_slave_0 entered promiscuous mode [ 976.218991][ T1756] device team_slave_1 entered promiscuous mode [ 976.222720][ T1756] bond0: (slave team0): Releasing backup interface [ 976.239478][ T1754] device team0 entered promiscuous mode [ 976.239496][ T1754] device team_slave_0 entered promiscuous mode [ 976.239628][ T1754] device team_slave_1 entered promiscuous mode [ 976.270049][ T1754] bond0: (slave team0): Releasing backup interface [ 976.328648][ T1770] device team0 left promiscuous mode [ 976.328667][ T1770] device team_slave_0 left promiscuous mode [ 976.328810][ T1770] device team_slave_1 left promiscuous mode [ 976.330759][ T1770] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.332257][ T1770] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.358734][ T1771] device team0 entered promiscuous mode [ 976.358753][ T1771] device team_slave_0 entered promiscuous mode [ 976.358889][ T1771] device team_slave_1 entered promiscuous mode [ 976.368518][ T1771] bond0: (slave team0): Releasing backup interface [ 976.404729][ T1779] device team0 left promiscuous mode [ 976.404744][ T1779] device team_slave_1 left promiscuous mode [ 976.405018][ T1779] bridge0: port 13(team0) entered disabled state [ 976.454029][ T1779] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.462174][ T1779] device team0 entered promiscuous mode [ 976.462189][ T1779] device team_slave_1 entered promiscuous mode [ 976.462983][ T1779] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.464614][ T1777] device team0 left promiscuous mode [ 976.464629][ T1777] device team_slave_0 left promiscuous mode [ 976.464766][ T1777] device team_slave_1 left promiscuous mode [ 976.477246][ T1777] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.478834][ T1777] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.504304][ T1785] device team0 entered promiscuous mode [ 976.504322][ T1785] device team_slave_0 entered promiscuous mode [ 976.504501][ T1785] device team_slave_1 entered promiscuous mode [ 976.507073][ T1785] bond0: (slave team0): Releasing backup interface [ 976.539662][ T1787] device team0 left promiscuous mode [ 976.539681][ T1787] device team_slave_0 left promiscuous mode [ 976.539819][ T1787] device team_slave_1 left promiscuous mode [ 976.541630][ T1787] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.543020][ T1787] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.593497][ T1791] device team0 left promiscuous mode [ 976.593515][ T1791] device team_slave_0 left promiscuous mode [ 976.593655][ T1791] device team_slave_1 left promiscuous mode [ 976.605329][ T1791] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.608931][ T1791] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.661724][ T1793] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 976.664518][ T1792] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 976.680173][ T1792] bond0: (slave team0): Releasing backup interface [ 976.682055][ T1792] bridge0: port 13(team0) entered blocking state [ 976.682220][ T1792] bridge0: port 13(team0) entered disabled state [ 976.688727][ T1791] device team0 entered promiscuous mode [ 976.688742][ T1791] device team_slave_0 entered promiscuous mode [ 976.688865][ T1791] device team_slave_1 entered promiscuous mode [ 976.752634][ T1801] device team0 left promiscuous mode [ 976.752652][ T1801] device team_slave_0 left promiscuous mode [ 976.752794][ T1801] device team_slave_1 left promiscuous mode [ 976.754866][ T1801] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.757043][ T1801] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.773196][ T1797] device team0 entered promiscuous mode [ 976.773214][ T1797] device team_slave_0 entered promiscuous mode [ 976.773356][ T1797] device team_slave_1 entered promiscuous mode [ 976.783608][ T1797] bond0: (slave team0): Releasing backup interface [ 976.792187][ T1801] device team0 entered promiscuous mode [ 976.792205][ T1801] device team_slave_0 entered promiscuous mode [ 976.792350][ T1801] device team_slave_1 entered promiscuous mode [ 976.796326][ T1801] bond0: (slave team0): Releasing backup interface [ 976.838216][ T1803] device team0 left promiscuous mode [ 976.838245][ T1803] device team_slave_0 left promiscuous mode [ 976.838418][ T1803] device team_slave_1 left promiscuous mode [ 976.882802][ T1806] device team0 left promiscuous mode [ 976.882818][ T1806] device team_slave_1 left promiscuous mode [ 976.883106][ T1806] bridge0: port 13(team0) entered disabled state [ 976.887993][ T27] audit: type=1400 audit(1655499498.715:313): avc: denied { create } for pid=1805 comm="syz-executor.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 976.896950][ T1806] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.910156][ T1806] device team0 entered promiscuous mode [ 976.910173][ T1806] device team_slave_1 entered promiscuous mode [ 976.913261][ T1806] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.913389][ T1803] device team0 entered promiscuous mode [ 976.913403][ T1803] device team_slave_0 entered promiscuous mode [ 976.913551][ T1803] device team_slave_1 entered promiscuous mode [ 976.914718][ T1803] bond0: (slave team0): Releasing backup interface [ 976.925702][ T1807] device team0 left promiscuous mode [ 976.925719][ T1807] device team_slave_0 left promiscuous mode [ 976.925857][ T1807] device team_slave_1 left promiscuous mode [ 976.927860][ T1807] 8021q: adding VLAN 0 to HW filter on device team0 [ 976.929470][ T1807] bond0: (slave team0): Enslaving as an active interface with an up link [ 976.939630][ T1806] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 976.940668][ T1806] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 976.948205][ T1806] bond0: (slave team0): Releasing backup interface [ 976.978583][ T1806] bridge0: port 13(team0) entered blocking state [ 976.978646][ T1806] bridge0: port 13(team0) entered disabled state [ 976.980489][ T1810] device team0 left promiscuous mode [ 976.980505][ T1810] device team_slave_0 left promiscuous mode [ 976.980641][ T1810] device team_slave_1 left promiscuous mode [ 976.982500][ T1810] 8021q: adding VLAN 0 to HW filter on device team0 [ 977.011114][ T1810] bond0: (slave team0): Enslaving as an active interface with an up link [ 977.012805][ T1807] device team0 entered promiscuous mode [ 977.012821][ T1807] device team_slave_0 entered promiscuous mode [ 977.012952][ T1807] device team_slave_1 entered promiscuous mode [ 977.014340][ T1807] bond0: (slave team0): Releasing backup interface [ 977.026236][ T1807] bridge0: port 3(team0) entered blocking state [ 977.026303][ T1807] bridge0: port 3(team0) entered disabled state [ 977.053892][ T1828] device team0 left promiscuous mode [ 977.053909][ T1828] device team_slave_0 left promiscuous mode [ 977.054057][ T1828] device team_slave_1 left promiscuous mode [ 977.058079][ T1828] 8021q: adding VLAN 0 to HW filter on device team0 [ 977.060007][ T1828] bond0: (slave team0): Enslaving as an active interface with an up link [ 977.060118][ T1810] device team0 entered promiscuous mode [ 977.060131][ T1810] device team_slave_0 entered promiscuous mode [ 977.060276][ T1810] device team_slave_1 entered promiscuous mode [ 977.061722][ T1810] bond0: (slave team0): Releasing backup interface [ 977.082266][ T1829] device team0 entered promiscuous mode [ 977.082285][ T1829] device team_slave_0 entered promiscuous mode [ 977.082442][ T1829] device team_slave_1 entered promiscuous mode [ 977.089405][ T1829] bond0: (slave team0): Releasing backup interface [ 977.092574][ T1831] device team0 left promiscuous mode [ 977.092591][ T1831] device team_slave_0 left promiscuous mode [ 977.092742][ T1831] device team_slave_1 left promiscuous mode [ 977.094955][ T1831] 8021q: adding VLAN 0 to HW filter on device team0 [ 977.098875][ T1831] bond0: (slave team0): Enslaving as an active interface with an up link [ 977.141064][ T1831] device team0 entered promiscuous mode [ 977.141081][ T1831] device team_slave_0 entered promiscuous mode [ 977.141220][ T1831] device team_slave_1 entered promiscuous mode [ 977.166636][ T1831] bond0: (slave team0): Releasing backup interface [ 977.206156][ T1828] device team0 entered promiscuous mode [ 977.206175][ T1828] device team_slave_0 entered promiscuous mode [ 977.206317][ T1828] device team_slave_1 entered promiscuous mode [ 977.207752][ T1828] bond0: (slave team0): Releasing backup interface [ 977.237026][ T1834] device team0 left promiscuous mode [ 977.237041][ T1834] device team_slave_1 left promiscuous mode [ 977.237314][ T1834] bridge0: port 13(team0) entered disabled state [ 977.241325][ T1834] 8021q: adding VLAN 0 to HW filter on device team0 [ 977.242500][ T1834] device team0 entered promiscuous mode [ 977.242514][ T1834] device team_slave_1 entered promiscuous mode [ 977.279843][ T1834] bond0: (slave team0): Enslaving as an active interface with an up link [ 977.282087][ T1837] device team0 left promiscuous mode [ 977.282102][ T1837] device team_slave_0 left promiscuous mode [ 977.282255][ T1837] device team_slave_1 left promiscuous mode [ 977.294659][ T1837] 8021q: adding VLAN 0 to HW filter on device team0 [ 977.297395][ T1837] bond0: (slave team0): Enslaving as an active interface with an up link [ 977.322954][ T1834] bond0: (slave team0): Releasing backup interface [ 977.333458][ T1834] bridge0: port 13(team0) entered blocking state [ 977.333521][ T1834] bridge0: port 13(team0) entered disabled state [ 977.371022][ T1839] device team0 left promiscuous mode [ 977.371040][ T1839] device team_slave_0 left promiscuous mode [ 977.371181][ T1839] device team_slave_1 left promiscuous mode [ 977.373091][ T1839] 8021q: adding VLAN 0 to HW filter on device team0 [ 977.374683][ T1839] bond0: (slave team0): Enslaving as an active interface with an up link [ 977.387942][ T1849] device team0 left promiscuous mode [ 977.387959][ T1849] device team_slave_0 left promiscuous mode [ 977.398993][ T1849] device team_slave_1 left promiscuous mode [ 977.399342][ T1849] bridge0: port 3(team0) entered disabled state [ 977.414039][ T1849] 8021q: adding VLAN 0 to HW filter on device team0 [ 977.424326][ T1849] bond0: (slave team0): Enslaving as an active interface with an up link [ 977.424431][ T1850] device team0 left promiscuous mode [ 977.424445][ T1850] device team_slave_0 left promiscuous mode [ 977.424584][ T1850] device team_slave_1 left promiscuous mode [ 977.428906][ T1850] 8021q: adding VLAN 0 to HW filter on device team0 [ 977.435166][ T1850] bond0: (slave team0): Enslaving as an active interface with an up link [ 977.471510][ T1850] device team0 entered promiscuous mode [ 977.471529][ T1850] device team_slave_0 entered promiscuous mode [ 977.471666][ T1850] device team_slave_1 entered promiscuous mode [ 977.473918][ T1859] device team0 left promiscuous mode [ 977.473934][ T1859] device team_slave_0 left promiscuous mode [ 977.474087][ T1859] device team_slave_1 left promiscuous mode [ 977.477097][ T1859] 8021q: adding VLAN 0 to HW filter on device team0 [ 977.490285][ T1859] bond0: (slave team0): Enslaving as an active interface with an up link [ 977.520222][ T1863] device team0 left promiscuous mode [ 977.520239][ T1863] device team_slave_1 left promiscuous mode [ 977.520523][ T1863] bridge0: port 13(team0) entered disabled state [ 977.543726][ T1863] 8021q: adding VLAN 0 to HW filter on device team0 [ 977.554781][ T1863] device team0 entered promiscuous mode [ 977.554798][ T1863] device team_slave_1 entered promiscuous mode [ 977.572275][ T1863] bond0: (slave team0): Enslaving as an active interface with an up link [ 977.623370][ T1866] bond0: (slave team0): Releasing backup interface [ 977.632929][ T1863] bond0: (slave team0): Releasing backup interface [ 977.648604][ T1863] bridge0: port 13(team0) entered blocking state [ 977.648666][ T1863] bridge0: port 13(team0) entered disabled state [ 977.678883][ T1870] device team0 left promiscuous mode [ 977.678903][ T1870] device team_slave_0 left promiscuous mode [ 977.679085][ T1870] device team_slave_1 left promiscuous mode [ 977.694053][ T1873] device team0 entered promiscuous mode [ 977.694071][ T1873] device team_slave_0 entered promiscuous mode [ 977.694223][ T1873] device team_slave_1 entered promiscuous mode [ 977.792422][ T1875] bond0: (slave team0): Releasing backup interface [ 977.795847][ T1870] device team0 entered promiscuous mode [ 977.795863][ T1870] device team_slave_0 entered promiscuous mode [ 977.796003][ T1870] device team_slave_1 entered promiscuous mode [ 977.825224][ T1886] device team0 left promiscuous mode [ 977.825242][ T1886] device team_slave_0 left promiscuous mode [ 977.825381][ T1886] device team_slave_1 left promiscuous mode [ 977.848378][ T1886] device team0 entered promiscuous mode [ 977.848396][ T1886] device team_slave_0 entered promiscuous mode [ 977.848570][ T1886] device team_slave_1 entered promiscuous mode [ 977.850890][ T1882] 8021q: adding VLAN 0 to HW filter on device team0 [ 977.852533][ T1882] bond0: (slave team0): Enslaving as an active interface with an up link [ 977.938322][ T1890] device team0 left promiscuous mode [ 977.938340][ T1890] device team_slave_0 left promiscuous mode [ 977.938491][ T1890] device team_slave_1 left promiscuous mode [ 977.974717][ T1892] 8021q: adding VLAN 0 to HW filter on device team0 [ 977.985061][ T1892] bond0: (slave team0): Enslaving as an active interface with an up link [ 978.001923][ T1897] device team0 left promiscuous mode [ 978.001940][ T1897] device team_slave_0 left promiscuous mode [ 978.002096][ T1897] device team_slave_1 left promiscuous mode [ 978.004950][ T1898] device team0 left promiscuous mode [ 978.004964][ T1898] device team_slave_1 left promiscuous mode [ 978.005228][ T1898] bridge0: port 13(team0) entered disabled state [ 978.033784][ T1898] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.039115][ T1898] device team0 entered promiscuous mode [ 978.039131][ T1898] device team_slave_1 entered promiscuous mode [ 978.039949][ T1898] bond0: (slave team0): Enslaving as an active interface with an up link [ 978.047479][ T1898] bond0: (slave team0): Releasing backup interface [ 978.065141][ T1898] bridge0: port 13(team0) entered blocking state [ 978.065204][ T1898] bridge0: port 13(team0) entered disabled state [ 978.152298][ T1900] bond0: (slave team0): Releasing backup interface [ 978.180835][ T1904] bond0: (slave team0): Releasing backup interface [ 978.206211][ T1916] device team0 entered promiscuous mode [ 978.206230][ T1916] device team_slave_0 entered promiscuous mode [ 978.206365][ T1916] device team_slave_1 entered promiscuous mode [ 978.208848][ T1916] bond0: (slave team0): Releasing backup interface [ 978.210349][ T1916] bridge0: port 3(team0) entered blocking state [ 978.211711][ T1916] bridge0: port 3(team0) entered disabled state [ 978.232427][ T1915] bond0: (slave team0): Releasing backup interface [ 978.251053][ T1918] __nla_validate_parse: 7 callbacks suppressed [ 978.251073][ T1918] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 978.251094][ T1918] device team0 entered promiscuous mode [ 978.251107][ T1918] device team_slave_0 entered promiscuous mode [ 978.251247][ T1918] device team_slave_1 entered promiscuous mode [ 978.305157][ T1922] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 978.309776][ T1922] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 978.350434][ T1923] validate_nla: 149 callbacks suppressed [ 978.350454][ T1923] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 978.352134][ T1923] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.357156][ T1923] bond0: (slave team0): Enslaving as an active interface with an up link [ 978.361144][ T27] audit: type=1400 audit(1655499500.185:314): avc: denied { listen } for pid=1921 comm="syz-executor.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 978.362418][ T1928] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 978.362595][ T1928] device team0 left promiscuous mode [ 978.362613][ T1928] device team_slave_1 left promiscuous mode [ 978.362907][ T1928] bridge0: port 13(team0) entered disabled state [ 978.373691][ T1928] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.397704][ T1928] device team0 entered promiscuous mode [ 978.397721][ T1928] device team_slave_1 entered promiscuous mode [ 978.398455][ T1928] bond0: (slave team0): Enslaving as an active interface with an up link [ 978.404254][ T1926] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 978.404531][ T1926] device team0 left promiscuous mode [ 978.404543][ T1926] device team_slave_0 left promiscuous mode [ 978.404675][ T1926] device team_slave_1 left promiscuous mode [ 978.404954][ T1926] bridge0: port 3(team0) entered disabled state [ 978.428765][ T1923] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 978.428803][ T1923] device team0 entered promiscuous mode [ 978.428835][ T1923] device team_slave_0 entered promiscuous mode [ 978.429165][ T1923] device team_slave_1 entered promiscuous mode [ 978.433799][ T1923] bond0: (slave team0): Releasing backup interface [ 978.465126][ T1923] bridge0: port 3(team0) entered blocking state [ 978.465189][ T1923] bridge0: port 3(team0) entered disabled state [ 978.474619][ T1931] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 978.477051][ T1931] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.478746][ T1931] bond0: (slave team0): Enslaving as an active interface with an up link [ 978.478850][ T1930] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 978.478875][ T1930] device team0 left promiscuous mode [ 978.478887][ T1930] device team_slave_0 left promiscuous mode [ 978.479028][ T1930] device team_slave_1 left promiscuous mode [ 978.484629][ T1930] bond0: (slave team0): Releasing backup interface [ 978.487251][ T1932] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 978.488897][ T1932] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.490304][ T1932] bond0: (slave team0): Enslaving as an active interface with an up link [ 978.490617][ T1934] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 978.490649][ T1934] device team0 entered promiscuous mode [ 978.490660][ T1934] device team_slave_0 entered promiscuous mode [ 978.490790][ T1934] device team_slave_1 entered promiscuous mode [ 978.492085][ T1934] bond0: (slave team0): Releasing backup interface [ 978.518081][ T1934] bridge0: port 3(team0) entered blocking state [ 978.518142][ T1934] bridge0: port 3(team0) entered disabled state [ 978.520066][ T1936] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 978.520103][ T1936] device team0 entered promiscuous mode [ 978.520116][ T1936] device team_slave_0 entered promiscuous mode [ 978.520276][ T1936] device team_slave_1 entered promiscuous mode [ 978.542649][ T1936] bond0: (slave team0): Releasing backup interface [ 978.557948][ T1936] bridge0: port 3(team0) entered blocking state [ 978.559240][ T1936] bridge0: port 3(team0) entered disabled state [ 978.563694][ T1938] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 978.588519][ T1944] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 978.590821][ T1944] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.597325][ T1944] bond0: (slave team0): Enslaving as an active interface with an up link [ 978.652154][ T1944] device team0 entered promiscuous mode [ 978.652173][ T1944] device team_slave_0 entered promiscuous mode [ 978.652333][ T1944] device team_slave_1 entered promiscuous mode [ 978.660181][ T1944] bond0: (slave team0): Releasing backup interface [ 978.689610][ T1944] bridge0: port 3(team0) entered blocking state [ 978.689677][ T1944] bridge0: port 3(team0) entered disabled state [ 978.691593][ T1946] device team0 left promiscuous mode [ 978.691609][ T1946] device team_slave_0 left promiscuous mode [ 978.691747][ T1946] device team_slave_1 left promiscuous mode [ 978.691983][ T1946] bridge0: port 3(team0) entered disabled state [ 978.699601][ T1946] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.701590][ T1946] bond0: (slave team0): Enslaving as an active interface with an up link [ 978.721661][ T1954] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 978.721999][ T1954] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 978.746619][ T1949] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.747955][ T1949] bond0: (slave team0): Enslaving as an active interface with an up link [ 978.755037][ T1951] device team0 left promiscuous mode [ 978.755053][ T1951] device team_slave_0 left promiscuous mode [ 978.755178][ T1951] device team_slave_1 left promiscuous mode [ 978.755441][ T1951] bridge0: port 3(team0) entered disabled state [ 978.761729][ T1951] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.763435][ T1951] bond0: (slave team0): Enslaving as an active interface with an up link [ 978.765918][ T1946] device team0 entered promiscuous mode [ 978.765933][ T1946] device team_slave_0 entered promiscuous mode [ 978.766065][ T1946] device team_slave_1 entered promiscuous mode [ 978.772439][ T1946] bond0: (slave team0): Releasing backup interface [ 978.794865][ T1946] bridge0: port 3(team0) entered blocking state [ 978.796018][ T1946] bridge0: port 3(team0) entered disabled state [ 978.800413][ T1955] device team0 left promiscuous mode [ 978.800427][ T1955] device team_slave_0 left promiscuous mode [ 978.800613][ T1955] device team_slave_1 left promiscuous mode [ 978.800851][ T1955] bridge0: port 3(team0) entered disabled state [ 978.812388][ T1955] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.836321][ T1955] bond0: (slave team0): Enslaving as an active interface with an up link [ 978.853273][ T1949] device team0 entered promiscuous mode [ 978.853291][ T1949] device team_slave_0 entered promiscuous mode [ 978.853468][ T1949] device team_slave_1 entered promiscuous mode [ 978.858370][ T1949] bond0: (slave team0): Releasing backup interface [ 978.878441][ T1949] bridge0: port 3(team0) entered blocking state [ 978.878502][ T1949] bridge0: port 3(team0) entered disabled state [ 978.890751][ T1951] device team0 entered promiscuous mode [ 978.890768][ T1951] device team_slave_0 entered promiscuous mode [ 978.890909][ T1951] device team_slave_1 entered promiscuous mode [ 978.892505][ T1951] bond0: (slave team0): Releasing backup interface [ 978.901164][ T1951] bridge0: port 3(team0) entered blocking state [ 978.902513][ T1951] bridge0: port 3(team0) entered disabled state [ 978.906842][ T1959] device team0 left promiscuous mode [ 978.906859][ T1959] device team_slave_0 left promiscuous mode [ 978.907033][ T1959] device team_slave_1 left promiscuous mode [ 978.907333][ T1959] bridge0: port 3(team0) entered disabled state [ 978.912564][ T1959] 8021q: adding VLAN 0 to HW filter on device team0 [ 978.936403][ T1959] bond0: (slave team0): Enslaving as an active interface with an up link [ 978.936556][ T1965] device team0 entered promiscuous mode [ 978.936570][ T1965] device team_slave_0 entered promiscuous mode [ 978.936717][ T1965] device team_slave_1 entered promiscuous mode [ 978.952326][ T1965] bond0: (slave team0): Releasing backup interface [ 978.967200][ T1965] bridge0: port 3(team0) entered blocking state [ 978.967269][ T1965] bridge0: port 3(team0) entered disabled state [ 978.980133][ T1955] device team0 entered promiscuous mode [ 978.980150][ T1955] device team_slave_0 entered promiscuous mode [ 978.980369][ T1955] device team_slave_1 entered promiscuous mode [ 978.988400][ T1955] bond0: (slave team0): Releasing backup interface [ 979.011601][ T1955] bridge0: port 3(team0) entered blocking state [ 979.011667][ T1955] bridge0: port 3(team0) entered disabled state [ 979.027861][ T1968] device team0 left promiscuous mode [ 979.027877][ T1968] device team_slave_0 left promiscuous mode [ 979.028019][ T1968] device team_slave_1 left promiscuous mode [ 979.028287][ T1968] bridge0: port 3(team0) entered disabled state [ 979.033775][ T1968] 8021q: adding VLAN 0 to HW filter on device team0 [ 979.043790][ T1968] bond0: (slave team0): Enslaving as an active interface with an up link [ 979.046777][ T1969] bond0: (slave team0): Releasing backup interface [ 979.048610][ T1969] bridge0: port 13(team0) entered blocking state [ 979.051446][ T1969] bridge0: port 13(team0) entered disabled state [ 979.114265][ T1968] device team0 entered promiscuous mode [ 979.114283][ T1968] device team_slave_0 entered promiscuous mode [ 979.114425][ T1968] device team_slave_1 entered promiscuous mode [ 979.120761][ T1968] bond0: (slave team0): Releasing backup interface [ 979.164395][ T1968] bridge0: port 3(team0) entered blocking state [ 979.164459][ T1968] bridge0: port 3(team0) entered disabled state [ 979.199706][ T1973] device team0 left promiscuous mode [ 979.199723][ T1973] device team_slave_0 left promiscuous mode [ 979.199871][ T1973] device team_slave_1 left promiscuous mode [ 979.200109][ T1973] bridge0: port 3(team0) entered disabled state [ 979.209905][ T1974] device team0 left promiscuous mode [ 979.209922][ T1974] device team_slave_0 left promiscuous mode [ 979.210195][ T1974] device team_slave_1 left promiscuous mode [ 979.210439][ T1974] bridge0: port 3(team0) entered disabled state [ 979.238403][ T1974] 8021q: adding VLAN 0 to HW filter on device team0 [ 979.241223][ T1974] bond0: (slave team0): Enslaving as an active interface with an up link [ 979.241359][ T1981] device team0 entered promiscuous mode [ 979.241371][ T1981] device team_slave_0 entered promiscuous mode [ 979.241515][ T1981] device team_slave_1 entered promiscuous mode [ 979.278734][ T1981] bond0: (slave team0): Releasing backup interface [ 979.318289][ T1981] bridge0: port 3(team0) entered blocking state [ 979.318400][ T1981] bridge0: port 3(team0) entered disabled state [ 979.333361][ T1978] device team0 left promiscuous mode [ 979.333378][ T1978] device team_slave_1 left promiscuous mode [ 979.333613][ T1978] bridge0: port 13(team0) entered disabled state [ 979.338053][ T1978] 8021q: adding VLAN 0 to HW filter on device team0 [ 979.339175][ T1978] device team0 entered promiscuous mode [ 979.339188][ T1978] device team_slave_1 entered promiscuous mode [ 979.339995][ T1978] bond0: (slave team0): Enslaving as an active interface with an up link [ 979.344896][ T1984] device team0 left promiscuous mode [ 979.344912][ T1984] device team_slave_0 left promiscuous mode [ 979.345057][ T1984] device team_slave_1 left promiscuous mode [ 979.345309][ T1984] bridge0: port 3(team0) entered disabled state [ 979.362775][ T1984] 8021q: adding VLAN 0 to HW filter on device team0 [ 979.365452][ T1984] bond0: (slave team0): Enslaving as an active interface with an up link [ 979.373572][ T1985] device team0 left promiscuous mode [ 979.373588][ T1985] device team_slave_0 left promiscuous mode [ 979.373721][ T1985] device team_slave_1 left promiscuous mode [ 979.373959][ T1985] bridge0: port 3(team0) entered disabled state [ 979.382896][ T1985] 8021q: adding VLAN 0 to HW filter on device team0 [ 979.397421][ T1985] bond0: (slave team0): Enslaving as an active interface with an up link [ 979.400660][ T1989] device team0 entered promiscuous mode [ 979.400677][ T1989] device team_slave_0 entered promiscuous mode [ 979.400821][ T1989] device team_slave_1 entered promiscuous mode [ 979.410027][ T1989] bond0: (slave team0): Releasing backup interface [ 979.442305][ T1989] bridge0: port 3(team0) entered blocking state [ 979.442367][ T1989] bridge0: port 3(team0) entered disabled state [ 979.452665][ T1991] device team0 entered promiscuous mode [ 979.452683][ T1991] device team_slave_0 entered promiscuous mode [ 979.452808][ T1991] device team_slave_1 entered promiscuous mode [ 979.464268][ T1991] bond0: (slave team0): Releasing backup interface [ 979.506602][ T1991] bridge0: port 3(team0) entered blocking state [ 979.506667][ T1991] bridge0: port 3(team0) entered disabled state [ 979.513386][ T1987] device team0 left promiscuous mode [ 979.513402][ T1987] device team_slave_0 left promiscuous mode [ 979.513529][ T1987] device team_slave_1 left promiscuous mode [ 979.513754][ T1987] bridge0: port 3(team0) entered disabled state [ 979.523164][ T1987] 8021q: adding VLAN 0 to HW filter on device team0 [ 979.527355][ T1987] bond0: (slave team0): Enslaving as an active interface with an up link [ 979.527516][ T1993] device team0 entered promiscuous mode [ 979.527528][ T1993] device team_slave_0 entered promiscuous mode [ 979.527677][ T1993] device team_slave_1 entered promiscuous mode [ 979.534640][ T1993] bond0: (slave team0): Releasing backup interface [ 979.580093][ T1993] bridge0: port 3(team0) entered blocking state [ 979.580154][ T1993] bridge0: port 3(team0) entered disabled state [ 979.614616][ T2000] device team0 left promiscuous mode [ 979.614635][ T2000] device team_slave_0 left promiscuous mode [ 979.614774][ T2000] device team_slave_1 left promiscuous mode [ 979.615027][ T2000] bridge0: port 3(team0) entered disabled state [ 979.638548][ T2000] 8021q: adding VLAN 0 to HW filter on device team0 [ 979.639937][ T2000] bond0: (slave team0): Enslaving as an active interface with an up link [ 979.649265][ T2001] device team0 entered promiscuous mode [ 979.649283][ T2001] device team_slave_0 entered promiscuous mode [ 979.649427][ T2001] device team_slave_1 entered promiscuous mode [ 979.652718][ T2001] bond0: (slave team0): Releasing backup interface [ 979.710820][ T2001] bridge0: port 3(team0) entered blocking state [ 979.710913][ T2001] bridge0: port 3(team0) entered disabled state [ 979.716555][ T2004] 8021q: adding VLAN 0 to HW filter on device team0 [ 979.717921][ T2004] bond0: (slave team0): Enslaving as an active interface with an up link [ 979.717981][ T2010] device team0 entered promiscuous mode [ 979.717994][ T2010] device team_slave_0 entered promiscuous mode [ 979.718130][ T2010] device team_slave_1 entered promiscuous mode [ 979.722255][ T2010] bond0: (slave team0): Releasing backup interface [ 979.747674][ T2010] bridge0: port 3(team0) entered blocking state [ 979.747736][ T2010] bridge0: port 3(team0) entered disabled state [ 979.752077][ T2005] device team0 left promiscuous mode [ 979.752128][ T2005] device team_slave_0 left promiscuous mode [ 979.752260][ T2005] device team_slave_1 left promiscuous mode [ 979.752513][ T2005] bridge0: port 3(team0) entered disabled state [ 979.759534][ T2005] 8021q: adding VLAN 0 to HW filter on device team0 [ 979.762140][ T2005] bond0: (slave team0): Enslaving as an active interface with an up link [ 979.762365][ T2007] device team0 left promiscuous mode [ 979.762378][ T2007] device team_slave_0 left promiscuous mode [ 979.762546][ T2007] device team_slave_1 left promiscuous mode [ 979.762777][ T2007] bridge0: port 3(team0) entered disabled state [ 979.774731][ T2007] 8021q: adding VLAN 0 to HW filter on device team0 [ 979.781387][ T2007] bond0: (slave team0): Enslaving as an active interface with an up link [ 979.781538][ T2011] device team0 entered promiscuous mode [ 979.781551][ T2011] device team_slave_0 entered promiscuous mode [ 979.781677][ T2011] device team_slave_1 entered promiscuous mode [ 979.782980][ T2011] bond0: (slave team0): Releasing backup interface [ 979.799920][ T2011] bridge0: port 3(team0) entered blocking state [ 979.799983][ T2011] bridge0: port 3(team0) entered disabled state [ 979.820400][ T2012] device team0 entered promiscuous mode [ 979.820416][ T2012] device team_slave_0 entered promiscuous mode [ 979.820567][ T2012] device team_slave_1 entered promiscuous mode [ 979.838795][ T2012] bond0: (slave team0): Releasing backup interface [ 979.869358][ T2012] bridge0: port 3(team0) entered blocking state [ 979.869492][ T2012] bridge0: port 3(team0) entered disabled state [ 979.882605][ T2015] bond0: (slave team0): Releasing backup interface [ 979.884473][ T2015] bridge0: port 13(team0) entered blocking state [ 979.884536][ T2015] bridge0: port 13(team0) entered disabled state [ 979.934396][ T2017] device team0 left promiscuous mode [ 979.934413][ T2017] device team_slave_0 left promiscuous mode [ 979.934551][ T2017] device team_slave_1 left promiscuous mode [ 979.937578][ T2017] bridge0: port 3(team0) entered disabled state [ 979.973609][ T2017] 8021q: adding VLAN 0 to HW filter on device team0 [ 979.980089][ T2017] bond0: (slave team0): Enslaving as an active interface with an up link [ 979.999156][ T2020] device team0 left promiscuous mode [ 979.999173][ T2020] device team_slave_0 left promiscuous mode [ 979.999308][ T2020] device team_slave_1 left promiscuous mode [ 979.999669][ T2020] bridge0: port 3(team0) entered disabled state [ 980.020487][ T2020] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.022818][ T2020] bond0: (slave team0): Enslaving as an active interface with an up link [ 980.023380][ T2027] device team0 left promiscuous mode [ 980.023395][ T2027] device team_slave_0 left promiscuous mode [ 980.023534][ T2027] device team_slave_1 left promiscuous mode [ 980.023809][ T2027] bridge0: port 3(team0) entered disabled state [ 980.041283][ T2027] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.094591][ T2027] bond0: (slave team0): Enslaving as an active interface with an up link [ 980.105735][ T2030] device team0 left promiscuous mode [ 980.105751][ T2030] device team_slave_0 left promiscuous mode [ 980.105878][ T2030] device team_slave_1 left promiscuous mode [ 980.106139][ T2030] bridge0: port 3(team0) entered disabled state [ 980.111812][ T2030] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.115281][ T2030] bond0: (slave team0): Enslaving as an active interface with an up link [ 980.115435][ T2017] device team0 entered promiscuous mode [ 980.115451][ T2017] device team_slave_0 entered promiscuous mode [ 980.116130][ T2017] device team_slave_1 entered promiscuous mode [ 980.122771][ T2017] bond0: (slave team0): Releasing backup interface [ 980.128126][ T2017] bridge0: port 3(team0) entered blocking state [ 980.128189][ T2017] bridge0: port 3(team0) entered disabled state [ 980.141689][ T2020] device team0 entered promiscuous mode [ 980.141708][ T2020] device team_slave_0 entered promiscuous mode [ 980.141844][ T2020] device team_slave_1 entered promiscuous mode [ 980.143292][ T2020] bond0: (slave team0): Releasing backup interface [ 980.150843][ T2020] bridge0: port 3(team0) entered blocking state [ 980.150914][ T2020] bridge0: port 3(team0) entered disabled state [ 980.163274][ T2033] device team0 entered promiscuous mode [ 980.163291][ T2033] device team_slave_0 entered promiscuous mode [ 980.163469][ T2033] device team_slave_1 entered promiscuous mode [ 980.170866][ T2033] bond0: (slave team0): Releasing backup interface [ 980.198919][ T2033] bridge0: port 3(team0) entered blocking state [ 980.198984][ T2033] bridge0: port 3(team0) entered disabled state [ 980.208137][ T2032] device team0 entered promiscuous mode [ 980.208154][ T2032] device team_slave_0 entered promiscuous mode [ 980.208301][ T2032] device team_slave_1 entered promiscuous mode [ 980.223819][ T2032] bond0: (slave team0): Releasing backup interface [ 980.249617][ T2032] bridge0: port 3(team0) entered blocking state [ 980.249843][ T2032] bridge0: port 3(team0) entered disabled state [ 980.254784][ T2036] device team0 left promiscuous mode [ 980.254801][ T2036] device team_slave_0 left promiscuous mode [ 980.254928][ T2036] device team_slave_1 left promiscuous mode [ 980.255160][ T2036] bridge0: port 3(team0) entered disabled state [ 980.260366][ T2036] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.274588][ T2036] bond0: (slave team0): Enslaving as an active interface with an up link [ 980.287509][ T2048] device team0 left promiscuous mode [ 980.287526][ T2048] device team_slave_1 left promiscuous mode [ 980.287817][ T2048] bridge0: port 13(team0) entered disabled state [ 980.331669][ T2048] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.332727][ T2048] device team0 entered promiscuous mode [ 980.332742][ T2048] device team_slave_1 entered promiscuous mode [ 980.333472][ T2048] bond0: (slave team0): Enslaving as an active interface with an up link [ 980.333581][ T2046] device team0 entered promiscuous mode [ 980.333595][ T2046] device team_slave_0 entered promiscuous mode [ 980.333717][ T2046] device team_slave_1 entered promiscuous mode [ 980.337359][ T2046] bond0: (slave team0): Releasing backup interface [ 980.357422][ T2046] bridge0: port 3(team0) entered blocking state [ 980.363245][ T2046] bridge0: port 3(team0) entered disabled state [ 980.368808][ T2051] device team0 left promiscuous mode [ 980.368824][ T2051] device team_slave_0 left promiscuous mode [ 980.368960][ T2051] device team_slave_1 left promiscuous mode [ 980.369305][ T2051] bridge0: port 3(team0) entered disabled state [ 980.381259][ T2051] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.384173][ T2051] bond0: (slave team0): Enslaving as an active interface with an up link [ 980.389274][ T2048] bond0: (slave team0): Releasing backup interface [ 980.402607][ T2048] bridge0: port 13(team0) entered blocking state [ 980.402673][ T2048] bridge0: port 13(team0) entered disabled state [ 980.418157][ T2054] device team0 entered promiscuous mode [ 980.418175][ T2054] device team_slave_0 entered promiscuous mode [ 980.418313][ T2054] device team_slave_1 entered promiscuous mode [ 980.426725][ T2054] bond0: (slave team0): Releasing backup interface [ 980.484605][ T2054] bridge0: port 3(team0) entered blocking state [ 980.484668][ T2054] bridge0: port 3(team0) entered disabled state [ 980.488805][ T2052] device team0 left promiscuous mode [ 980.488861][ T2052] device team_slave_0 left promiscuous mode [ 980.488997][ T2052] device team_slave_1 left promiscuous mode [ 980.489245][ T2052] bridge0: port 3(team0) entered disabled state [ 980.504541][ T2058] device team0 left promiscuous mode [ 980.504558][ T2058] device team_slave_0 left promiscuous mode [ 980.504698][ T2058] device team_slave_1 left promiscuous mode [ 980.504949][ T2058] bridge0: port 3(team0) entered disabled state [ 980.510770][ T2060] device team0 left promiscuous mode [ 980.510786][ T2060] device team_slave_0 left promiscuous mode [ 980.511010][ T2060] device team_slave_1 left promiscuous mode [ 980.511304][ T2060] bridge0: port 3(team0) entered disabled state [ 980.533664][ T2064] device team0 left promiscuous mode [ 980.533681][ T2064] device team_slave_0 left promiscuous mode [ 980.533878][ T2064] device team_slave_1 left promiscuous mode [ 980.534156][ T2064] bridge0: port 3(team0) entered disabled state [ 980.567638][ T2067] device team0 left promiscuous mode [ 980.567655][ T2067] device team_slave_1 left promiscuous mode [ 980.567893][ T2067] bridge0: port 13(team0) entered disabled state [ 980.607942][ T2067] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.609102][ T2067] device team0 entered promiscuous mode [ 980.609116][ T2067] device team_slave_1 entered promiscuous mode [ 980.635457][ T2067] bond0: (slave team0): Enslaving as an active interface with an up link [ 980.659969][ T2070] bond0: (slave team0): Releasing backup interface [ 980.678472][ T2070] bridge0: port 13(team0) entered blocking state [ 980.678541][ T2070] bridge0: port 13(team0) entered disabled state [ 980.688307][ T2076] netlink: 14 bytes leftover after parsing attributes in process `syz-executor.2'. [ 980.688574][ T2079] device team0 left promiscuous mode [ 980.688589][ T2079] device team_slave_0 left promiscuous mode [ 980.688724][ T2079] device team_slave_1 left promiscuous mode [ 980.688967][ T2079] bridge0: port 3(team0) entered disabled state [ 980.692751][ T2079] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.699134][ T2079] bond0: (slave team0): Enslaving as an active interface with an up link [ 980.709134][ T2081] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.730130][ T2081] bond0: (slave team0): Enslaving as an active interface with an up link [ 980.752956][ T2084] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.773974][ T2084] bond0: (slave team0): Enslaving as an active interface with an up link [ 980.774142][ T2081] device team0 entered promiscuous mode [ 980.774156][ T2081] device team_slave_0 entered promiscuous mode [ 980.774288][ T2081] device team_slave_1 entered promiscuous mode [ 980.781975][ T2081] bond0: (slave team0): Releasing backup interface [ 980.796482][ T2081] bridge0: port 3(team0) entered blocking state [ 980.796542][ T2081] bridge0: port 3(team0) entered disabled state [ 980.809519][ T2079] device team0 entered promiscuous mode [ 980.809536][ T2079] device team_slave_0 entered promiscuous mode [ 980.809668][ T2079] device team_slave_1 entered promiscuous mode [ 980.821740][ T2079] bond0: (slave team0): Releasing backup interface [ 980.842637][ T2079] bridge0: port 3(team0) entered blocking state [ 980.842697][ T2079] bridge0: port 3(team0) entered disabled state [ 980.888867][ T2092] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.899092][ T2092] bond0: (slave team0): Enslaving as an active interface with an up link [ 980.902372][ T2084] device team0 entered promiscuous mode [ 980.902388][ T2084] device team_slave_0 entered promiscuous mode [ 980.902524][ T2084] device team_slave_1 entered promiscuous mode [ 980.903975][ T2084] bond0: (slave team0): Releasing backup interface [ 980.915377][ T2084] bridge0: port 3(team0) entered blocking state [ 980.915448][ T2084] bridge0: port 3(team0) entered disabled state [ 980.918537][ T2095] device team0 left promiscuous mode [ 980.918551][ T2095] device team_slave_1 left promiscuous mode [ 980.918831][ T2095] bridge0: port 13(team0) entered disabled state [ 980.922757][ T2095] 8021q: adding VLAN 0 to HW filter on device team0 [ 980.924135][ T2095] device team0 entered promiscuous mode [ 980.924148][ T2095] device team_slave_1 entered promiscuous mode [ 980.925090][ T2095] bond0: (slave team0): Enslaving as an active interface with an up link [ 980.925232][ T2096] device team0 entered promiscuous mode [ 980.925244][ T2096] device team_slave_0 entered promiscuous mode [ 980.925428][ T2096] device team_slave_1 entered promiscuous mode [ 980.929675][ T2096] bond0: (slave team0): Releasing backup interface [ 980.977412][ T2096] bridge0: port 3(team0) entered blocking state [ 980.977479][ T2096] bridge0: port 3(team0) entered disabled state [ 980.995198][ T2094] bond0: (slave team0): Releasing backup interface [ 981.009823][ T2094] bridge0: port 13(team0) entered blocking state [ 981.009883][ T2094] bridge0: port 13(team0) entered disabled state [ 981.022748][ T2098] device team0 left promiscuous mode [ 981.022765][ T2098] device team_slave_0 left promiscuous mode [ 981.022889][ T2098] device team_slave_1 left promiscuous mode [ 981.023133][ T2098] bridge0: port 3(team0) entered disabled state [ 981.039531][ T2098] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.070527][ T2098] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.090786][ T2101] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.105361][ T2101] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.108793][ T2102] device team0 left promiscuous mode [ 981.108809][ T2102] device team_slave_0 left promiscuous mode [ 981.108939][ T2102] device team_slave_1 left promiscuous mode [ 981.109205][ T2102] bridge0: port 3(team0) entered disabled state [ 981.126188][ T2102] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.131930][ T2102] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.133170][ T2108] device team0 left promiscuous mode [ 981.133184][ T2108] device team_slave_1 left promiscuous mode [ 981.136351][ T2108] bridge0: port 13(team0) entered disabled state [ 981.154651][ T2108] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.162739][ T2108] device team0 entered promiscuous mode [ 981.162756][ T2108] device team_slave_1 entered promiscuous mode [ 981.163642][ T2108] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.167851][ T2098] device team0 entered promiscuous mode [ 981.167869][ T2098] device team_slave_0 entered promiscuous mode [ 981.168001][ T2098] device team_slave_1 entered promiscuous mode [ 981.172197][ T2098] bond0: (slave team0): Releasing backup interface [ 981.184238][ T2098] bridge0: port 3(team0) entered blocking state [ 981.184302][ T2098] bridge0: port 3(team0) entered disabled state [ 981.193756][ T2101] device team0 entered promiscuous mode [ 981.193772][ T2101] device team_slave_0 entered promiscuous mode [ 981.193913][ T2101] device team_slave_1 entered promiscuous mode [ 981.201179][ T2101] bond0: (slave team0): Releasing backup interface [ 981.217640][ T2101] bridge0: port 3(team0) entered blocking state [ 981.217704][ T2101] bridge0: port 3(team0) entered disabled state [ 981.228140][ T2109] device team0 left promiscuous mode [ 981.228157][ T2109] device team_slave_0 left promiscuous mode [ 981.228308][ T2109] device team_slave_1 left promiscuous mode [ 981.228575][ T2109] bridge0: port 3(team0) entered disabled state [ 981.233367][ T2109] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.234788][ T2109] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.234894][ T2102] device team0 entered promiscuous mode [ 981.234907][ T2102] device team_slave_0 entered promiscuous mode [ 981.235043][ T2102] device team_slave_1 entered promiscuous mode [ 981.236491][ T2102] bond0: (slave team0): Releasing backup interface [ 981.254749][ T2102] bridge0: port 3(team0) entered blocking state [ 981.254810][ T2102] bridge0: port 3(team0) entered disabled state [ 981.263791][ T2108] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 981.264141][ T2111] device team0 left promiscuous mode [ 981.264154][ T2111] device team_slave_0 left promiscuous mode [ 981.264291][ T2111] device team_slave_1 left promiscuous mode [ 981.264553][ T2111] bridge0: port 3(team0) entered disabled state [ 981.290726][ T2111] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.296517][ T2111] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.303346][ T2112] device team0 entered promiscuous mode [ 981.303363][ T2112] device team_slave_0 entered promiscuous mode [ 981.303497][ T2112] device team_slave_1 entered promiscuous mode [ 981.334011][ T2112] bond0: (slave team0): Releasing backup interface [ 981.347508][ T2112] bridge0: port 3(team0) entered blocking state [ 981.347571][ T2112] bridge0: port 3(team0) entered disabled state [ 981.349804][ T2113] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 981.404535][ T2114] device team0 entered promiscuous mode [ 981.404552][ T2114] device team_slave_0 entered promiscuous mode [ 981.404684][ T2114] device team_slave_1 entered promiscuous mode [ 981.422470][ T2114] bond0: (slave team0): Releasing backup interface [ 981.433434][ T2114] bridge0: port 3(team0) entered blocking state [ 981.433496][ T2114] bridge0: port 3(team0) entered disabled state [ 981.470823][ T2117] bond0: (slave team0): Releasing backup interface [ 981.494924][ T2117] bridge0: port 13(team0) entered blocking state [ 981.494985][ T2117] bridge0: port 13(team0) entered disabled state [ 981.511213][ T2116] device team0 left promiscuous mode [ 981.511231][ T2116] device team_slave_0 left promiscuous mode [ 981.511367][ T2116] device team_slave_1 left promiscuous mode [ 981.511595][ T2116] bridge0: port 3(team0) entered disabled state [ 981.523193][ T2116] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.545614][ T2116] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.546139][ T2125] device team0 entered promiscuous mode [ 981.546153][ T2125] device team_slave_0 entered promiscuous mode [ 981.546282][ T2125] device team_slave_1 entered promiscuous mode [ 981.558596][ T2125] bond0: (slave team0): Releasing backup interface [ 981.587378][ T2125] bridge0: port 3(team0) entered blocking state [ 981.587434][ T2125] bridge0: port 3(team0) entered disabled state [ 981.595113][ T2124] device team0 left promiscuous mode [ 981.595131][ T2124] device team_slave_0 left promiscuous mode [ 981.595266][ T2124] device team_slave_1 left promiscuous mode [ 981.595942][ T2124] bridge0: port 3(team0) entered disabled state [ 981.602875][ T2124] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.609289][ T2124] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.609512][ T2123] device team0 left promiscuous mode [ 981.609525][ T2123] device team_slave_0 left promiscuous mode [ 981.609650][ T2123] device team_slave_1 left promiscuous mode [ 981.610019][ T2123] bridge0: port 3(team0) entered disabled state [ 981.617314][ T2127] device team0 entered promiscuous mode [ 981.617331][ T2127] device team_slave_0 entered promiscuous mode [ 981.617481][ T2127] device team_slave_1 entered promiscuous mode [ 981.619337][ T2127] bond0: (slave team0): Releasing backup interface [ 981.637750][ T2127] bridge0: port 3(team0) entered blocking state [ 981.638003][ T2127] bridge0: port 3(team0) entered disabled state [ 981.644705][ T2129] device team0 left promiscuous mode [ 981.644721][ T2129] device team_slave_0 left promiscuous mode [ 981.644864][ T2129] device team_slave_1 left promiscuous mode [ 981.645153][ T2129] bridge0: port 3(team0) entered disabled state [ 981.649938][ T2129] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.666969][ T2129] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.689783][ T2131] device team0 entered promiscuous mode [ 981.689799][ T2131] device team_slave_0 entered promiscuous mode [ 981.697676][ T2131] device team_slave_1 entered promiscuous mode [ 981.709354][ T2131] bond0: (slave team0): Releasing backup interface [ 981.733495][ T2131] bridge0: port 3(team0) entered blocking state [ 981.733558][ T2131] bridge0: port 3(team0) entered disabled state [ 981.743861][ T2132] device team0 left promiscuous mode [ 981.743877][ T2132] device team_slave_0 left promiscuous mode [ 981.744006][ T2132] device team_slave_1 left promiscuous mode [ 981.744239][ T2132] bridge0: port 3(team0) entered disabled state [ 981.763733][ T2132] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.767160][ T2132] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.767434][ T2139] device team0 left promiscuous mode [ 981.767447][ T2139] device team_slave_1 left promiscuous mode [ 981.767713][ T2139] bridge0: port 13(team0) entered disabled state [ 981.784118][ T2139] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.785295][ T2139] device team0 entered promiscuous mode [ 981.785309][ T2139] device team_slave_1 entered promiscuous mode [ 981.788511][ T2139] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.791421][ T2141] device team0 entered promiscuous mode [ 981.791437][ T2141] device team_slave_0 entered promiscuous mode [ 981.791569][ T2141] device team_slave_1 entered promiscuous mode [ 981.802315][ T2141] bond0: (slave team0): Releasing backup interface [ 981.830772][ T2141] bridge0: port 3(team0) entered blocking state [ 981.839147][ T2141] bridge0: port 3(team0) entered disabled state [ 981.852484][ T2142] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.854241][ T2142] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.854350][ T2144] device team0 entered promiscuous mode [ 981.854364][ T2144] device team_slave_0 entered promiscuous mode [ 981.854502][ T2144] device team_slave_1 entered promiscuous mode [ 981.857345][ T2144] bond0: (slave team0): Releasing backup interface [ 981.888457][ T2144] bridge0: port 3(team0) entered blocking state [ 981.888522][ T2144] bridge0: port 3(team0) entered disabled state [ 981.907065][ T2148] device team0 left promiscuous mode [ 981.907082][ T2148] device team_slave_0 left promiscuous mode [ 981.907205][ T2148] device team_slave_1 left promiscuous mode [ 981.907456][ T2148] bridge0: port 3(team0) entered disabled state [ 981.920295][ T2148] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.921848][ T2148] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.927495][ T2156] bridge0: port 3(team0) entered disabled state [ 981.936511][ T2156] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.948202][ T2156] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.948466][ T2147] device team0 left promiscuous mode [ 981.948480][ T2147] device team_slave_0 left promiscuous mode [ 981.948616][ T2147] device team_slave_1 left promiscuous mode [ 981.948862][ T2147] bridge0: port 3(team0) entered disabled state [ 981.959549][ T2147] 8021q: adding VLAN 0 to HW filter on device team0 [ 981.961178][ T2147] bond0: (slave team0): Enslaving as an active interface with an up link [ 981.961311][ T2150] device team0 entered promiscuous mode [ 981.961324][ T2150] device team_slave_0 entered promiscuous mode [ 981.961459][ T2150] device team_slave_1 entered promiscuous mode [ 981.966395][ T2150] bond0: (slave team0): Releasing backup interface [ 981.984183][ T2150] bridge0: port 3(team0) entered blocking state [ 981.984242][ T2150] bridge0: port 3(team0) entered disabled state [ 981.996877][ T2154] device team0 entered promiscuous mode [ 981.996896][ T2154] device team_slave_0 entered promiscuous mode [ 981.997049][ T2154] device team_slave_1 entered promiscuous mode [ 982.000508][ T2154] bond0: (slave team0): Releasing backup interface [ 982.014001][ T2154] bridge0: port 3(team0) entered blocking state [ 982.014065][ T2154] bridge0: port 3(team0) entered disabled state [ 982.061422][ T2160] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 982.061908][ T2159] device team0 left promiscuous mode [ 982.061922][ T2159] device team_slave_0 left promiscuous mode [ 982.062065][ T2159] device team_slave_1 left promiscuous mode [ 982.062348][ T2159] bridge0: port 3(team0) entered disabled state [ 982.071793][ T2159] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.090380][ T2159] bond0: (slave team0): Enslaving as an active interface with an up link [ 982.124781][ T2157] bond0: (slave team0): Releasing backup interface [ 982.129321][ T2157] bridge0: port 13(team0) entered blocking state [ 982.129452][ T2157] bridge0: port 13(team0) entered disabled state [ 982.134367][ T2166] device team0 left promiscuous mode [ 982.134384][ T2166] device team_slave_0 left promiscuous mode [ 982.134519][ T2166] device team_slave_1 left promiscuous mode [ 982.149320][ T2165] device team0 left promiscuous mode [ 982.149338][ T2165] device team_slave_0 left promiscuous mode [ 982.149469][ T2165] device team_slave_1 left promiscuous mode [ 982.149698][ T2165] bridge0: port 3(team0) entered disabled state [ 982.157143][ T2165] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.158809][ T2165] bond0: (slave team0): Enslaving as an active interface with an up link [ 982.205315][ T2165] device team0 entered promiscuous mode [ 982.205332][ T2165] device team_slave_0 entered promiscuous mode [ 982.205463][ T2165] device team_slave_1 entered promiscuous mode [ 982.234203][ T2165] bond0: (slave team0): Releasing backup interface [ 982.246916][ T2165] bridge0: port 3(team0) entered blocking state [ 982.246977][ T2165] bridge0: port 3(team0) entered disabled state [ 982.274663][ T2176] device team0 left promiscuous mode [ 982.274680][ T2176] device team_slave_0 left promiscuous mode [ 982.274806][ T2176] device team_slave_1 left promiscuous mode [ 982.275097][ T2176] bridge0: port 3(team0) entered disabled state [ 982.297825][ T2176] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.303717][ T2176] bond0: (slave team0): Enslaving as an active interface with an up link [ 982.336555][ T2177] device team0 entered promiscuous mode [ 982.336575][ T2177] device team_slave_0 entered promiscuous mode [ 982.336714][ T2177] device team_slave_1 entered promiscuous mode [ 982.388139][ T2177] bond0: (slave team0): Releasing backup interface [ 982.389999][ T2177] bridge0: port 3(team0) entered blocking state [ 982.390063][ T2177] bridge0: port 3(team0) entered disabled state [ 982.394075][ T2176] device team0 entered promiscuous mode [ 982.394091][ T2176] device team_slave_0 entered promiscuous mode [ 982.394210][ T2176] device team_slave_1 entered promiscuous mode [ 982.417728][ T2176] bond0: (slave team0): Releasing backup interface [ 982.430783][ T2176] bridge0: port 3(team0) entered blocking state [ 982.430860][ T2176] bridge0: port 3(team0) entered disabled state [ 982.434934][ T2179] device team0 left promiscuous mode [ 982.434950][ T2179] device team_slave_0 left promiscuous mode [ 982.435078][ T2179] device team_slave_1 left promiscuous mode [ 982.435401][ T2179] bridge0: port 3(team0) entered disabled state [ 982.453014][ T2179] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.478945][ T2179] bond0: (slave team0): Enslaving as an active interface with an up link [ 982.479278][ T2186] bridge0: port 3(team0) entered disabled state [ 982.482848][ T2186] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.484431][ T2186] bond0: (slave team0): Enslaving as an active interface with an up link [ 982.616851][ T2194] device team0 left promiscuous mode [ 982.616868][ T2194] device team_slave_0 left promiscuous mode [ 982.617010][ T2194] device team_slave_1 left promiscuous mode [ 982.617281][ T2194] bridge0: port 3(team0) entered disabled state [ 982.634313][ T2194] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.637854][ T2194] bond0: (slave team0): Enslaving as an active interface with an up link [ 982.638215][ T2197] device team0 left promiscuous mode [ 982.638229][ T2197] device team_slave_0 left promiscuous mode [ 982.638355][ T2197] device team_slave_1 left promiscuous mode [ 982.649866][ T2196] device team0 entered promiscuous mode [ 982.649885][ T2196] device team_slave_0 entered promiscuous mode [ 982.650037][ T2196] device team_slave_1 entered promiscuous mode [ 982.657567][ T2196] bond0: (slave team0): Releasing backup interface [ 982.686488][ T2196] bridge0: port 3(team0) entered blocking state [ 982.686552][ T2196] bridge0: port 3(team0) entered disabled state [ 982.690065][ T2204] device team0 left promiscuous mode [ 982.690083][ T2204] device team_slave_0 left promiscuous mode [ 982.690231][ T2204] device team_slave_1 left promiscuous mode [ 982.690486][ T2204] bridge0: port 3(team0) entered disabled state [ 982.731873][ T2204] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.736961][ T2204] bond0: (slave team0): Enslaving as an active interface with an up link [ 982.754291][ T2194] device team0 entered promiscuous mode [ 982.754310][ T2194] device team_slave_0 entered promiscuous mode [ 982.754458][ T2194] device team_slave_1 entered promiscuous mode [ 982.755954][ T2194] bond0: (slave team0): Releasing backup interface [ 982.779217][ T2194] bridge0: port 3(team0) entered blocking state [ 982.779280][ T2194] bridge0: port 3(team0) entered disabled state [ 982.781251][ T2205] device team0 entered promiscuous mode [ 982.781266][ T2205] device team_slave_0 entered promiscuous mode [ 982.781441][ T2205] device team_slave_1 entered promiscuous mode [ 982.782678][ T2205] bond0: (slave team0): Releasing backup interface [ 982.810789][ T2205] bridge0: port 3(team0) entered blocking state [ 982.810853][ T2205] bridge0: port 3(team0) entered disabled state [ 982.853688][ T2211] device team0 left promiscuous mode [ 982.853706][ T2211] device team_slave_1 left promiscuous mode [ 982.853975][ T2211] bridge0: port 13(team0) entered disabled state [ 982.868894][ T2211] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.873659][ T2211] device team0 entered promiscuous mode [ 982.873678][ T2211] device team_slave_1 entered promiscuous mode [ 982.878970][ T2211] bond0: (slave team0): Enslaving as an active interface with an up link [ 982.879242][ T2209] device team0 left promiscuous mode [ 982.879256][ T2209] device team_slave_0 left promiscuous mode [ 982.879395][ T2209] device team_slave_1 left promiscuous mode [ 982.879669][ T2209] bridge0: port 3(team0) entered disabled state [ 982.897567][ T2209] 8021q: adding VLAN 0 to HW filter on device team0 [ 982.927566][ T2209] bond0: (slave team0): Enslaving as an active interface with an up link [ 982.974226][ T2213] device team0 entered promiscuous mode [ 982.974245][ T2213] device team_slave_0 entered promiscuous mode [ 982.974386][ T2213] device team_slave_1 entered promiscuous mode [ 982.989694][ T2213] bond0: (slave team0): Releasing backup interface [ 982.994561][ T2213] bridge0: port 3(team0) entered blocking state [ 982.994623][ T2213] bridge0: port 3(team0) entered disabled state [ 983.068462][ T2216] device team0 entered promiscuous mode [ 983.068481][ T2216] device team_slave_0 entered promiscuous mode [ 983.068627][ T2216] device team_slave_1 entered promiscuous mode [ 983.069963][ T2216] bond0: (slave team0): Releasing backup interface [ 983.071432][ T2216] bridge0: port 3(team0) entered blocking state [ 983.071556][ T2216] bridge0: port 3(team0) entered disabled state [ 983.080782][ T2218] device team0 left promiscuous mode [ 983.080798][ T2218] device team_slave_0 left promiscuous mode [ 983.080937][ T2218] device team_slave_1 left promiscuous mode [ 983.081217][ T2218] bridge0: port 3(team0) entered disabled state [ 983.091987][ T2218] 8021q: adding VLAN 0 to HW filter on device team0 [ 983.106454][ T2218] bond0: (slave team0): Enslaving as an active interface with an up link [ 983.115340][ T2225] device team0 left promiscuous mode [ 983.115440][ T2225] device team_slave_0 left promiscuous mode [ 983.115638][ T2225] device team_slave_1 left promiscuous mode [ 983.115899][ T2225] bridge0: port 3(team0) entered disabled state [ 983.134647][ T2225] 8021q: adding VLAN 0 to HW filter on device team0 [ 983.141099][ T2225] bond0: (slave team0): Enslaving as an active interface with an up link [ 983.142697][ T2227] bond0: (slave team0): Releasing backup interface [ 983.174570][ T2227] bridge0: port 3(team0) entered blocking state [ 983.174631][ T2227] bridge0: port 3(team0) entered disabled state [ 983.184442][ T2227] device team0 entered promiscuous mode [ 983.184459][ T2227] device team_slave_0 entered promiscuous mode [ 983.184607][ T2227] device team_slave_1 entered promiscuous mode [ 983.191132][ T2229] device team0 entered promiscuous mode [ 983.191151][ T2229] device team_slave_0 entered promiscuous mode [ 983.191296][ T2229] device team_slave_1 entered promiscuous mode [ 983.195414][ T2229] bond0: (slave team0): Releasing backup interface [ 983.199412][ T2229] bridge0: port 3(team0) entered blocking state [ 983.199472][ T2229] bridge0: port 3(team0) entered disabled state [ 983.206483][ T2228] device team0 entered promiscuous mode [ 983.206499][ T2228] device team_slave_0 entered promiscuous mode [ 983.206662][ T2228] device team_slave_1 entered promiscuous mode [ 983.208151][ T2228] bond0: (slave team0): Releasing backup interface [ 983.221532][ T2228] bridge0: port 3(team0) entered blocking state [ 983.221657][ T2228] bridge0: port 3(team0) entered disabled state [ 983.270605][ T2240] device team0 left promiscuous mode [ 983.270623][ T2240] device team_slave_0 left promiscuous mode [ 983.270765][ T2240] device team_slave_1 left promiscuous mode [ 983.271036][ T2240] bridge0: port 3(team0) entered disabled state [ 983.299008][ T2240] 8021q: adding VLAN 0 to HW filter on device team0 [ 983.300441][ T2240] bond0: (slave team0): Enslaving as an active interface with an up link [ 983.300796][ T2241] device team0 left promiscuous mode [ 983.300809][ T2241] device team_slave_0 left promiscuous mode [ 983.300948][ T2241] device team_slave_1 left promiscuous mode [ 983.301213][ T2241] bridge0: port 3(team0) entered disabled state [ 983.318075][ T2241] 8021q: adding VLAN 0 to HW filter on device team0 [ 983.375129][ T2241] bond0: (slave team0): Enslaving as an active interface with an up link [ 983.375252][ T2246] validate_nla: 132 callbacks suppressed [ 983.375268][ T2246] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 983.377101][ T2246] bond0: (slave team0): Releasing backup interface [ 983.390252][ T2246] bridge0: port 3(team0) entered blocking state [ 983.390312][ T2246] bridge0: port 3(team0) entered disabled state [ 983.441199][ T2246] device team0 entered promiscuous mode [ 983.441217][ T2246] device team_slave_0 entered promiscuous mode [ 983.441505][ T2246] device team_slave_1 entered promiscuous mode [ 983.442376][ T2244] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 983.442635][ T2244] device team0 left promiscuous mode [ 983.442648][ T2244] device team_slave_0 left promiscuous mode [ 983.442785][ T2244] device team_slave_1 left promiscuous mode [ 983.443122][ T2244] bridge0: port 3(team0) entered disabled state [ 983.454653][ T2244] 8021q: adding VLAN 0 to HW filter on device team0 [ 983.461160][ T2244] bond0: (slave team0): Enslaving as an active interface with an up link [ 983.461247][ T2247] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 983.461404][ T2247] device team0 left promiscuous mode [ 983.461417][ T2247] device team_slave_0 left promiscuous mode [ 983.461563][ T2247] device team_slave_1 left promiscuous mode [ 983.461825][ T2247] bridge0: port 3(team0) entered disabled state [ 983.468140][ T2247] 8021q: adding VLAN 0 to HW filter on device team0 [ 983.472541][ T2247] bond0: (slave team0): Enslaving as an active interface with an up link [ 983.479086][ T2240] __nla_validate_parse: 4 callbacks suppressed [ 983.479105][ T2240] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 983.485314][ T2250] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 983.490001][ T2250] bond0: (slave team0): Releasing backup interface [ 983.514179][ T2250] bridge0: port 3(team0) entered blocking state [ 983.520730][ T2250] bridge0: port 3(team0) entered disabled state [ 983.522787][ T2250] device team0 entered promiscuous mode [ 983.522804][ T2250] device team_slave_0 entered promiscuous mode [ 983.522930][ T2250] device team_slave_1 entered promiscuous mode [ 983.527193][ T2249] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 983.527471][ T2249] device team0 left promiscuous mode [ 983.527483][ T2249] device team_slave_0 left promiscuous mode [ 983.527658][ T2249] device team_slave_1 left promiscuous mode [ 983.527909][ T2249] bridge0: port 3(team0) entered disabled state [ 983.532224][ T2249] 8021q: adding VLAN 0 to HW filter on device team0 [ 983.539034][ T2249] bond0: (slave team0): Enslaving as an active interface with an up link [ 983.540518][ T2255] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 983.546634][ T2255] bond0: (slave team0): Releasing backup interface [ 983.561081][ T2255] bridge0: port 3(team0) entered blocking state [ 983.561146][ T2255] bridge0: port 3(team0) entered disabled state [ 983.563656][ T2255] device team0 entered promiscuous mode [ 983.563671][ T2255] device team_slave_0 entered promiscuous mode [ 983.563816][ T2255] device team_slave_1 entered promiscuous mode [ 983.564676][ T2243] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 983.571410][ T2258] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 983.582923][ T2259] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 983.585854][ T2259] bond0: (slave team0): Releasing backup interface [ 983.620159][ T2259] bridge0: port 3(team0) entered blocking state [ 983.620226][ T2259] bridge0: port 3(team0) entered disabled state [ 983.642572][ T2259] device team0 entered promiscuous mode [ 983.642588][ T2259] device team_slave_0 entered promiscuous mode [ 983.647963][ T2259] device team_slave_1 entered promiscuous mode [ 983.653156][ T2256] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 983.669656][ T2261] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 983.669832][ T2261] device team0 left promiscuous mode [ 983.669845][ T2261] device team_slave_0 left promiscuous mode [ 983.669969][ T2261] device team_slave_1 left promiscuous mode [ 983.673772][ T2261] bridge0: port 3(team0) entered disabled state [ 983.718185][ T2261] 8021q: adding VLAN 0 to HW filter on device team0 [ 983.734807][ T2261] bond0: (slave team0): Enslaving as an active interface with an up link [ 983.734897][ T2257] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 983.743922][ T2266] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 983.744086][ T2266] device team0 left promiscuous mode [ 983.744099][ T2266] device team_slave_0 left promiscuous mode [ 983.744221][ T2266] device team_slave_1 left promiscuous mode [ 983.744476][ T2266] bridge0: port 3(team0) entered disabled state [ 983.781196][ T2266] 8021q: adding VLAN 0 to HW filter on device team0 [ 983.782651][ T2266] bond0: (slave team0): Enslaving as an active interface with an up link [ 983.785590][ T2271] device team0 left promiscuous mode [ 983.785605][ T2271] device team_slave_0 left promiscuous mode [ 983.785747][ T2271] device team_slave_1 left promiscuous mode [ 983.786019][ T2271] bridge0: port 3(team0) entered disabled state [ 983.797924][ T2271] 8021q: adding VLAN 0 to HW filter on device team0 [ 983.799436][ T2271] bond0: (slave team0): Enslaving as an active interface with an up link [ 983.802764][ T2274] device team0 entered promiscuous mode [ 983.802779][ T2274] device team_slave_0 entered promiscuous mode [ 983.802920][ T2274] device team_slave_1 entered promiscuous mode [ 983.804253][ T2274] bond0: (slave team0): Releasing backup interface [ 983.814491][ T2274] bridge0: port 3(team0) entered blocking state [ 983.814558][ T2274] bridge0: port 3(team0) entered disabled state [ 983.843266][ T2261] device team0 entered promiscuous mode [ 983.843284][ T2261] device team_slave_0 entered promiscuous mode [ 983.843469][ T2261] device team_slave_1 entered promiscuous mode [ 983.844869][ T2261] bond0: (slave team0): Releasing backup interface [ 983.862572][ T2261] bridge0: port 3(team0) entered blocking state [ 983.862643][ T2261] bridge0: port 3(team0) entered disabled state [ 983.878292][ T2271] bond0: (slave team0): Releasing backup interface [ 983.888726][ T2271] bridge0: port 3(team0) entered blocking state [ 983.888789][ T2271] bridge0: port 3(team0) entered disabled state [ 983.889903][ T2271] device team0 entered promiscuous mode [ 983.889919][ T2271] device team_slave_0 entered promiscuous mode [ 983.890058][ T2271] device team_slave_1 entered promiscuous mode [ 983.890912][ T2276] device team0 left promiscuous mode [ 983.890927][ T2276] device team_slave_0 left promiscuous mode [ 983.891061][ T2276] device team_slave_1 left promiscuous mode [ 983.891304][ T2276] bridge0: port 3(team0) entered disabled state [ 983.907504][ T2276] 8021q: adding VLAN 0 to HW filter on device team0 [ 983.909260][ T2276] bond0: (slave team0): Enslaving as an active interface with an up link [ 983.913012][ T2278] bond0: (slave team0): Releasing backup interface [ 983.928365][ T2278] bridge0: port 13(team0) entered blocking state [ 983.928500][ T2278] bridge0: port 13(team0) entered disabled state [ 983.936711][ T2273] bond0: (slave team0): Releasing backup interface [ 983.938076][ T2273] bridge0: port 3(team0) entered blocking state [ 983.938136][ T2273] bridge0: port 3(team0) entered disabled state [ 983.939273][ T2273] device team0 entered promiscuous mode [ 983.939286][ T2273] device team_slave_0 entered promiscuous mode [ 983.939410][ T2273] device team_slave_1 entered promiscuous mode [ 983.965154][ T2276] bond0: (slave team0): Releasing backup interface [ 984.020912][ T2276] bridge0: port 3(team0) entered blocking state [ 984.037126][ T2276] bridge0: port 3(team0) entered disabled state [ 984.055669][ T2276] device team0 entered promiscuous mode [ 984.055686][ T2276] device team_slave_0 entered promiscuous mode [ 984.055837][ T2276] device team_slave_1 entered promiscuous mode [ 984.080839][ T2285] device team0 left promiscuous mode [ 984.080856][ T2285] device team_slave_0 left promiscuous mode [ 984.080987][ T2285] device team_slave_1 left promiscuous mode [ 984.084801][ T2285] bridge0: port 3(team0) entered disabled state [ 984.103499][ T2285] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.109840][ T2285] bond0: (slave team0): Enslaving as an active interface with an up link [ 984.110101][ T2284] device team0 left promiscuous mode [ 984.110115][ T2284] device team_slave_0 left promiscuous mode [ 984.110374][ T2284] device team_slave_1 left promiscuous mode [ 984.110652][ T2284] bridge0: port 3(team0) entered disabled state [ 984.114467][ T2284] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.119104][ T2284] bond0: (slave team0): Enslaving as an active interface with an up link [ 984.119320][ T2286] device team0 left promiscuous mode [ 984.119332][ T2286] device team_slave_0 left promiscuous mode [ 984.119536][ T2286] device team_slave_1 left promiscuous mode [ 984.119782][ T2286] bridge0: port 3(team0) entered disabled state [ 984.132049][ T2286] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.147671][ T2286] bond0: (slave team0): Enslaving as an active interface with an up link [ 984.150209][ T2290] device team0 left promiscuous mode [ 984.150224][ T2290] device team_slave_1 left promiscuous mode [ 984.150451][ T2290] bridge0: port 13(team0) entered disabled state [ 984.160316][ T2290] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.162288][ T2290] device team0 entered promiscuous mode [ 984.162303][ T2290] device team_slave_1 entered promiscuous mode [ 984.165387][ T2290] bond0: (slave team0): Enslaving as an active interface with an up link [ 984.165889][ T2288] device team0 left promiscuous mode [ 984.165903][ T2288] device team_slave_0 left promiscuous mode [ 984.166058][ T2288] device team_slave_1 left promiscuous mode [ 984.166309][ T2288] bridge0: port 3(team0) entered disabled state [ 984.171144][ T2288] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.172706][ T2288] bond0: (slave team0): Enslaving as an active interface with an up link [ 984.172813][ T2284] device team0 entered promiscuous mode [ 984.172827][ T2284] device team_slave_0 entered promiscuous mode [ 984.172950][ T2284] device team_slave_1 entered promiscuous mode [ 984.178278][ T2284] bond0: (slave team0): Releasing backup interface [ 984.196643][ T2284] bridge0: port 3(team0) entered blocking state [ 984.196705][ T2284] bridge0: port 3(team0) entered disabled state [ 984.208165][ T2285] bond0: (slave team0): Releasing backup interface [ 984.236063][ T2285] bridge0: port 3(team0) entered blocking state [ 984.237747][ T2285] bridge0: port 3(team0) entered disabled state [ 984.243243][ T2285] device team0 entered promiscuous mode [ 984.243259][ T2285] device team_slave_0 entered promiscuous mode [ 984.243387][ T2285] device team_slave_1 entered promiscuous mode [ 984.248025][ T2286] bond0: (slave team0): Releasing backup interface [ 984.273652][ T2286] bridge0: port 3(team0) entered blocking state [ 984.273719][ T2286] bridge0: port 3(team0) entered disabled state [ 984.276246][ T2286] device team0 entered promiscuous mode [ 984.276263][ T2286] device team_slave_0 entered promiscuous mode [ 984.276403][ T2286] device team_slave_1 entered promiscuous mode [ 984.279832][ T2294] device team0 left promiscuous mode [ 984.279846][ T2294] device team_slave_0 left promiscuous mode [ 984.279976][ T2294] device team_slave_1 left promiscuous mode [ 984.280269][ T2294] bridge0: port 3(team0) entered disabled state [ 984.288411][ T2294] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.292280][ T2294] bond0: (slave team0): Enslaving as an active interface with an up link [ 984.312641][ T2296] bond0: (slave team0): Releasing backup interface [ 984.314262][ T2296] bridge0: port 13(team0) entered blocking state [ 984.317076][ T2296] bridge0: port 13(team0) entered disabled state [ 984.339675][ T2294] device team0 entered promiscuous mode [ 984.339694][ T2294] device team_slave_0 entered promiscuous mode [ 984.339847][ T2294] device team_slave_1 entered promiscuous mode [ 984.341672][ T2294] bond0: (slave team0): Releasing backup interface [ 984.368019][ T2294] bridge0: port 3(team0) entered blocking state [ 984.368085][ T2294] bridge0: port 3(team0) entered disabled state [ 984.478148][ T2321] device team0 left promiscuous mode [ 984.478166][ T2321] device team_slave_0 left promiscuous mode [ 984.478304][ T2321] device team_slave_1 left promiscuous mode [ 984.478578][ T2321] bridge0: port 3(team0) entered disabled state [ 984.496477][ T2321] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.497977][ T2321] bond0: (slave team0): Enslaving as an active interface with an up link [ 984.498323][ T2322] device team0 left promiscuous mode [ 984.498338][ T2322] device team_slave_0 left promiscuous mode [ 984.498488][ T2322] device team_slave_1 left promiscuous mode [ 984.498771][ T2322] bridge0: port 3(team0) entered disabled state [ 984.502666][ T2322] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.507433][ T2322] bond0: (slave team0): Enslaving as an active interface with an up link [ 984.552037][ T2325] device team0 left promiscuous mode [ 984.552054][ T2325] device team_slave_0 left promiscuous mode [ 984.552180][ T2325] device team_slave_1 left promiscuous mode [ 984.552469][ T2325] bridge0: port 3(team0) entered disabled state [ 984.569092][ T2325] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.570856][ T2325] bond0: (slave team0): Enslaving as an active interface with an up link [ 984.570988][ T2331] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 984.571455][ T2331] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 984.587305][ T2332] device team0 entered promiscuous mode [ 984.587323][ T2332] device team_slave_0 entered promiscuous mode [ 984.587461][ T2332] device team_slave_1 entered promiscuous mode [ 984.588873][ T2332] bond0: (slave team0): Releasing backup interface [ 984.598947][ T2332] bridge0: port 3(team0) entered blocking state [ 984.599019][ T2332] bridge0: port 3(team0) entered disabled state [ 984.606196][ T2335] bridge0: port 3(team0) entered disabled state [ 984.610332][ T2335] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.612126][ T2335] bond0: (slave team0): Enslaving as an active interface with an up link [ 984.612224][ T2322] device team0 entered promiscuous mode [ 984.612237][ T2322] device team_slave_0 entered promiscuous mode [ 984.612476][ T2322] device team_slave_1 entered promiscuous mode [ 984.615088][ T2322] bond0: (slave team0): Releasing backup interface [ 984.646010][ T2322] bridge0: port 3(team0) entered blocking state [ 984.646073][ T2322] bridge0: port 3(team0) entered disabled state [ 984.657185][ T2331] device team0 left promiscuous mode [ 984.657204][ T2331] device team_slave_1 left promiscuous mode [ 984.657457][ T2331] bridge0: port 13(team0) entered disabled state [ 984.662637][ T2331] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.675422][ T2331] device team0 entered promiscuous mode [ 984.675438][ T2331] device team_slave_1 entered promiscuous mode [ 984.686203][ T2331] bond0: (slave team0): Enslaving as an active interface with an up link [ 984.692060][ T2331] bond0: (slave team0): Releasing backup interface [ 984.715282][ T2331] bridge0: port 13(team0) entered blocking state [ 984.715347][ T2331] bridge0: port 13(team0) entered disabled state [ 984.814673][ T2348] bridge0: port 3(team0) entered disabled state [ 984.839913][ T2348] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.847334][ T2348] bond0: (slave team0): Enslaving as an active interface with an up link [ 984.847414][ T2347] device team0 left promiscuous mode [ 984.847427][ T2347] device team_slave_0 left promiscuous mode [ 984.847566][ T2347] device team_slave_1 left promiscuous mode [ 984.854169][ T2350] bridge0: port 3(team0) entered disabled state [ 984.860565][ T2350] 8021q: adding VLAN 0 to HW filter on device team0 [ 984.861908][ T2350] bond0: (slave team0): Enslaving as an active interface with an up link [ 984.899838][ T2362] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.5'. [ 984.903321][ T2362] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 985.039340][ T2371] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 985.049424][ T2362] device team0 entered promiscuous mode [ 985.049443][ T2362] device team_slave_0 entered promiscuous mode [ 985.049580][ T2362] device team_slave_1 entered promiscuous mode [ 985.058729][ T2362] bond0: (slave team0): Releasing backup interface [ 985.062005][ T2362] bridge0: port 3(team0) entered blocking state [ 985.062064][ T2362] bridge0: port 3(team0) entered disabled state [ 985.065045][ T2370] device team0 left promiscuous mode [ 985.065061][ T2370] device team_slave_0 left promiscuous mode [ 985.065231][ T2370] device team_slave_1 left promiscuous mode [ 985.065758][ T2371] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 985.097446][ T2371] device team0 left promiscuous mode [ 985.097463][ T2371] device team_slave_1 left promiscuous mode [ 985.097733][ T2371] bridge0: port 13(team0) entered disabled state [ 985.142279][ T2371] 8021q: adding VLAN 0 to HW filter on device team0 [ 985.143587][ T2371] device team0 entered promiscuous mode [ 985.143602][ T2371] device team_slave_1 entered promiscuous mode [ 985.144432][ T2371] bond0: (slave team0): Enslaving as an active interface with an up link [ 985.206096][ T2371] bond0: (slave team0): Releasing backup interface [ 985.216844][ T2371] bridge0: port 13(team0) entered blocking state [ 985.216902][ T2371] bridge0: port 13(team0) entered disabled state [ 985.259894][ T2379] bridge0: port 3(team0) entered disabled state [ 985.275060][ T2379] 8021q: adding VLAN 0 to HW filter on device team0 [ 985.281068][ T2379] bond0: (slave team0): Enslaving as an active interface with an up link [ 985.468658][ T2402] device team0 left promiscuous mode [ 985.468675][ T2402] device team_slave_0 left promiscuous mode [ 985.469155][ T2402] device team_slave_1 left promiscuous mode [ 985.490102][ T2406] device team0 left promiscuous mode [ 985.490120][ T2406] device team_slave_1 left promiscuous mode [ 985.490493][ T2406] bridge0: port 13(team0) entered disabled state [ 985.505413][ T2406] 8021q: adding VLAN 0 to HW filter on device team0 [ 985.514516][ T2406] device team0 entered promiscuous mode [ 985.514533][ T2406] device team_slave_1 entered promiscuous mode [ 985.518200][ T2406] bond0: (slave team0): Enslaving as an active interface with an up link [ 985.548139][ T2406] bond0: (slave team0): Releasing backup interface [ 985.594683][ T2406] bridge0: port 13(team0) entered blocking state [ 985.594743][ T2406] bridge0: port 13(team0) entered disabled state [ 985.604845][ T2408] device team0 left promiscuous mode [ 985.604865][ T2408] device team_slave_0 left promiscuous mode [ 985.605006][ T2408] device team_slave_1 left promiscuous mode [ 985.784301][ T2424] device team0 left promiscuous mode [ 985.784316][ T2424] device team_slave_1 left promiscuous mode [ 985.784578][ T2424] bridge0: port 13(team0) entered disabled state [ 985.792686][ T2424] 8021q: adding VLAN 0 to HW filter on device team0 [ 985.806968][ T2424] device team0 entered promiscuous mode [ 985.806984][ T2424] device team_slave_1 entered promiscuous mode [ 985.810099][ T2424] bond0: (slave team0): Enslaving as an active interface with an up link [ 986.209191][ T2454] bond0: (slave team0): Releasing backup interface [ 986.210948][ T2454] bridge0: port 13(team0) entered blocking state [ 986.211009][ T2454] bridge0: port 13(team0) entered disabled state [ 986.324913][ T2461] bridge0: port 3(hsr_slave_1) entered blocking state [ 986.325046][ T2461] bridge0: port 3(hsr_slave_1) entered disabled state [ 986.363675][ T2465] device team_slave_0 entered promiscuous mode [ 986.434102][ T2465] team0: Port device team_slave_0 removed [ 986.434932][ T2465] bridge0: port 3(team_slave_0) entered blocking state [ 986.435070][ T2465] bridge0: port 3(team_slave_0) entered disabled state [ 986.437245][ T2473] device team0 left promiscuous mode [ 986.437259][ T2473] device team_slave_1 left promiscuous mode [ 986.437478][ T2473] bridge0: port 13(team0) entered disabled state [ 986.441282][ T2473] 8021q: adding VLAN 0 to HW filter on device team0 [ 986.442493][ T2473] device team0 entered promiscuous mode [ 986.442507][ T2473] device team_slave_1 entered promiscuous mode [ 986.443401][ T2473] bond0: (slave team0): Enslaving as an active interface with an up link [ 986.471064][ T2468] bond0: (slave team0): Releasing backup interface [ 986.494347][ T2468] bridge0: port 13(team0) entered blocking state [ 986.494410][ T2468] bridge0: port 13(team0) entered disabled state [ 986.504904][ T2475] device bond_slave_0 entered promiscuous mode [ 986.508511][ T2475] bond0: (slave bond_slave_0): Releasing backup interface [ 986.512434][ T2475] bridge0: port 3(bond_slave_0) entered blocking state [ 986.512497][ T2475] bridge0: port 3(bond_slave_0) entered disabled state [ 986.588093][ T2479] device bridge0 entered promiscuous mode [ 986.664232][ T2481] device ip6gretap0 entered promiscuous mode [ 986.664452][ T2481] bridge0: port 3(ip6gretap0) entered blocking state [ 986.664586][ T2481] bridge0: port 3(ip6gretap0) entered disabled state [ 986.674376][ T2481] bridge0: port 3(ip6gretap0) entered blocking state [ 986.674448][ T2481] bridge0: port 3(ip6gretap0) entered forwarding state [ 986.727422][ T2484] device ip_vti0 entered promiscuous mode [ 986.740286][ T2487] device gretap0 entered promiscuous mode [ 986.745892][ T2487] bridge0: port 4(gretap0) entered blocking state [ 986.746084][ T2487] bridge0: port 4(gretap0) entered disabled state [ 986.747747][ T2487] bridge0: port 4(gretap0) entered blocking state [ 986.747813][ T2487] bridge0: port 4(gretap0) entered forwarding state [ 986.766019][ T2489] device veth0_to_bond entered promiscuous mode [ 986.766657][ T2489] bridge0: port 3(veth0_to_bond) entered blocking state [ 986.767153][ T2489] bridge0: port 3(veth0_to_bond) entered disabled state [ 986.784377][ T2489] bridge0: port 3(veth0_to_bond) entered blocking state [ 986.784446][ T2489] bridge0: port 3(veth0_to_bond) entered forwarding state [ 986.787217][ T2493] device team0 left promiscuous mode [ 986.787231][ T2493] device team_slave_1 left promiscuous mode [ 986.787503][ T2493] bridge0: port 13(team0) entered disabled state [ 986.812804][ T2493] 8021q: adding VLAN 0 to HW filter on device team0 [ 986.816991][ T2493] device team0 entered promiscuous mode [ 986.817009][ T2493] device team_slave_1 entered promiscuous mode [ 986.820234][ T2493] bond0: (slave team0): Enslaving as an active interface with an up link [ 986.878193][ T2499] device team0 entered promiscuous mode [ 986.878211][ T2499] device team_slave_1 entered promiscuous mode [ 986.884310][ T2499] bond0: (slave team0): Releasing backup interface [ 986.889117][ T2499] bridge0: port 4(team0) entered blocking state [ 986.896463][ T2499] bridge0: port 4(team0) entered disabled state [ 986.920892][ T2501] device team0 entered promiscuous mode [ 986.920911][ T2501] device team_slave_0 entered promiscuous mode [ 986.921054][ T2501] device team_slave_1 entered promiscuous mode [ 986.927014][ T2501] bond0: (slave team0): Releasing backup interface [ 986.937143][ T2501] bridge0: port 3(team0) entered blocking state [ 986.946033][ T2501] bridge0: port 3(team0) entered disabled state [ 987.024059][ T2506] device team0 entered promiscuous mode [ 987.024077][ T2506] device team_slave_0 entered promiscuous mode [ 987.024248][ T2506] device team_slave_1 entered promiscuous mode [ 987.031247][ T2506] bond0: (slave team0): Releasing backup interface [ 987.039125][ T2506] bridge0: port 4(team0) entered blocking state [ 987.040460][ T2506] bridge0: port 4(team0) entered disabled state [ 987.058930][ T2509] device team0 entered promiscuous mode [ 987.058947][ T2509] device team_slave_0 entered promiscuous mode [ 987.059087][ T2509] device team_slave_1 entered promiscuous mode [ 987.060234][ T2509] bond0: (slave team0): Releasing backup interface [ 987.061615][ T2509] bridge0: port 4(team0) entered blocking state [ 987.064018][ T2509] bridge0: port 4(team0) entered disabled state [ 987.101180][ T2511] device team0 left promiscuous mode [ 987.101200][ T2511] device team_slave_1 left promiscuous mode [ 987.101440][ T2511] bridge0: port 4(team0) entered disabled state [ 987.118297][ T2511] 8021q: adding VLAN 0 to HW filter on device team0 [ 987.119689][ T2511] bond0: (slave team0): Enslaving as an active interface with an up link [ 987.140408][ T2507] bond0: (slave team0): Releasing backup interface [ 987.169393][ T2507] bridge0: port 13(team0) entered blocking state [ 987.178679][ T2507] bridge0: port 13(team0) entered disabled state [ 987.182487][ T2511] device team0 entered promiscuous mode [ 987.182505][ T2511] device team_slave_1 entered promiscuous mode [ 987.183977][ T2511] bond0: (slave team0): Releasing backup interface [ 987.206819][ T2511] bridge0: port 4(team0) entered blocking state [ 987.206894][ T2511] bridge0: port 4(team0) entered disabled state [ 987.221057][ T2514] device team0 left promiscuous mode [ 987.221075][ T2514] device team_slave_0 left promiscuous mode [ 987.221246][ T2514] device team_slave_1 left promiscuous mode [ 987.221558][ T2514] bridge0: port 3(team0) entered disabled state [ 987.254268][ T2514] 8021q: adding VLAN 0 to HW filter on device team0 [ 987.264585][ T2514] bond0: (slave team0): Enslaving as an active interface with an up link [ 987.272954][ T2520] device team0 left promiscuous mode [ 987.272971][ T2520] device team_slave_0 left promiscuous mode [ 987.273105][ T2520] device team_slave_1 left promiscuous mode [ 987.274460][ T2520] bridge0: port 4(team0) entered disabled state [ 987.283125][ T2520] 8021q: adding VLAN 0 to HW filter on device team0 [ 987.290335][ T2520] bond0: (slave team0): Enslaving as an active interface with an up link [ 987.301965][ T2519] device team0 entered promiscuous mode [ 987.301982][ T2519] device team_slave_0 entered promiscuous mode [ 987.302139][ T2519] device team_slave_1 entered promiscuous mode [ 987.315193][ T2519] bond0: (slave team0): Releasing backup interface [ 987.341793][ T2519] bridge0: port 3(team0) entered blocking state [ 987.343507][ T2519] bridge0: port 3(team0) entered disabled state [ 987.348377][ T2518] device team0 left promiscuous mode [ 987.348393][ T2518] device team_slave_0 left promiscuous mode [ 987.348516][ T2518] device team_slave_1 left promiscuous mode [ 987.348731][ T2518] bridge0: port 4(team0) entered disabled state [ 987.381237][ T2518] 8021q: adding VLAN 0 to HW filter on device team0 [ 987.382700][ T2518] bond0: (slave team0): Enslaving as an active interface with an up link [ 987.382847][ T2527] device team0 entered promiscuous mode [ 987.382860][ T2527] device team_slave_0 entered promiscuous mode [ 987.383002][ T2527] device team_slave_1 entered promiscuous mode [ 987.397371][ T2527] bond0: (slave team0): Releasing backup interface [ 987.424070][ T2527] bridge0: port 4(team0) entered blocking state [ 987.424135][ T2527] bridge0: port 4(team0) entered disabled state [ 987.432200][ T2529] device team0 left promiscuous mode [ 987.432224][ T2529] device team_slave_1 left promiscuous mode [ 987.432441][ T2529] bridge0: port 13(team0) entered disabled state [ 987.442970][ T2529] 8021q: adding VLAN 0 to HW filter on device team0 [ 987.445180][ T2529] device team0 entered promiscuous mode [ 987.445194][ T2529] device team_slave_1 entered promiscuous mode [ 987.446906][ T2529] bond0: (slave team0): Enslaving as an active interface with an up link [ 987.447011][ T2520] device team0 entered promiscuous mode [ 987.447024][ T2520] device team_slave_0 entered promiscuous mode [ 987.447206][ T2520] device team_slave_1 entered promiscuous mode [ 987.448846][ T2520] bond0: (slave team0): Releasing backup interface [ 987.464622][ T2520] bridge0: port 4(team0) entered blocking state [ 987.464678][ T2520] bridge0: port 4(team0) entered disabled state [ 987.478611][ T2534] device team0 left promiscuous mode [ 987.478627][ T2534] device team_slave_1 left promiscuous mode [ 987.478874][ T2534] bridge0: port 4(team0) entered disabled state [ 987.488936][ T2534] 8021q: adding VLAN 0 to HW filter on device team0 [ 987.490377][ T2534] bond0: (slave team0): Enslaving as an active interface with an up link [ 987.503830][ T2537] device team0 entered promiscuous mode [ 987.503849][ T2537] device team_slave_1 entered promiscuous mode [ 987.505294][ T2537] bond0: (slave team0): Releasing backup interface [ 987.547280][ T2537] bridge0: port 4(team0) entered blocking state [ 987.547670][ T2537] bridge0: port 4(team0) entered disabled state [ 987.615190][ T2540] device team0 left promiscuous mode [ 987.615207][ T2540] device team_slave_0 left promiscuous mode [ 987.615371][ T2540] device team_slave_1 left promiscuous mode [ 987.615808][ T2540] bridge0: port 3(team0) entered disabled state [ 987.642824][ T2540] 8021q: adding VLAN 0 to HW filter on device team0 [ 987.647362][ T2540] bond0: (slave team0): Enslaving as an active interface with an up link [ 987.647580][ T2543] device team0 entered promiscuous mode [ 987.647593][ T2543] device team_slave_0 entered promiscuous mode [ 987.647717][ T2543] device team_slave_1 entered promiscuous mode [ 987.692216][ T2543] bond0: (slave team0): Releasing backup interface [ 987.720188][ T2543] bridge0: port 3(team0) entered blocking state [ 987.720323][ T2543] bridge0: port 3(team0) entered disabled state [ 987.748327][ T2546] device team0 left promiscuous mode [ 987.748344][ T2546] device team_slave_0 left promiscuous mode [ 987.748512][ T2546] device team_slave_1 left promiscuous mode [ 987.748749][ T2546] bridge0: port 4(team0) entered disabled state [ 987.767636][ T2546] 8021q: adding VLAN 0 to HW filter on device team0 [ 987.775239][ T2546] bond0: (slave team0): Enslaving as an active interface with an up link [ 987.780375][ T2549] bond0: (slave team0): Releasing backup interface [ 987.782210][ T2549] bridge0: port 13(team0) entered blocking state [ 987.782273][ T2549] bridge0: port 13(team0) entered disabled state [ 987.784303][ T2553] device team0 entered promiscuous mode [ 987.784318][ T2553] device team_slave_0 entered promiscuous mode [ 987.784462][ T2553] device team_slave_1 entered promiscuous mode [ 987.788041][ T2553] bond0: (slave team0): Releasing backup interface [ 987.829900][ T2553] bridge0: port 4(team0) entered blocking state [ 987.829966][ T2553] bridge0: port 4(team0) entered disabled state [ 987.839248][ T2554] device team0 left promiscuous mode [ 987.839265][ T2554] device team_slave_1 left promiscuous mode [ 987.839548][ T2554] bridge0: port 4(team0) entered disabled state [ 987.844909][ T2554] 8021q: adding VLAN 0 to HW filter on device team0 [ 987.864313][ T2554] bond0: (slave team0): Enslaving as an active interface with an up link [ 987.864650][ T2555] device team0 left promiscuous mode [ 987.864664][ T2555] device team_slave_0 left promiscuous mode [ 987.864804][ T2555] device team_slave_1 left promiscuous mode [ 987.865076][ T2555] bridge0: port 4(team0) entered disabled state [ 987.882689][ T2555] 8021q: adding VLAN 0 to HW filter on device team0 [ 987.919578][ T2555] bond0: (slave team0): Enslaving as an active interface with an up link [ 987.925649][ T2557] device team0 entered promiscuous mode [ 987.925664][ T2557] device team_slave_1 entered promiscuous mode [ 987.943609][ T2557] bond0: (slave team0): Releasing backup interface [ 987.972657][ T2557] bridge0: port 4(team0) entered blocking state [ 987.972719][ T2557] bridge0: port 4(team0) entered disabled state [ 987.974418][ T2559] device team0 entered promiscuous mode [ 987.974434][ T2559] device team_slave_0 entered promiscuous mode [ 987.974559][ T2559] device team_slave_1 entered promiscuous mode [ 987.992782][ T2559] bond0: (slave team0): Releasing backup interface [ 988.027532][ T2559] bridge0: port 4(team0) entered blocking state [ 988.027598][ T2559] bridge0: port 4(team0) entered disabled state [ 988.039430][ T2569] device team0 left promiscuous mode [ 988.039445][ T2569] device team_slave_0 left promiscuous mode [ 988.039591][ T2569] device team_slave_1 left promiscuous mode [ 988.039862][ T2569] bridge0: port 3(team0) entered disabled state [ 988.053376][ T2569] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.062328][ T2569] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.062535][ T2572] device team0 entered promiscuous mode [ 988.062549][ T2572] device team_slave_0 entered promiscuous mode [ 988.062696][ T2572] device team_slave_1 entered promiscuous mode [ 988.063770][ T2572] bond0: (slave team0): Releasing backup interface [ 988.065123][ T2572] bridge0: port 5(team0) entered blocking state [ 988.065255][ T2572] bridge0: port 5(team0) entered disabled state [ 988.069284][ T2573] device team0 entered promiscuous mode [ 988.069299][ T2573] device team_slave_0 entered promiscuous mode [ 988.069425][ T2573] device team_slave_1 entered promiscuous mode [ 988.071385][ T2573] bond0: (slave team0): Releasing backup interface [ 988.088566][ T2573] bridge0: port 3(team0) entered blocking state [ 988.088632][ T2573] bridge0: port 3(team0) entered disabled state [ 988.130938][ T2574] device team0 left promiscuous mode [ 988.130956][ T2574] device team_slave_0 left promiscuous mode [ 988.131947][ T2574] device team_slave_1 left promiscuous mode [ 988.133361][ T2574] bridge0: port 4(team0) entered disabled state [ 988.152394][ T2574] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.162454][ T2574] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.162758][ T2578] device team0 left promiscuous mode [ 988.162772][ T2578] device team_slave_1 left promiscuous mode [ 988.163073][ T2578] bridge0: port 13(team0) entered disabled state [ 988.193285][ T2578] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.208731][ T2578] device team0 entered promiscuous mode [ 988.208748][ T2578] device team_slave_1 entered promiscuous mode [ 988.220060][ T2578] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.246407][ T2575] bond0: (slave team0): Releasing backup interface [ 988.258407][ T2575] bridge0: port 13(team0) entered blocking state [ 988.258467][ T2575] bridge0: port 13(team0) entered disabled state [ 988.262693][ T2579] device team0 entered promiscuous mode [ 988.262710][ T2579] device team_slave_0 entered promiscuous mode [ 988.262885][ T2579] device team_slave_1 entered promiscuous mode [ 988.272514][ T2579] bond0: (slave team0): Releasing backup interface [ 988.287625][ T2579] bridge0: port 4(team0) entered blocking state [ 988.287685][ T2579] bridge0: port 4(team0) entered disabled state [ 988.292001][ T2583] device team0 left promiscuous mode [ 988.292018][ T2583] device team_slave_0 left promiscuous mode [ 988.292157][ T2583] device team_slave_1 left promiscuous mode [ 988.292416][ T2583] bridge0: port 5(team0) entered disabled state [ 988.296857][ T2583] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.298466][ T2583] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.298748][ T2584] device team0 left promiscuous mode [ 988.298760][ T2584] device team_slave_0 left promiscuous mode [ 988.298892][ T2584] device team_slave_1 left promiscuous mode [ 988.299147][ T2584] bridge0: port 4(team0) entered disabled state [ 988.319098][ T2584] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.320782][ T2584] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.321373][ T2586] device team0 entered promiscuous mode [ 988.321390][ T2586] device team_slave_0 entered promiscuous mode [ 988.321543][ T2586] device team_slave_1 entered promiscuous mode [ 988.345414][ T2586] bond0: (slave team0): Releasing backup interface [ 988.367796][ T2586] bridge0: port 5(team0) entered blocking state [ 988.367862][ T2586] bridge0: port 5(team0) entered disabled state [ 988.371435][ T2585] device team0 left promiscuous mode [ 988.371451][ T2585] device team_slave_1 left promiscuous mode [ 988.371795][ T2585] bridge0: port 4(team0) entered disabled state [ 988.376404][ T2585] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.377996][ T2585] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.378081][ T2588] validate_nla: 192 callbacks suppressed [ 988.378095][ T2588] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 988.378397][ T2588] device team0 left promiscuous mode [ 988.378409][ T2588] device team_slave_0 left promiscuous mode [ 988.378551][ T2588] device team_slave_1 left promiscuous mode [ 988.378799][ T2588] bridge0: port 3(team0) entered disabled state [ 988.383151][ T2588] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.384724][ T2588] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.483120][ T2595] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 988.506372][ T2596] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 988.506539][ T2596] device team0 left promiscuous mode [ 988.506552][ T2596] device team_slave_0 left promiscuous mode [ 988.506688][ T2596] device team_slave_1 left promiscuous mode [ 988.509352][ T2596] bridge0: port 4(team0) entered disabled state [ 988.552485][ T2596] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.561099][ T2596] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.561188][ T2598] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 988.561371][ T2598] device team0 left promiscuous mode [ 988.561384][ T2598] device team_slave_1 left promiscuous mode [ 988.561672][ T2598] bridge0: port 13(team0) entered disabled state [ 988.565307][ T2598] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.569092][ T2598] device team0 entered promiscuous mode [ 988.569107][ T2598] device team_slave_1 entered promiscuous mode [ 988.569901][ T2598] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.572035][ T2595] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 988.572058][ T2595] device team0 entered promiscuous mode [ 988.572072][ T2595] device team_slave_0 entered promiscuous mode [ 988.572204][ T2595] device team_slave_1 entered promiscuous mode [ 988.575774][ T2595] bond0: (slave team0): Releasing backup interface [ 988.578324][ T2595] bridge0: port 4(team0) entered blocking state [ 988.578540][ T2595] bridge0: port 4(team0) entered disabled state [ 988.580502][ T2599] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 988.593418][ T2604] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 988.597584][ T2604] bond0: (slave team0): Releasing backup interface [ 988.601390][ T2604] bridge0: port 13(team0) entered blocking state [ 988.601450][ T2604] bridge0: port 13(team0) entered disabled state [ 988.624719][ T2602] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 988.624905][ T2602] device team0 left promiscuous mode [ 988.624916][ T2602] device team_slave_0 left promiscuous mode [ 988.625042][ T2602] device team_slave_1 left promiscuous mode [ 988.625304][ T2602] bridge0: port 5(team0) entered disabled state [ 988.629560][ T2602] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.631397][ T2602] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.631519][ T2605] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 988.695710][ T2606] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 988.695749][ T2606] device team0 entered promiscuous mode [ 988.695762][ T2606] device team_slave_0 entered promiscuous mode [ 988.695917][ T2606] device team_slave_1 entered promiscuous mode [ 988.699624][ T2606] bond0: (slave team0): Releasing backup interface [ 988.721112][ T2606] bridge0: port 5(team0) entered blocking state [ 988.721939][ T2606] bridge0: port 5(team0) entered disabled state [ 988.730992][ T2599] device team0 entered promiscuous mode [ 988.731015][ T2599] device team_slave_0 entered promiscuous mode [ 988.731162][ T2599] device team_slave_1 entered promiscuous mode [ 988.737661][ T2599] bond0: (slave team0): Releasing backup interface [ 988.739081][ T2599] bridge0: port 3(team0) entered blocking state [ 988.739140][ T2599] bridge0: port 3(team0) entered disabled state [ 988.740903][ T2613] device team0 left promiscuous mode [ 988.740917][ T2613] device team_slave_1 left promiscuous mode [ 988.741186][ T2613] bridge0: port 13(team0) entered disabled state [ 988.762180][ T2613] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.771113][ T2613] device team0 entered promiscuous mode [ 988.771129][ T2613] device team_slave_1 entered promiscuous mode [ 988.774279][ T2613] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.774371][ T2609] device team0 entered promiscuous mode [ 988.774385][ T2609] device team_slave_1 entered promiscuous mode [ 988.777777][ T2609] bond0: (slave team0): Releasing backup interface [ 988.780903][ T2609] bridge0: port 4(team0) entered blocking state [ 988.780965][ T2609] bridge0: port 4(team0) entered disabled state [ 988.792302][ T2611] device team0 left promiscuous mode [ 988.792319][ T2611] device team_slave_0 left promiscuous mode [ 988.792448][ T2611] device team_slave_1 left promiscuous mode [ 988.792809][ T2611] bridge0: port 4(team0) entered disabled state [ 988.796964][ T2611] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.798612][ T2611] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.800053][ T2614] bond0: (slave team0): Releasing backup interface [ 988.817184][ T2614] bridge0: port 13(team0) entered blocking state [ 988.817243][ T2614] bridge0: port 13(team0) entered disabled state [ 988.862955][ T2617] device team0 entered promiscuous mode [ 988.862973][ T2617] device team_slave_0 entered promiscuous mode [ 988.863102][ T2617] device team_slave_1 entered promiscuous mode [ 988.921032][ T2617] bond0: (slave team0): Releasing backup interface [ 988.932748][ T2617] bridge0: port 4(team0) entered blocking state [ 988.932817][ T2617] bridge0: port 4(team0) entered disabled state [ 988.949141][ T2623] bridge0: port 5(team0) entered disabled state [ 988.984777][ T2623] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.990268][ T2623] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.990511][ T2621] device team0 left promiscuous mode [ 988.990554][ T2621] device team_slave_0 left promiscuous mode [ 988.990687][ T2621] device team_slave_1 left promiscuous mode [ 988.991077][ T2621] bridge0: port 3(team0) entered disabled state [ 988.996576][ T2621] 8021q: adding VLAN 0 to HW filter on device team0 [ 988.998079][ T2621] bond0: (slave team0): Enslaving as an active interface with an up link [ 988.998171][ T2628] device team0 entered promiscuous mode [ 988.998184][ T2628] device team_slave_0 entered promiscuous mode [ 988.998315][ T2628] device team_slave_1 entered promiscuous mode [ 989.029196][ T2628] bond0: (slave team0): Releasing backup interface [ 989.074420][ T2628] bridge0: port 3(team0) entered blocking state [ 989.074481][ T2628] bridge0: port 3(team0) entered disabled state [ 989.085333][ T2627] device team0 left promiscuous mode [ 989.085350][ T2627] device team_slave_1 left promiscuous mode [ 989.086148][ T2627] bridge0: port 13(team0) entered disabled state [ 989.091197][ T2627] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.093634][ T2627] device team0 entered promiscuous mode [ 989.093649][ T2627] device team_slave_1 entered promiscuous mode [ 989.098913][ T2627] bond0: (slave team0): Enslaving as an active interface with an up link [ 989.099144][ T2630] device team0 left promiscuous mode [ 989.099158][ T2630] device team_slave_1 left promiscuous mode [ 989.099416][ T2630] bridge0: port 4(team0) entered disabled state [ 989.112934][ T2630] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.114295][ T2630] bond0: (slave team0): Enslaving as an active interface with an up link [ 989.126576][ T2631] bond0: (slave team0): Releasing backup interface [ 989.149009][ T2631] bridge0: port 13(team0) entered blocking state [ 989.149069][ T2631] bridge0: port 13(team0) entered disabled state [ 989.174903][ T2632] device team0 entered promiscuous mode [ 989.174920][ T2632] device team_slave_1 entered promiscuous mode [ 989.181300][ T2632] bond0: (slave team0): Releasing backup interface [ 989.197897][ T2632] bridge0: port 4(team0) entered blocking state [ 989.197960][ T2632] bridge0: port 4(team0) entered disabled state [ 989.202177][ T2638] device team0 left promiscuous mode [ 989.202194][ T2638] device team_slave_0 left promiscuous mode [ 989.202334][ T2638] device team_slave_1 left promiscuous mode [ 989.202580][ T2638] bridge0: port 4(team0) entered disabled state [ 989.209072][ T2638] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.212978][ T2638] bond0: (slave team0): Enslaving as an active interface with an up link [ 989.213070][ T2639] device team0 entered promiscuous mode [ 989.213083][ T2639] device team_slave_0 entered promiscuous mode [ 989.213228][ T2639] device team_slave_1 entered promiscuous mode [ 989.222162][ T2639] bond0: (slave team0): Releasing backup interface [ 989.228965][ T2639] bridge0: port 4(team0) entered blocking state [ 989.229029][ T2639] bridge0: port 4(team0) entered disabled state [ 989.231751][ T2642] device team0 left promiscuous mode [ 989.231766][ T2642] device team_slave_0 left promiscuous mode [ 989.231908][ T2642] device team_slave_1 left promiscuous mode [ 989.254570][ T2644] device team0 left promiscuous mode [ 989.254586][ T2644] device team_slave_0 left promiscuous mode [ 989.254725][ T2644] device team_slave_1 left promiscuous mode [ 989.254980][ T2644] bridge0: port 3(team0) entered disabled state [ 989.292921][ T2644] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.297639][ T2644] bond0: (slave team0): Enslaving as an active interface with an up link [ 989.297783][ T2642] device team0 entered promiscuous mode [ 989.297797][ T2642] device team_slave_0 entered promiscuous mode [ 989.297957][ T2642] device team_slave_1 entered promiscuous mode [ 989.305143][ T2642] bond0: (slave team0): Releasing backup interface [ 989.307196][ T2642] bridge0: port 5(team0) entered blocking state [ 989.307316][ T2642] bridge0: port 5(team0) entered disabled state [ 989.327440][ T2646] device team0 left promiscuous mode [ 989.327458][ T2646] device team_slave_1 left promiscuous mode [ 989.327733][ T2646] bridge0: port 13(team0) entered disabled state [ 989.347952][ T2646] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.351192][ T2646] device team0 entered promiscuous mode [ 989.351208][ T2646] device team_slave_1 entered promiscuous mode [ 989.368518][ T2646] bond0: (slave team0): Enslaving as an active interface with an up link [ 989.370273][ T2644] device team0 entered promiscuous mode [ 989.370290][ T2644] device team_slave_0 entered promiscuous mode [ 989.370433][ T2644] device team_slave_1 entered promiscuous mode [ 989.379440][ T2644] bond0: (slave team0): Releasing backup interface [ 989.406805][ T2644] bridge0: port 3(team0) entered blocking state [ 989.409635][ T2644] bridge0: port 3(team0) entered disabled state [ 989.438841][ T2646] bond0: (slave team0): Releasing backup interface [ 989.461500][ T2646] bridge0: port 13(team0) entered blocking state [ 989.461564][ T2646] bridge0: port 13(team0) entered disabled state [ 989.492997][ T2650] device team0 left promiscuous mode [ 989.493016][ T2650] device team_slave_0 left promiscuous mode [ 989.493156][ T2650] device team_slave_1 left promiscuous mode [ 989.493414][ T2650] bridge0: port 4(team0) entered disabled state [ 989.516513][ T2650] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.519495][ T2650] bond0: (slave team0): Enslaving as an active interface with an up link [ 989.524136][ T2654] device team0 entered promiscuous mode [ 989.524154][ T2654] device team_slave_0 entered promiscuous mode [ 989.524289][ T2654] device team_slave_1 entered promiscuous mode [ 989.537594][ T2654] bond0: (slave team0): Releasing backup interface [ 989.539090][ T2654] bridge0: port 4(team0) entered blocking state [ 989.539159][ T2654] bridge0: port 4(team0) entered disabled state [ 989.541457][ T2653] bridge0: port 4(team0) entered disabled state [ 989.544988][ T2653] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.547206][ T2653] bond0: (slave team0): Enslaving as an active interface with an up link [ 989.561815][ T2656] device team0 entered promiscuous mode [ 989.561833][ T2656] device team_slave_0 entered promiscuous mode [ 989.561967][ T2656] device team_slave_1 entered promiscuous mode [ 989.573513][ T2656] bond0: (slave team0): Releasing backup interface [ 989.602105][ T2656] bridge0: port 4(team0) entered blocking state [ 989.602164][ T2656] bridge0: port 4(team0) entered disabled state [ 989.619943][ T2655] device team0 left promiscuous mode [ 989.619961][ T2655] device team_slave_0 left promiscuous mode [ 989.620089][ T2655] device team_slave_1 left promiscuous mode [ 989.620323][ T2655] bridge0: port 5(team0) entered disabled state [ 989.629267][ T2655] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.635453][ T2655] bond0: (slave team0): Enslaving as an active interface with an up link [ 989.636309][ T2662] device team0 left promiscuous mode [ 989.636322][ T2662] device team_slave_1 left promiscuous mode [ 989.636692][ T2662] bridge0: port 13(team0) entered disabled state [ 989.646933][ T2662] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.648032][ T2662] device team0 entered promiscuous mode [ 989.648045][ T2662] device team_slave_1 entered promiscuous mode [ 989.648815][ T2662] bond0: (slave team0): Enslaving as an active interface with an up link [ 989.649036][ T2663] device team0 left promiscuous mode [ 989.649049][ T2663] device team_slave_0 left promiscuous mode [ 989.649182][ T2663] device team_slave_1 left promiscuous mode [ 989.649446][ T2663] bridge0: port 3(team0) entered disabled state [ 989.681471][ T2663] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.687858][ T2663] bond0: (slave team0): Enslaving as an active interface with an up link [ 989.697265][ T2664] bond0: (slave team0): Releasing backup interface [ 989.724689][ T2664] bridge0: port 13(team0) entered blocking state [ 989.724751][ T2664] bridge0: port 13(team0) entered disabled state [ 989.727107][ T2669] device team0 left promiscuous mode [ 989.727123][ T2669] device team_slave_0 left promiscuous mode [ 989.727251][ T2669] device team_slave_1 left promiscuous mode [ 989.727570][ T2669] bridge0: port 4(team0) entered disabled state [ 989.742180][ T2669] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.745005][ T2669] bond0: (slave team0): Enslaving as an active interface with an up link [ 989.745185][ T2666] device team0 entered promiscuous mode [ 989.745198][ T2666] device team_slave_0 entered promiscuous mode [ 989.745415][ T2666] device team_slave_1 entered promiscuous mode [ 989.749355][ T2666] bond0: (slave team0): Releasing backup interface [ 989.759262][ T2666] bridge0: port 3(team0) entered blocking state [ 989.761683][ T2666] bridge0: port 3(team0) entered disabled state [ 989.773410][ T2668] device team0 left promiscuous mode [ 989.773427][ T2668] device team_slave_1 left promiscuous mode [ 989.783168][ T2670] device team0 entered promiscuous mode [ 989.783185][ T2670] device team_slave_1 entered promiscuous mode [ 989.821218][ T2670] bond0: (slave team0): Releasing backup interface [ 989.834456][ T2670] bridge0: port 4(team0) entered blocking state [ 989.834517][ T2670] bridge0: port 4(team0) entered disabled state [ 989.840271][ T2673] device team0 left promiscuous mode [ 989.840288][ T2673] device team_slave_0 left promiscuous mode [ 989.840427][ T2673] device team_slave_1 left promiscuous mode [ 989.840698][ T2673] bridge0: port 4(team0) entered disabled state [ 989.852205][ T2673] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.853815][ T2673] bond0: (slave team0): Enslaving as an active interface with an up link [ 989.853958][ T2669] device team0 entered promiscuous mode [ 989.853972][ T2669] device team_slave_0 entered promiscuous mode [ 989.854113][ T2669] device team_slave_1 entered promiscuous mode [ 989.860918][ T2669] bond0: (slave team0): Releasing backup interface [ 989.876739][ T2669] bridge0: port 4(team0) entered blocking state [ 989.876834][ T2669] bridge0: port 4(team0) entered disabled state [ 989.890144][ T2675] device team0 entered promiscuous mode [ 989.890162][ T2675] device team_slave_0 entered promiscuous mode [ 989.890319][ T2675] device team_slave_1 entered promiscuous mode [ 989.909106][ T2676] device team0 left promiscuous mode [ 989.909122][ T2676] device team_slave_1 left promiscuous mode [ 989.909392][ T2676] bridge0: port 13(team0) entered disabled state [ 989.925034][ T2676] 8021q: adding VLAN 0 to HW filter on device team0 [ 989.931948][ T2676] device team0 entered promiscuous mode [ 989.931965][ T2676] device team_slave_1 entered promiscuous mode [ 989.932775][ T2676] bond0: (slave team0): Enslaving as an active interface with an up link [ 989.932906][ T2673] device team0 entered promiscuous mode [ 989.932919][ T2673] device team_slave_0 entered promiscuous mode [ 989.933050][ T2673] device team_slave_1 entered promiscuous mode [ 989.935169][ T2673] bond0: (slave team0): Releasing backup interface [ 989.956636][ T2673] bridge0: port 4(team0) entered blocking state [ 989.956701][ T2673] bridge0: port 4(team0) entered disabled state [ 989.965076][ T2676] bond0: (slave team0): Releasing backup interface [ 989.985893][ T2676] bridge0: port 13(team0) entered blocking state [ 989.985950][ T2676] bridge0: port 13(team0) entered disabled state [ 990.005120][ T2681] device team0 left promiscuous mode [ 990.005137][ T2681] device team_slave_0 left promiscuous mode [ 990.005365][ T2681] device team_slave_1 left promiscuous mode [ 990.018174][ T2681] bridge0: port 3(team0) entered disabled state [ 990.024714][ T2681] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.049112][ T2681] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.049341][ T2680] device team0 left promiscuous mode [ 990.049353][ T2680] device team_slave_1 left promiscuous mode [ 990.049622][ T2680] bridge0: port 4(team0) entered disabled state [ 990.052786][ T2680] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.054048][ T2680] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.075391][ T2683] device team0 left promiscuous mode [ 990.075408][ T2683] device team_slave_0 left promiscuous mode [ 990.096397][ T2683] device team_slave_1 left promiscuous mode [ 990.096756][ T2680] device team0 entered promiscuous mode [ 990.096771][ T2680] device team_slave_1 entered promiscuous mode [ 990.098452][ T2680] bond0: (slave team0): Releasing backup interface [ 990.122197][ T2680] bridge0: port 4(team0) entered blocking state [ 990.122257][ T2680] bridge0: port 4(team0) entered disabled state [ 990.128167][ T2686] bridge0: port 4(team0) entered disabled state [ 990.134397][ T2686] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.136233][ T2686] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.141009][ T2683] device team0 entered promiscuous mode [ 990.141023][ T2683] device team_slave_0 entered promiscuous mode [ 990.141135][ T2683] device team_slave_1 entered promiscuous mode [ 990.142931][ T2683] bond0: (slave team0): Releasing backup interface [ 990.144351][ T2683] bridge0: port 5(team0) entered blocking state [ 990.144409][ T2683] bridge0: port 5(team0) entered disabled state [ 990.153762][ T2681] device team0 entered promiscuous mode [ 990.153781][ T2681] device team_slave_0 entered promiscuous mode [ 990.153927][ T2681] device team_slave_1 entered promiscuous mode [ 990.155355][ T2681] bond0: (slave team0): Releasing backup interface [ 990.173811][ T2681] bridge0: port 3(team0) entered blocking state [ 990.173989][ T2681] bridge0: port 3(team0) entered disabled state [ 990.200435][ T2688] device team0 left promiscuous mode [ 990.200454][ T2688] device team_slave_1 left promiscuous mode [ 990.200761][ T2688] bridge0: port 13(team0) entered disabled state [ 990.206303][ T2688] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.230483][ T2688] device team0 entered promiscuous mode [ 990.230500][ T2688] device team_slave_1 entered promiscuous mode [ 990.231248][ T2688] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.246438][ T2691] __nla_validate_parse: 5 callbacks suppressed [ 990.246458][ T2691] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 990.246695][ T2690] device team0 left promiscuous mode [ 990.246709][ T2690] device team_slave_0 left promiscuous mode [ 990.246849][ T2690] device team_slave_1 left promiscuous mode [ 990.247127][ T2690] bridge0: port 4(team0) entered disabled state [ 990.251365][ T2690] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.252923][ T2690] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.253068][ T2688] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.3'. [ 990.278737][ T2688] bond0: (slave team0): Releasing backup interface [ 990.309268][ T2688] bridge0: port 13(team0) entered blocking state [ 990.309332][ T2688] bridge0: port 13(team0) entered disabled state [ 990.324138][ T2695] device team0 left promiscuous mode [ 990.324152][ T2695] device team_slave_0 left promiscuous mode [ 990.324269][ T2695] device team_slave_1 left promiscuous mode [ 990.324508][ T2695] bridge0: port 5(team0) entered disabled state [ 990.339168][ T2695] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.341912][ T2695] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.379311][ T2698] device team0 left promiscuous mode [ 990.379330][ T2698] device team_slave_0 left promiscuous mode [ 990.379487][ T2698] device team_slave_1 left promiscuous mode [ 990.390578][ T2699] device team0 left promiscuous mode [ 990.390595][ T2699] device team_slave_1 left promiscuous mode [ 990.390920][ T2699] bridge0: port 4(team0) entered disabled state [ 990.401449][ T2699] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.411048][ T2699] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.411188][ T2695] device team0 entered promiscuous mode [ 990.411202][ T2695] device team_slave_0 entered promiscuous mode [ 990.411332][ T2695] device team_slave_1 entered promiscuous mode [ 990.413637][ T2695] bond0: (slave team0): Releasing backup interface [ 990.427821][ T2695] bridge0: port 5(team0) entered blocking state [ 990.427885][ T2695] bridge0: port 5(team0) entered disabled state [ 990.429657][ T2701] device team0 left promiscuous mode [ 990.429672][ T2701] device team_slave_0 left promiscuous mode [ 990.429797][ T2701] device team_slave_1 left promiscuous mode [ 990.430053][ T2701] bridge0: port 3(team0) entered disabled state [ 990.451241][ T2701] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.452839][ T2701] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.456034][ T2698] device team0 entered promiscuous mode [ 990.456048][ T2698] device team_slave_0 entered promiscuous mode [ 990.456181][ T2698] device team_slave_1 entered promiscuous mode [ 990.464295][ T2698] bond0: (slave team0): Releasing backup interface [ 990.472895][ T2698] bridge0: port 4(team0) entered blocking state [ 990.472958][ T2698] bridge0: port 4(team0) entered disabled state [ 990.475701][ T2699] device team0 entered promiscuous mode [ 990.475717][ T2699] device team_slave_1 entered promiscuous mode [ 990.480207][ T2699] bond0: (slave team0): Releasing backup interface [ 990.509986][ T2699] bridge0: port 4(team0) entered blocking state [ 990.531554][ T2699] bridge0: port 4(team0) entered disabled state [ 990.533526][ T2707] device team0 left promiscuous mode [ 990.533542][ T2707] device team_slave_1 left promiscuous mode [ 990.533837][ T2707] bridge0: port 13(team0) entered disabled state [ 990.539913][ T2707] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.541305][ T2707] device team0 entered promiscuous mode [ 990.541320][ T2707] device team_slave_1 entered promiscuous mode [ 990.542053][ T2707] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.542191][ T2701] device team0 entered promiscuous mode [ 990.542206][ T2701] device team_slave_0 entered promiscuous mode [ 990.542337][ T2701] device team_slave_1 entered promiscuous mode [ 990.543937][ T2701] bond0: (slave team0): Releasing backup interface [ 990.562001][ T2701] bridge0: port 3(team0) entered blocking state [ 990.562064][ T2701] bridge0: port 3(team0) entered disabled state [ 990.605300][ T2710] device team0 left promiscuous mode [ 990.605316][ T2710] device team_slave_0 left promiscuous mode [ 990.605453][ T2710] device team_slave_1 left promiscuous mode [ 990.617136][ T2710] bridge0: port 5(team0) entered disabled state [ 990.647896][ T2710] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.649343][ T2710] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.740076][ T2721] device team0 left promiscuous mode [ 990.740094][ T2721] device team_slave_0 left promiscuous mode [ 990.740239][ T2721] device team_slave_1 left promiscuous mode [ 990.740510][ T2721] bridge0: port 4(team0) entered disabled state [ 990.809024][ T2721] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.812994][ T2721] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.813287][ T2723] device team0 left promiscuous mode [ 990.813331][ T2723] device team_slave_1 left promiscuous mode [ 990.813612][ T2723] bridge0: port 4(team0) entered disabled state [ 990.828446][ T2723] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.833668][ T2723] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.833844][ T2710] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 990.834956][ T2724] device team0 entered promiscuous mode [ 990.834972][ T2724] device team_slave_0 entered promiscuous mode [ 990.835119][ T2724] device team_slave_1 entered promiscuous mode [ 990.839327][ T2724] bond0: (slave team0): Releasing backup interface [ 990.858900][ T2724] bridge0: port 4(team0) entered blocking state [ 990.858959][ T2724] bridge0: port 4(team0) entered disabled state [ 990.873163][ T2725] device team0 entered promiscuous mode [ 990.873182][ T2725] device team_slave_1 entered promiscuous mode [ 990.874683][ T2725] bond0: (slave team0): Releasing backup interface [ 990.884176][ T2725] bridge0: port 4(team0) entered blocking state [ 990.884240][ T2725] bridge0: port 4(team0) entered disabled state [ 990.904677][ T2715] netlink: 28 bytes leftover after parsing attributes in process `syz-executor.1'. [ 990.922677][ T2738] bond0: (slave team0): Releasing backup interface [ 990.924601][ T2738] bridge0: port 13(team0) entered blocking state [ 990.924664][ T2738] bridge0: port 13(team0) entered disabled state [ 990.926960][ T2735] device team0 left promiscuous mode [ 990.926975][ T2735] device team_slave_0 left promiscuous mode [ 990.927102][ T2735] device team_slave_1 left promiscuous mode [ 990.927343][ T2735] bridge0: port 3(team0) entered disabled state [ 990.932836][ T2735] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.950619][ T2735] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.953557][ T2736] device team0 left promiscuous mode [ 990.953571][ T2736] device team_slave_1 left promiscuous mode [ 990.953810][ T2736] bridge0: port 13(team0) entered disabled state [ 990.970639][ T2736] 8021q: adding VLAN 0 to HW filter on device team0 [ 990.971999][ T2736] device team0 entered promiscuous mode [ 990.972015][ T2736] device team_slave_1 entered promiscuous mode [ 990.974216][ T2736] bond0: (slave team0): Enslaving as an active interface with an up link [ 990.974392][ T2710] device team0 entered promiscuous mode [ 990.974407][ T2710] device team_slave_0 entered promiscuous mode [ 990.974560][ T2710] device team_slave_1 entered promiscuous mode [ 990.977430][ T2710] bond0: (slave team0): Releasing backup interface [ 990.995869][ T2710] bridge0: port 5(team0) entered blocking state [ 990.995934][ T2710] bridge0: port 5(team0) entered disabled state [ 991.000580][ T2737] device team0 entered promiscuous mode [ 991.000597][ T2737] device team_slave_0 entered promiscuous mode [ 991.000759][ T2737] device team_slave_1 entered promiscuous mode [ 991.017573][ T2737] bond0: (slave team0): Releasing backup interface [ 991.018990][ T2737] bridge0: port 4(team0) entered blocking state [ 991.019083][ T2737] bridge0: port 4(team0) entered disabled state [ 991.034557][ T2743] device team0 left promiscuous mode [ 991.034574][ T2743] device team_slave_0 left promiscuous mode [ 991.034712][ T2743] device team_slave_1 left promiscuous mode [ 991.038625][ T2743] bridge0: port 4(team0) entered disabled state [ 991.061996][ T2743] 8021q: adding VLAN 0 to HW filter on device team0 [ 991.066749][ T2743] bond0: (slave team0): Enslaving as an active interface with an up link [ 991.107444][ T2745] device team0 left promiscuous mode [ 991.107461][ T2745] device team_slave_1 left promiscuous mode [ 991.107714][ T2745] bridge0: port 4(team0) entered disabled state [ 991.126830][ T2745] 8021q: adding VLAN 0 to HW filter on device team0 [ 991.128280][ T2745] bond0: (slave team0): Enslaving as an active interface with an up link [ 991.164594][ T2743] device team0 entered promiscuous mode [ 991.164610][ T2743] device team_slave_0 entered promiscuous mode [ 991.164752][ T2743] device team_slave_1 entered promiscuous mode [ 991.167107][ T2743] bond0: (slave team0): Releasing backup interface [ 991.190205][ T2743] bridge0: port 4(team0) entered blocking state [ 991.190264][ T2743] bridge0: port 4(team0) entered disabled state [ 991.229767][ T2752] device team0 left promiscuous mode [ 991.229785][ T2752] device team_slave_0 left promiscuous mode [ 991.229924][ T2752] device team_slave_1 left promiscuous mode [ 991.230308][ T2752] bridge0: port 4(team0) entered disabled state [ 991.239598][ T2752] 8021q: adding VLAN 0 to HW filter on device team0 [ 991.260101][ T2752] bond0: (slave team0): Enslaving as an active interface with an up link [ 991.273948][ T2754] bond0: (slave team0): Releasing backup interface [ 991.277151][ T2754] bridge0: port 13(team0) entered blocking state [ 991.278248][ T2754] bridge0: port 13(team0) entered disabled state [ 991.281284][ T2753] device team0 left promiscuous mode [ 991.281298][ T2753] device team_slave_0 left promiscuous mode [ 991.281485][ T2753] device team_slave_1 left promiscuous mode [ 991.281742][ T2753] bridge0: port 5(team0) entered disabled state [ 991.300773][ T2753] 8021q: adding VLAN 0 to HW filter on device team0 [ 991.302142][ T2753] bond0: (slave team0): Enslaving as an active interface with an up link [ 991.311358][ T2755] device team0 entered promiscuous mode [ 991.314434][ T2755] device team_slave_0 entered promiscuous mode [ 991.314588][ T2755] device team_slave_1 entered promiscuous mode [ 991.327068][ T2755] bond0: (slave team0): Releasing backup interface [ 991.367246][ T2755] bridge0: port 4(team0) entered blocking state [ 991.367308][ T2755] bridge0: port 4(team0) entered disabled state [ 991.372552][ T2757] device team0 entered promiscuous mode [ 991.372568][ T2757] device team_slave_0 entered promiscuous mode [ 991.372696][ T2757] device team_slave_1 entered promiscuous mode [ 991.391912][ T2757] bond0: (slave team0): Releasing backup interface [ 991.399400][ T2757] bridge0: port 5(team0) entered blocking state [ 991.399463][ T2757] bridge0: port 5(team0) entered disabled state [ 991.401364][ T2768] device team0 entered promiscuous mode [ 991.401381][ T2768] device team_slave_0 entered promiscuous mode [ 991.401528][ T2768] device team_slave_1 entered promiscuous mode [ 991.402596][ T2768] bond0: (slave team0): Releasing backup interface [ 991.403805][ T2768] bridge0: port 3(team0) entered blocking state [ 991.403929][ T2768] bridge0: port 3(team0) entered disabled state [ 991.420594][ T2769] device team0 left promiscuous mode [ 991.420612][ T2769] device team_slave_0 left promiscuous mode [ 991.420769][ T2769] device team_slave_1 left promiscuous mode [ 991.421044][ T2769] bridge0: port 4(team0) entered disabled state [ 991.438697][ T2769] 8021q: adding VLAN 0 to HW filter on device team0 [ 991.439973][ T2769] bond0: (slave team0): Enslaving as an active interface with an up link [ 991.458588][ T2771] device team0 left promiscuous mode [ 991.458603][ T2771] device team_slave_1 left promiscuous mode [ 991.458839][ T2771] bridge0: port 13(team0) entered disabled state [ 991.474443][ T2771] 8021q: adding VLAN 0 to HW filter on device team0 [ 991.475455][ T2771] device team0 entered promiscuous mode [ 991.475469][ T2771] device team_slave_1 entered promiscuous mode [ 991.504202][ T2771] bond0: (slave team0): Enslaving as an active interface with an up link [ 991.518795][ T2773] bond0: (slave team0): Releasing backup interface [ 991.547756][ T2773] bridge0: port 13(team0) entered blocking state [ 991.547818][ T2773] bridge0: port 13(team0) entered disabled state [ 991.626512][ T2782] bridge0: port 4(team0) entered disabled state [ 991.631465][ T2782] 8021q: adding VLAN 0 to HW filter on device team0 [ 991.639870][ T2782] bond0: (slave team0): Enslaving as an active interface with an up link [ 991.739994][ T2787] device team0 left promiscuous mode [ 991.740011][ T2787] device team_slave_1 left promiscuous mode [ 991.740292][ T2787] bridge0: port 13(team0) entered disabled state [ 991.750085][ T2787] 8021q: adding VLAN 0 to HW filter on device team0 [ 991.751182][ T2787] device team0 entered promiscuous mode [ 991.751196][ T2787] device team_slave_1 entered promiscuous mode [ 991.751898][ T2787] bond0: (slave team0): Enslaving as an active interface with an up link [ 991.810609][ T2793] bond0: (slave team0): Releasing backup interface [ 991.836212][ T2793] bridge0: port 13(team0) entered blocking state [ 991.842200][ T2793] bridge0: port 13(team0) entered disabled state [ 992.058372][ T2814] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1808 sclass=netlink_route_socket pid=2814 comm=syz-executor.5 [ 992.284121][ T2831] device team0 left promiscuous mode [ 992.284138][ T2831] device team_slave_0 left promiscuous mode [ 992.284259][ T2831] device team_slave_1 left promiscuous mode [ 992.284495][ T2831] bridge0: port 5(team0) entered disabled state [ 992.326555][ T2838] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=13 sclass=netlink_route_socket pid=2838 comm=syz-executor.1 [ 992.333336][ T2831] 8021q: adding VLAN 0 to HW filter on device team0 [ 992.340488][ T2831] bond0: (slave team0): Enslaving as an active interface with an up link [ 992.342318][ T2835] device team0 left promiscuous mode [ 992.342333][ T2835] device team_slave_0 left promiscuous mode [ 992.342476][ T2835] device team_slave_1 left promiscuous mode [ 992.352266][ T2840] device team0 left promiscuous mode [ 992.352281][ T2840] device team_slave_1 left promiscuous mode [ 992.352563][ T2840] bridge0: port 13(team0) entered disabled state [ 992.359800][ T2840] 8021q: adding VLAN 0 to HW filter on device team0 [ 992.361182][ T2840] device team0 entered promiscuous mode [ 992.361197][ T2840] device team_slave_1 entered promiscuous mode [ 992.362153][ T2840] bond0: (slave team0): Enslaving as an active interface with an up link [ 992.371559][ T2842] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=9 sclass=netlink_route_socket pid=2842 comm=syz-executor.5 [ 992.386910][ T2835] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=11 sclass=netlink_route_socket pid=2835 comm=syz-executor.0 [ 992.403020][ T2840] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 992.403449][ T2840] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 992.488668][ T2850] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=2850 comm=syz-executor.2 [ 992.498903][ T2840] bond0: (slave team0): Releasing backup interface [ 992.510863][ T2840] bridge0: port 13(team0) entered blocking state [ 992.510927][ T2840] bridge0: port 13(team0) entered disabled state [ 992.514878][ T2846] device team0 left promiscuous mode [ 992.514893][ T2846] device team_slave_0 left promiscuous mode [ 992.515033][ T2846] device team_slave_1 left promiscuous mode [ 992.515402][ T2846] bridge0: port 3(team0) entered disabled state [ 992.528159][ T2846] 8021q: adding VLAN 0 to HW filter on device team0 [ 992.533971][ T2846] bond0: (slave team0): Enslaving as an active interface with an up link [ 992.672840][ T2862] device team0 left promiscuous mode [ 992.672856][ T2862] device team_slave_1 left promiscuous mode [ 992.673174][ T2862] bridge0: port 13(team0) entered disabled state [ 992.703392][ T2862] 8021q: adding VLAN 0 to HW filter on device team0 [ 992.704544][ T2862] device team0 entered promiscuous mode [ 992.704558][ T2862] device team_slave_1 entered promiscuous mode [ 992.705433][ T2862] bond0: (slave team0): Enslaving as an active interface with an up link [ 992.712531][ T2862] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 992.716011][ T2862] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.3'. [ 992.787651][ T1228] ieee802154 phy0 wpan0: encryption failed: -22 [ 992.787699][ T1228] ieee802154 phy1 wpan1: encryption failed: -22 [ 992.795162][ T2862] bond0: (slave team0): Releasing backup interface [ 992.806440][ T2862] bridge0: port 13(team0) entered blocking state [ 992.806496][ T2862] bridge0: port 13(team0) entered disabled state [ 992.808513][ T2867] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.1'. [ 992.809266][ T2867] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.1'. [ 992.820318][ T2870] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=123 sclass=netlink_route_socket pid=2870 comm=syz-executor.5 [ 992.844641][ T2871] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1296 sclass=netlink_route_socket pid=2871 comm=syz-executor.2 [ 992.876876][ T2867] device team0 entered promiscuous mode [ 992.876894][ T2867] device team_slave_0 entered promiscuous mode [ 992.877041][ T2867] device team_slave_1 entered promiscuous mode [ 992.883335][ T2886] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=15 sclass=netlink_route_socket pid=2886 comm=syz-executor.0 [ 992.902697][ T2867] bond0: (slave team0): Releasing backup interface [ 992.912825][ T2867] bridge0: port 5(team0) entered blocking state [ 992.912955][ T2867] bridge0: port 5(team0) entered disabled state [ 992.957951][ T2887] device team0 entered promiscuous mode [ 992.957972][ T2887] device team_slave_0 entered promiscuous mode [ 992.958120][ T2887] device team_slave_1 entered promiscuous mode [ 992.965332][ T2887] bond0: (slave team0): Releasing backup interface [ 992.971738][ T2887] bridge0: port 3(team0) entered blocking state [ 992.971877][ T2887] bridge0: port 3(team0) entered disabled state [ 993.038230][ T2894] device team0 left promiscuous mode [ 993.038247][ T2894] device team_slave_1 left promiscuous mode [ 993.038505][ T2894] bridge0: port 13(team0) entered disabled state [ 993.074492][ T2894] 8021q: adding VLAN 0 to HW filter on device team0 [ 993.076106][ T2894] device team0 entered promiscuous mode [ 993.076121][ T2894] device team_slave_1 entered promiscuous mode [ 993.076811][ T2894] bond0: (slave team0): Enslaving as an active interface with an up link [ 993.120342][ T2899] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=2899 comm=syz-executor.5 [ 993.128650][ T2894] bond0: (slave team0): Releasing backup interface [ 993.151178][ T2894] bridge0: port 13(team0) entered blocking state [ 993.151238][ T2894] bridge0: port 13(team0) entered disabled state [ 993.254259][ T2922] device team0 left promiscuous mode [ 993.254277][ T2922] device team_slave_0 left promiscuous mode [ 993.254417][ T2922] device team_slave_1 left promiscuous mode [ 993.254685][ T2922] bridge0: port 5(team0) entered disabled state [ 993.274300][ T2922] 8021q: adding VLAN 0 to HW filter on device team0 [ 993.294514][ T2922] bond0: (slave team0): Enslaving as an active interface with an up link [ 993.393390][ T2929] validate_nla: 137 callbacks suppressed [ 993.393410][ T2929] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 993.393579][ T2929] device team0 left promiscuous mode [ 993.393592][ T2929] device team_slave_1 left promiscuous mode [ 993.393961][ T2929] bridge0: port 13(team0) entered disabled state [ 993.448305][ T2929] 8021q: adding VLAN 0 to HW filter on device team0 [ 993.454380][ T2929] device team0 entered promiscuous mode [ 993.454398][ T2929] device team_slave_1 entered promiscuous mode [ 993.455201][ T2929] bond0: (slave team0): Enslaving as an active interface with an up link [ 993.505336][ T2929] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 993.514818][ T2929] bond0: (slave team0): Releasing backup interface [ 993.528186][ T2929] bridge0: port 13(team0) entered blocking state [ 993.528250][ T2929] bridge0: port 13(team0) entered disabled state [ 993.569136][ T2945] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 993.569331][ T2945] device team0 left promiscuous mode [ 993.569345][ T2945] device team_slave_0 left promiscuous mode [ 993.569483][ T2945] device team_slave_1 left promiscuous mode [ 993.578043][ T2945] bridge0: port 3(team0) entered disabled state [ 993.586898][ T2945] 8021q: adding VLAN 0 to HW filter on device team0 [ 993.588294][ T2945] bond0: (slave team0): Enslaving as an active interface with an up link [ 993.612665][ T2949] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 993.718606][ T2954] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 993.787415][ T2956] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 993.812727][ T2965] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 993.812912][ T2965] device team0 left promiscuous mode [ 993.812924][ T2965] device team_slave_1 left promiscuous mode [ 993.813197][ T2965] bridge0: port 13(team0) entered disabled state [ 993.847493][ T2965] 8021q: adding VLAN 0 to HW filter on device team0 [ 993.861209][ T2965] device team0 entered promiscuous mode [ 993.861226][ T2965] device team_slave_1 entered promiscuous mode [ 993.863217][ T2965] bond0: (slave team0): Enslaving as an active interface with an up link [ 993.864121][ T2963] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 993.874527][ T2975] netlink: 'syz-executor.4': attribute type 10 has an invalid length. [ 993.897858][ T2974] netlink: 'syz-executor.0': attribute type 10 has an invalid length. [ 993.926410][ T2976] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=14 sclass=netlink_route_socket pid=2976 comm=syz-executor.5 [ 993.970954][ T2980] device team0 entered promiscuous mode [ 993.970972][ T2980] device team_slave_0 entered promiscuous mode [ 993.971203][ T2980] device team_slave_1 entered promiscuous mode [ 994.007920][ T2980] bond0: (slave team0): Releasing backup interface [ 994.057235][ T2980] bridge0: port 4(team0) entered blocking state [ 994.057297][ T2980] bridge0: port 4(team0) entered disabled state [ 994.365083][ T3007] device team0 left promiscuous mode [ 994.365102][ T3007] device team_slave_0 left promiscuous mode [ 994.365246][ T3007] device team_slave_1 left promiscuous mode [ 994.367025][ T3007] bridge0: port 4(team0) entered disabled state [ 994.388816][ T3007] 8021q: adding VLAN 0 to HW filter on device team0 [ 994.395127][ T3007] bond0: (slave team0): Enslaving as an active interface with an up link [ 994.410732][ T3003] bond0: (slave team0): Releasing backup interface [ 994.413843][ T3003] bridge0: port 13(team0) entered blocking state [ 994.413903][ T3003] bridge0: port 13(team0) entered disabled state [ 994.566950][ T3024] FAULT_INJECTION: forcing a failure. [ 994.566950][ T3024] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 994.566985][ T3024] CPU: 1 PID: 3024 Comm: syz-executor.2 Not tainted 5.19.0-rc2-syzkaller-00147-gf0ec9c65a8d6 #0 [ 994.567014][ T3024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.567028][ T3024] Call Trace: [ 994.567034][ T3024] [ 994.567042][ T3024] dump_stack_lvl+0xcd/0x134 [ 994.567078][ T3024] should_fail.cold+0x5/0xa [ 994.567103][ T3024] _copy_from_user+0x2a/0x170 [ 994.567135][ T3024] __sys_bpf+0x335/0x5700 [ 994.567244][ T3024] ? bpf_perf_link_attach+0x520/0x520 [ 994.567272][ T3024] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 994.567309][ T3024] ? find_held_lock+0x2d/0x110 [ 994.567342][ T3024] __x64_sys_bpf+0x75/0xb0 [ 994.567364][ T3024] ? syscall_enter_from_user_mode+0x21/0x70 [ 994.567394][ T3024] do_syscall_64+0x35/0xb0 [ 994.567425][ T3024] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 994.567456][ T3024] RIP: 0033:0x7fa51d089109 [ 994.567475][ T3024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 994.567502][ T3024] RSP: 002b:00007fa51e22c168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 994.567534][ T3024] RAX: ffffffffffffffda RBX: 00007fa51d19bf60 RCX: 00007fa51d089109 [ 994.567553][ T3024] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 000000000000001c [ 994.567570][ T3024] RBP: 00007fa51e22c1d0 R08: 0000000000000000 R09: 0000000000000000 [ 994.567587][ T3024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 994.567604][ T3024] R13: 00007ffefe62ca3f R14: 00007fa51e22c300 R15: 0000000000022000 [ 994.567626][ T3024] [ 994.570812][ T3026] FAULT_INJECTION: forcing a failure. [ 994.570812][ T3026] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 994.570845][ T3026] CPU: 1 PID: 3026 Comm: syz-executor.5 Not tainted 5.19.0-rc2-syzkaller-00147-gf0ec9c65a8d6 #0 [ 994.570872][ T3026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.570887][ T3026] Call Trace: [ 994.570894][ T3026] [ 994.570901][ T3026] dump_stack_lvl+0xcd/0x134 [ 994.570932][ T3026] should_fail.cold+0x5/0xa [ 994.570958][ T3026] _copy_from_user+0x2a/0x170 [ 994.570987][ T3026] __sys_bpf+0x335/0x5700 [ 994.571018][ T3026] ? bpf_perf_link_attach+0x520/0x520 [ 994.571049][ T3026] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 994.571083][ T3026] ? find_held_lock+0x2d/0x110 [ 994.571116][ T3026] __x64_sys_bpf+0x75/0xb0 [ 994.571139][ T3026] ? syscall_enter_from_user_mode+0x21/0x70 [ 994.571168][ T3026] do_syscall_64+0x35/0xb0 [ 994.571202][ T3026] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 994.571234][ T3026] RIP: 0033:0x7f883d689109 [ 994.571253][ T3026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 994.571278][ T3026] RSP: 002b:00007f883e80f168 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 994.571304][ T3026] RAX: ffffffffffffffda RBX: 00007f883d79bf60 RCX: 00007f883d689109 [ 994.571322][ T3026] RDX: 0000000000000010 RSI: 0000000020000000 RDI: 000000000000001c [ 994.571338][ T3026] RBP: 00007f883e80f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 994.571355][ T3026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 994.571371][ T3026] R13: 00007ffeff3ba37f R14: 00007f883e80f300 R15: 0000000000022000 [ 994.571391][ T3026] [ 994.587096][ T3027] device team0 left promiscuous mode [ 994.587112][ T3027] device team_slave_1 left promiscuous mode [ 994.587378][ T3027] bridge0: port 13(team0) entered disabled state [ 994.662359][ T3027] 8021q: adding VLAN 0 to HW filter on device team0 [ 994.668215][ T3027] device team0 entered promiscuous mode [ 994.668231][ T3027] device team_slave_1 entered promiscuous mode [ 994.669029][ T3027] bond0: (slave team0): Enslaving as an active interface with an up link [ 994.670254][ T3025] device team0 entered promiscuous mode [ 994.670270][ T3025] device team_slave_0 entered promiscuous mode [ 994.670414][ T3025] device team_slave_1 entered promiscuous mode [ 994.680162][ T3032] FAULT_INJECTION: forcing a failure. [ 994.680162][ T3032] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 994.680195][ T3032] CPU: 1 PID: 3032 Comm: syz-executor.4 Not tainted 5.19.0-rc2-syzkaller-00147-gf0ec9c65a8d6 #0 [ 994.680224][ T3032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.680238][ T3032] Call Trace: [ 994.680245][ T3032] [ 994.680253][ T3032] dump_stack_lvl+0xcd/0x134 [ 994.680286][ T3032] should_fail.cold+0x5/0xa [ 994.680312][ T3032] _copy_from_user+0x2a/0x170 [ 994.680342][ T3032] iovec_from_user+0x149/0x3a0 [ 994.680384][ T3032] __import_iovec+0x65/0x5d0 [ 994.680409][ T3032] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 994.680444][ T3032] ? __lock_acquire+0x163e/0x5660 [ 994.680474][ T3032] import_iovec+0x10c/0x150 [ 994.680500][ T3032] vfs_readv+0xbb/0x150 [ 994.680533][ T3032] ? vfs_iter_read+0xa0/0xa0 [ 994.680560][ T3032] ? __fget_files+0x248/0x440 [ 994.680586][ T3032] ? lock_downgrade+0x6e0/0x6e0 [ 994.680617][ T3032] ? find_held_lock+0x2d/0x110 [ 994.680647][ T3032] ? __fget_files+0x26a/0x440 [ 994.680673][ T3032] __x64_sys_preadv+0x22b/0x310 [ 994.680703][ T3032] ? __ia32_sys_writev+0xb0/0xb0 [ 994.680731][ T3032] ? syscall_enter_from_user_mode+0x21/0x70 [ 994.680759][ T3032] ? syscall_enter_from_user_mode+0x21/0x70 [ 994.680788][ T3032] do_syscall_64+0x35/0xb0 [ 994.680818][ T3032] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 994.680849][ T3032] RIP: 0033:0x7fe347889109 [ 994.680868][ T3032] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 994.680893][ T3032] RSP: 002b:00007fe34895e168 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 994.680918][ T3032] RAX: ffffffffffffffda RBX: 00007fe34799bf60 RCX: 00007fe347889109 [ 994.680937][ T3032] RDX: 0000000000000001 RSI: 0000000020000580 RDI: 0000000000000003 [ 994.680953][ T3032] RBP: 00007fe34895e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 994.680970][ T3032] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 994.680985][ T3032] R13: 00007ffc61739a6f R14: 00007fe34895e300 R15: 0000000000022000 [ 994.681006][ T3032] [ 994.708712][ T3025] bond0: (slave team0): Releasing backup interface [ 994.721150][ T3034] ------------[ cut here ]------------ [ 994.721161][ T3034] WARNING: CPU: 1 PID: 3034 at kernel/bpf/cgroup.c:938 bpf_cgroup_link_release.part.0+0x147/0x180 [ 994.721420][ T3034] Modules linked in: [ 994.721440][ T3034] CPU: 1 PID: 3034 Comm: syz-executor.1 Not tainted 5.19.0-rc2-syzkaller-00147-gf0ec9c65a8d6 #0 [ 994.721473][ T3034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.721492][ T3034] RIP: 0010:bpf_cgroup_link_release.part.0+0x147/0x180 [ 994.721533][ T3034] Code: ff ff 5b 5d 41 5c e9 e8 ea e1 ff e8 e3 ea e1 ff 48 c7 c7 e0 92 dc 8b e8 77 d0 e0 07 5b 5d 41 5c e9 ce ea e1 ff e8 c9 ea e1 ff <0f> 0b e9 45 ff ff ff e8 bd 0f 2e 00 e9 18 ff ff ff e8 b3 0f 2e 00 [ 994.721564][ T3034] RSP: 0018:ffffc900032b7dd0 EFLAGS: 00010212 [ 994.721593][ T3034] RAX: 00000000000000cc RBX: ffff888026f9ef00 RCX: ffffc90004269000 [ 994.721699][ T3034] RDX: 0000000000040000 RSI: ffffffff8197b8e7 RDI: 0000000000000005 [ 994.721791][ T3034] RBP: 00000000fffffff4 R08: 0000000000000005 R09: 0000000000000000 [ 994.721813][ T3034] R10: 00000000fffffff4 R11: 0000000000000001 R12: ffff888026f9ef68 [ 994.721908][ T3034] R13: ffff888026f9ef18 R14: ffffc900003ec000 R15: ffff88814564f0a0 [ 994.721931][ T3034] FS: 00007f73234d9700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000 [ 994.722028][ T3034] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 994.722625][ T3034] CR2: 00007f73234d8ff8 CR3: 000000001291c000 CR4: 00000000003506e0 [ 994.722650][ T3034] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 994.722672][ T3034] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 994.722694][ T3034] Call Trace: [ 994.722704][ T3034] [ 994.722718][ T3034] bpf_cgroup_link_release+0x38/0x50 [ 994.722751][ T3034] bpf_link_free+0xe6/0x1b0 [ 994.722785][ T3034] bpf_link_put+0x161/0x1b0 [ 994.722820][ T3034] bpf_link_release+0x33/0x40 [ 994.722853][ T3034] __fput+0x277/0x9d0 [ 994.722885][ T3034] ? bpf_link_put+0x1b0/0x1b0 [ 994.722919][ T3034] task_work_run+0xdd/0x1a0 [ 994.723004][ T3034] exit_to_user_mode_prepare+0x23c/0x250 [ 994.723069][ T3034] syscall_exit_to_user_mode+0x19/0x50 [ 994.723104][ T3034] do_syscall_64+0x42/0xb0 [ 994.723140][ T3034] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 994.723175][ T3034] RIP: 0033:0x7f7322289109 [ 994.723198][ T3034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 994.723227][ T3034] RSP: 002b:00007f73234d9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 994.723475][ T3034] RAX: 0000000000000008 RBX: 00007f732239bf60 RCX: 00007f7322289109 [ 994.723499][ T3034] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 [ 994.723526][ T3034] RBP: 00007f73234d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 994.723547][ T3034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 994.723569][ T3034] R13: 00007ffd38a1e98f R14: 00007f73234d9300 R15: 0000000000022000 [ 994.723595][ T3034] [ 994.723611][ T3034] Kernel panic - not syncing: panic_on_warn set ... [ 994.723625][ T3034] CPU: 1 PID: 3034 Comm: syz-executor.1 Not tainted 5.19.0-rc2-syzkaller-00147-gf0ec9c65a8d6 #0 [ 994.723655][ T3034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 994.723671][ T3034] Call Trace: [ 994.723680][ T3034] [ 994.723690][ T3034] dump_stack_lvl+0xcd/0x134 [ 994.723721][ T3034] panic+0x2d7/0x636 [ 994.723767][ T3034] ? panic_print_sys_info.part.0+0x10b/0x10b [ 994.723801][ T3034] ? __warn.cold+0x1d9/0x2cd [ 994.723828][ T3034] ? bpf_cgroup_link_release.part.0+0x147/0x180 [ 994.723858][ T3034] __warn.cold+0x1ea/0x2cd [ 994.723885][ T3034] ? bpf_cgroup_link_release.part.0+0x147/0x180 [ 994.723915][ T3034] report_bug+0x1bc/0x210 [ 994.724007][ T3034] handle_bug+0x3c/0x60 [ 994.724032][ T3034] exc_invalid_op+0x14/0x40 [ 994.724058][ T3034] asm_exc_invalid_op+0x1b/0x20 [ 994.724091][ T3034] RIP: 0010:bpf_cgroup_link_release.part.0+0x147/0x180 [ 994.724123][ T3034] Code: ff ff 5b 5d 41 5c e9 e8 ea e1 ff e8 e3 ea e1 ff 48 c7 c7 e0 92 dc 8b e8 77 d0 e0 07 5b 5d 41 5c e9 ce ea e1 ff e8 c9 ea e1 ff <0f> 0b e9 45 ff ff ff e8 bd 0f 2e 00 e9 18 ff ff ff e8 b3 0f 2e 00 [ 994.724150][ T3034] RSP: 0018:ffffc900032b7dd0 EFLAGS: 00010212 [ 994.724175][ T3034] RAX: 00000000000000cc RBX: ffff888026f9ef00 RCX: ffffc90004269000 [ 994.724195][ T3034] RDX: 0000000000040000 RSI: ffffffff8197b8e7 RDI: 0000000000000005 [ 994.724214][ T3034] RBP: 00000000fffffff4 R08: 0000000000000005 R09: 0000000000000000 [ 994.724233][ T3034] R10: 00000000fffffff4 R11: 0000000000000001 R12: ffff888026f9ef68 [ 994.724252][ T3034] R13: ffff888026f9ef18 R14: ffffc900003ec000 R15: ffff88814564f0a0 [ 994.724275][ T3034] ? bpf_cgroup_link_release.part.0+0x147/0x180 [ 994.724306][ T3034] bpf_cgroup_link_release+0x38/0x50 [ 994.724334][ T3034] bpf_link_free+0xe6/0x1b0 [ 994.724367][ T3034] bpf_link_put+0x161/0x1b0 [ 994.724398][ T3034] bpf_link_release+0x33/0x40 [ 994.724433][ T3034] __fput+0x277/0x9d0 [ 994.724462][ T3034] ? bpf_link_put+0x1b0/0x1b0 [ 994.724494][ T3034] task_work_run+0xdd/0x1a0 [ 994.724530][ T3034] exit_to_user_mode_prepare+0x23c/0x250 [ 994.724566][ T3034] syscall_exit_to_user_mode+0x19/0x50 [ 994.724597][ T3034] do_syscall_64+0x42/0xb0 [ 994.724629][ T3034] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 994.724663][ T3034] RIP: 0033:0x7f7322289109 [ 994.724683][ T3034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 994.724711][ T3034] RSP: 002b:00007f73234d9168 EFLAGS: 00000246 ORIG_RAX: 0000000000000021 [ 994.724739][ T3034] RAX: 0000000000000008 RBX: 00007f732239bf60 RCX: 00007f7322289109 [ 994.724759][ T3034] RDX: 0000000000000000 RSI: 0000000000000008 RDI: 0000000000000007 [ 994.724777][ T3034] RBP: 00007f73234d91d0 R08: 0000000000000000 R09: 0000000000000000 [ 994.724795][ T3034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 994.724814][ T3034] R13: 00007ffd38a1e98f R14: 00007f73234d9300 R15: 0000000000022000 [ 994.724836][ T3034] [ 994.725203][ T3034] Kernel Offset: disabled