0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/fuse\x00', 0x2, 0x0) close(r0) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x282, 0x42) setsockopt$inet_dccp_buf(r1, 0x21, 0x80, &(0x7f0000000080)="424f4a68f6e600eb1022cfef9e0ae057ec02b4b3f082be6153e1d1ab9631073d61d10a42ef2ccd515ed12e2f9b7798e17ac96225272359a8ab6635bacf0b629d6b4c09766118f1841d4ae1726d2830ef5286e6d923d5d2a102bb7dccc97c8538f1708ec952fa876127d64243cf1f10f306c08d5328f95397d66ec039ed926cb8f5e81d85b3b28fc99a2bc074c3f758216e0580", 0x93) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0xffffffffffffffff) write$FUSE_GETXATTR(r0, &(0x7f0000000000)={0x18, 0x0, 0x5, {0x9}}, 0x18) mount$fuse(0x0, &(0x7f0000000800)='./file0\x00', &(0x7f0000000380)='fuse\x00', 0x0, &(0x7f0000000b00)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x2000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) [ 600.651162][ T3309] IPVS: Unknown mcast interface: yam0 [ 600.693175][ T3271] IPVS: Unknown mcast interface: yam0 01:41:25 executing program 4 (fault-call:11 fault-nth:16): perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:41:25 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:25 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f0000000040)={0xffff, 0x57, 0x1}, 0xc) ioctl$LOOP_SET_DIRECT_IO(r3, 0x4c08, 0x0) r4 = fcntl$dupfd(r0, 0xe09, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:25 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r2 = dup2(r1, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$KVM_SET_GSI_ROUTING(r3, 0x4008ae6a, &(0x7f00000001c0)={0x9, 0x0, [{0x1000, 0x2, 0x0, 0x0, @msi={0xfff, 0x2, 0x1}}, {0x80000001, 0x0, 0x0, 0x0, @sint={0x8, 0xd3}}, {0xfff, 0x4, 0x0, 0x0, @adapter={0xfffffffffffff10f, 0x4, 0x3, 0x0, 0x8000}}, {0x5b, 0x2, 0x0, 0x0, @sint={0x4, 0x2}}, {0x0, 0x0, 0x0, 0x0, @msi={0x3, 0xfffffffe, 0x4}}, {0x2, 0x3, 0x0, 0x0, @sint={0x10001, 0x31}}, {0x1, 0x1, 0x0, 0x0, @adapter={0xf0e0, 0x494, 0x5, 0x800, 0xd9}}, {0x10000, 0x1, 0x0, 0x0, @sint={0x1ff, 0xff}}, {0x20, 0x1, 0x0, 0x0, @sint={0x4, 0x17e3}}]}) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000000c0)=@newlink={0x4c, 0x10, 0xe3b, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x243}, [@IFLA_MASTER={0x8, 0xa, 0x6}, @IFLA_LINKINFO={0x24, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x18, 0x2, [@IFLA_IPTUN_LOCAL={0x14, 0x2, @remote}]}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x880) 01:41:25 executing program 5: r0 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in6=@mcast2, 0x4e23, 0x0, 0x4e23, 0x0, 0xa, 0xa0, 0x0, 0xc, 0x0, r4}, {0x80000000, 0x51, 0x9, 0x5, 0x8, 0x7ff, 0x0, 0x8}, {0xffffffffffffff81, 0x7, 0xfffffffffffffff8, 0xfffffffffffffffb}, 0x3f, 0x0, 0x4, 0x0, 0x1}, {{@in=@multicast2, 0x4d2, 0x51}, 0x2, @in6=@empty, 0x34ff, 0x2, 0x1, 0x0, 0x1, 0x7fff, 0xb1}}, 0xe8) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000800)={&(0x7f0000000280)={0x550, 0x3b, 0x11d4a6841f50095b, 0x70bd29, 0x25dfdbfd, {0x1}, [@typed={0x8, 0x1b, @pid=r1}, @generic="53b7a290a7f991e99c4649da65185720c4807da01864904bf61a249b5640dda84c48ab462fb0148e86d2b8d04401f84301a25a84be5e5eb3cd2042dbc719dc13942a606fc452f847de6c0474302f431b36e2137d", @typed={0x4, 0x4f}, @nested={0x30, 0x42, [@typed={0x8, 0x72, @u32=0x3}, @typed={0x20, 0x3e, @binary="0015d53e8547988c8a7ffc45b7c266bce08fed217d136bbeae"}, @typed={0x4, 0x4f}]}, @generic="281bc21388efe0e544d6e23c1b3bd49d4d168783bf5530b85a27163c740a71145f8fa6ce765103110b7e60d60adab6f6a0cf562fb213e83915c0481728e49acfbcb62f4d6f0f8a459a22c84a56a28bb57b47f43287180d75564afd421c81e8733dc5f0c1ec6294", @nested={0x240, 0x72, [@generic="0ce96e57e3d5dd80cd2af340dafb1c85065c0f7245e5cc97b7440b40e524219fe324e8522c1f13e64a934b2237c38ef1d37c72b017df267790e980054821b92c12da2f701a610ef10d605e1facc961d594d297694d939c8c391a47c8c84ec7876a5f2e3aeae934171a198ac687ca584948b761f0a3ad380084e6d78ddd4c711f747ec76bf341aeba49ad0355438b07243267f8a22b2abdc581270a5f49c4f393a2086eb3d79f150639de0a29e6cd89a89d9d5a58926556e293d02216f5ce0f95", @generic="7ef143160866fc2035ecf5c97cab7bb49cd776b3453755b9bc515f40e6613aa9ce1e9f1f6d206d2ff434b1316448db9587d422da6522fa62d43902aafca2ae5074a593fb08b30d3e3e95584eb7fe1f7292374a92debd3fd46350e345c3fb", @typed={0x8, 0x26, @u32=0x3}, @generic="64e21be68d321f2f5a8843b1e876ad5802ebd1c668b96fcd7021d31d4c92fc1e446afbf3f0980226559dab553ad064b815727be4b2f9d9cc3c4ea8ce9b801e0b8862a330dc446ef27679cc58e7c9a61f6324caf61a031dfd537c2eb6fae2c1a14fb799fe4e06beca1f94cacb7495df3f8fbb3a30fb6737d2a9674c4f3fd200213db6511773bb254393492ef8273b7c975b07b65b6d67a4db292c5cac95f214c75782ce3f0ede64941cd2bacfea798126e2e1dfc87e974cd2efdcc3ca247a7b02f9ea2a8ab4637602a93ca9049281c8b9e80830c63f2e4af0a29704d3e8999151ca18005386b0115bdfbde7f4353628a4e6b1325bcb4d", @typed={0x4, 0x79}, @typed={0x4, 0x8c}, @typed={0xc, 0x75, @str='bdevlo\x00'}, @typed={0x8, 0x1e, @u32=0x9}, @typed={0x4, 0x63}]}, @generic="cf5049de865156556a1425e5c0ca7f909011478e8df3bd20", @generic="b5cf50ef2ab885c29b041b75bb799bd6d5e1d5417bade6d38277d8b30fd47c7e27b35f5cf8cb2b7eb37694d66b7411272488c398f370ecf030149d075a6b816bf03c01a7d2405c1e0fb5c27f85c44fbdf85a08a66728c101b93af9061288451feec280bc99ae421f27fe5bf19db48ddb83", @nested={0x17c, 0x8b, [@typed={0xc, 0x2d, @u64=0x3}, @typed={0x10, 0x92, @str='!}ppp0-#lo\x00'}, @typed={0x8, 0xa, @uid=r4}, @generic="5323bde6b6063857380ec3135347e748eb5eaf4ff31364878aad73ebced3c320834484c4b6a19d64341fbf189ae029ea6ac30b9f6e40f679d575811e45f77421c709e1e730a5ffab7e840aa50ea47ad5b4a97bfc9e384e796f1887dd053bfe4c201a71691906394a324c2c41504ec496de36def1048011ba794ec7e7524681eecb5e27b9b264ebf28f5cabf72fbba704ffea5d2a1b42bef0823eccca5b17361f72e0e2111ef23775ed15cc049de974e09463b2a38ecb5439a80c22c021a818af9016b394d0b6a884c6e6417c3c855f", @typed={0x4, 0x1b}, @typed={0x8, 0x64, @fd=r0}, @generic="56c85cfa5bc7bc534d78759a01cace9da8bccdb07de3bf5a7874dedd06f0350220ba0343e032f855c658cd28ca7beff4b7ff239f3994e540a15e803f7060cbd2ab7c68bbeb376378260588b87d401e0113a402a8c6c2590c5e90a1435904a886c1eae372605fb6a51bca2728f0268fba5d938e24cd4173ef81"]}]}, 0x550}, 0x1, 0x0, 0x0, 0x40000}, 0x20040030) ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r0, 0x80dc5521, &(0x7f0000000180)=""/226) perf_event_open(&(0x7f0000000100)={0x2000000005, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x1}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) write$nbd(r7, &(0x7f0000000880)={0x67446698, 0x1, 0x2, 0x1, 0x4, "d17d62f443536b052543c8659a207fdad6471da62e96737a5050f795d1798c2d4d23a67e35412705086d9ce5c85e03aaf4308cb1e714082c3e3a2d8e08dcc465478c1c4b38dd573be828f5bcacede9156c0d3ccfd59b327352d68c8fb39fabfbc365a2430fabbc245532d37fd2b0c3da8c1f4ec9b9"}, 0x85) write$P9_RFLUSH(r0, &(0x7f0000000000)={0x7}, 0x7) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x100) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r10, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") fcntl$setsig(r10, 0xa, 0x1) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r11, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) 01:41:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x0, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 600.970865][ T3398] IPVS: Unknown mcast interface: yam0 [ 600.998945][ T3401] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 01:41:26 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:41:26 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) ioctl$VIDIOC_PREPARE_BUF(r2, 0xc058565d, &(0x7f0000000040)={0x5, 0x8, 0x4, 0x40410404, {0x0, 0x7530}, {0x1, 0x2, 0x3f, 0x0, 0x7, 0x0, "a82d194b"}, 0x7, 0x3, @userptr=0x8, 0x4}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) [ 601.238492][ T3461] device nr0 entered promiscuous mode [ 601.276096][ T3524] netlink: 'syz-executor.0': attribute type 2 has an invalid length. 01:41:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x0, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x400, 0x200) ioctl$DRM_IOCTL_ADD_MAP(r3, 0xc0286415, &(0x7f0000000080)={0x0, 0x178c, 0x1, 0x0, &(0x7f0000ffe000/0x1000)=nil, 0x1}) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r5, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) [ 601.512484][ T3533] IPVS: Unknown mcast interface: yam0 01:41:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x0, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:26 executing program 0: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:41:26 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'yam0\x00'}, 0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000100)={0x0, r8, 0x15}, 0x10) r9 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r9, 0xc00c642d, &(0x7f0000000000)={0x0, 0x0, r12}) ioctl$DRM_IOCTL_RES_CTX(r13, 0xc0106426, &(0x7f00000000c0)={0x7, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}]}) 01:41:26 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r5, 0xc1105517, &(0x7f00000002c0)={{0x8, 0x0, 0xffffffc0, 0x10000, 'syz1\x00', 0x7}, 0x1, 0x100, 0xfcd0, r6, 0x1, 0x2, 'syz0\x00', &(0x7f0000000100)=['mime_type\x00'], 0xa, [], [0x3, 0x1, 0x101, 0x3]}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:41:26 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0xa}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r8}]]}}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r5, 0x8933, &(0x7f0000000000)={'vcan0\x00', r8}) connect$can_bcm(r2, &(0x7f0000000080)={0x1d, r9}, 0x10) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r11, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) 01:41:26 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 601.885913][ T3551] device nr0 entered promiscuous mode [ 601.895603][ T3555] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 601.910854][ T3556] IPVS: Unknown mcast interface: yam0 01:41:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") write(r7, &(0x7f0000000140)="358a3bdf389910eb2e34abf4ade406b9158c6549e403a419731c9e841fd2865c5bc7617a5523b721b9b5717cda8667bd37acbb88313c5a9bc5f809e445aba078d6d3bc85e864a42e419f72435603b70f2ff24da400d0492544ec6eb83f2d6b99e4b49ccce22a6705ffc3865cb6f50f91b0f22d119cfd18c1118c4dec96a8b6b1ef6368574bbb3f9973f15a05bafa440bc4534cca7b25c42c781933f4c39ea02c4a590f8ea4333862", 0xa8) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$TIPC_NL_MEDIA_SET(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x14, r3, 0x813, 0x4, 0x25dfdbfb, {0xb}}, 0x14}}, 0x0) 01:41:27 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r4, 0x400c6615, &(0x7f0000000040)={0x0, @aes128}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) [ 602.207160][ T3551] device nr0 entered promiscuous mode [ 602.391438][ T3731] IPVS: Unknown mcast interface: yam0 01:41:27 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:41:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") ioctl$sock_SIOCBRDELBR(r3, 0x89a1, &(0x7f0000000000)='ipddp0\x00') socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') 01:41:27 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCSPTLCK(r6, 0x40045431, &(0x7f0000000040)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:27 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x401, 0x4000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={r0, 0x0, &(0x7f00000002c0)="40054adc7724e27d876f441d072bf111375896060000000000000090e5586b443090b61799d68d803cd5f8b64ff3cd946b507daea1c09fc1fe6ce2f49fa3d424769af9468a559245753ff16b7db3d54506b50ec6081e3eb69035a9b808"}, 0xfffffffffffffd08) r1 = socket$kcm(0x10, 0xc, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCATTACH(r4, 0x4004743d, &(0x7f0000000000)=0x4) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 602.576117][ T3785] IPVS: Unknown mcast interface: yam0 [ 602.613563][ T3791] device nr0 entered promiscuous mode 01:41:27 executing program 0: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) [ 602.633650][ T3793] IPVS: Unknown mcast interface: yam0 01:41:27 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(0xffffffffffffffff, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:27 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) sendmsg$TIPC_NL_SOCK_GET(r3, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800041}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x5c, 0x0, 0x10, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_LINK={0x48, 0x4, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x400}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x100}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x5c}, 0x1, 0x0, 0x0, 0x8000}, 0x44000) socket$isdn_base(0x22, 0x3, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") ioctl$sock_proto_private(r4, 0x89e1, &(0x7f0000000080)="665eee85af9ba39cae23aa7a9eebd66ececc28ff8a1949a8a7e8479629755a602d10b1f8148fd80c8fcd4bd318589073559e1240a9b9bc572840f0df04950a1450f9a267bd018948b8c7c4efe24606366d3c08") setsockopt$RDS_CANCEL_SENT_TO(0xffffffffffffffff, 0x114, 0x1, &(0x7f0000000040)={0x2, 0x4e20, @multicast1}, 0x10) 01:41:27 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="130800000000000c00050008000100dcd96d83"], 0x20}}, 0x0) [ 603.018757][ T3911] IPVS: Unknown mcast interface: yam0 [ 603.030441][ T3911] IPVS: Unknown mcast interface: yam0 01:41:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r5, 0x84, 0x7, &(0x7f0000000240), &(0x7f00000002c0)=0x4) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r2, 0x400448c8, &(0x7f0000000140)={r7, r1, 0x1ad, 0xf5, &(0x7f0000000040)="92de54ad2b321cf85bd095818a05842091c61cd9c457715c30d48d6f603b5426768f49633703de8e0219ea34bd7540c7811b5be2022fe1565f6694871b95f2da2446487f2ce708b3ca9f8e6ac80cb18c9e52a86beb3794c6d1d3b68eeea67524a7c30cbea632ba85f2d02fa9a0df642fbaa672e9249e5f08a41471eb39bbecd37b943bcce55b14a1afd9475d076d20fba635cb7d025767447cf8ea325e88647ea282f20a6d90a44ec9da209119e06a082180a6659923c880a162d02afdaa5cf7d186c7e3711613e372fe324205c6cecb7839c1120a2f8983faa8eac4da4382204d1698d8424f98d2c0d181dbb749eb9336f6a76274", 0xf7, 0x1f, 0x8001, 0x1, 0x9, 0x2, 0x9, 'syz0\x00'}) r8 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet6_IPV6_IPSEC_POLICY(r7, 0x29, 0x22, &(0x7f0000000340)={{{@in=@empty, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000440)=0xe8) lstat(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet_IP_IPSEC_POLICY(r8, 0x0, 0x10, &(0x7f0000000540)={{{@in6=@local, @in6=@local, 0x4e24, 0x77, 0x4e21, 0x0, 0xa, 0x0, 0x80, 0x2e, r9, r10}, {0x8, 0x8, 0x7ff, 0x4, 0x3, 0x1ff, 0x80, 0xfffffffffffffffe}, {0x7, 0x0, 0x3f2, 0x2}, 0xff, 0x6e6bb0, 0x1, 0x0, 0x1, 0x2}, {{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4d4, 0x33}, 0x2, @in6=@rand_addr="2945643b0f1c2ee3cc30185232978a0d", 0x3504, 0x4, 0x2, 0xfe, 0x6, 0x3, 0x5}}, 0xe8) 01:41:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:28 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e005a6f900"/46, 0x2c}], 0x1}, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x8000, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f0000000340)={0x0, 0x0, {0x101, 0x7, 0x200d, 0xe, 0xc, 0x1, 0x5b2dbb47f10dada7, 0x3}}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/capi/capi20\x00', 0x0, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r1, 0x894b, &(0x7f0000000440)) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)}, 0x10001) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x0) ioctl$DRM_IOCTL_SET_MASTER(r4, 0x641e) munmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r6 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SNDRV_RAWMIDI_IOCTL_DROP(r6, 0x40045730, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="0063dd0700"], 0x90ad) setsockopt$inet_sctp_SCTP_EVENTS(r4, 0x84, 0xb, &(0x7f0000000480)={0x3, 0x8, 0x8, 0x9, 0x2, 0x9, 0x0, 0xad, 0x0, 0xd4, 0x3}, 0xb) [ 603.183190][ T4016] IPVS: Unknown mcast interface: yam0 [ 603.224030][ T4019] IPVS: Unknown mcast interface: yam0 [ 603.318033][ T4024] device nr0 entered promiscuous mode [ 603.480599][ T4024] device nr0 entered promiscuous mode 01:41:28 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(0xffffffffffffffff, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:41:28 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB="20000200", @ANYRES16=r4, @ANYBLOB="130800000000000000000b0000000c0005000800010075647010"], 0x20}}, 0x0) 01:41:28 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:28 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) timerfd_create(0x5, 0x800) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r8, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x6a, "0ff871d9d99dab4741fc98be57687f46d57336d1deae1d8db9a03f5c0d16a3750f1048e953865aabf911fa89086d67a2bc9db1681d82d176cf6c24c9929cc02321a5f9eacfde68685593f47210e4c539e651636d4853fee7d70730284e1533a7b6055df63f9fc12d7a3e"}, &(0x7f00000000c0)=0x72) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r5, 0x84, 0x22, &(0x7f0000000100)={0x9, 0x200, 0x8, 0x3, r9}, &(0x7f0000000140)=0x10) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r10 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r10, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:28 executing program 0: ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000000)={0x2, 0xfff, 0x0, 0x8, 0x200}) r0 = syz_usb_connect(0x0, 0x24, &(0x7f00000002c0)={{0x12, 0x1, 0x0, 0x73, 0xb6, 0xf0, 0x10, 0xccd, 0x10a3, 0xf453, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x77, 0xea, 0xcb}}]}}]}}, 0x0) syz_usb_control_io$printer(r0, 0x0, &(0x7f0000000380)={0x34, &(0x7f00000000c0)={0x0, 0x0, 0x6, "b9e822431488"}, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x4020aea5, &(0x7f0000000100)={0x0, 0x0, @ioapic}) ioctl$KVM_GET_NR_MMU_PAGES(r2, 0xae45, 0xffffffffffffffff) syz_usb_control_io(r0, 0x0, 0x0) syz_usb_control_io$printer(r0, 0x0, 0x0) 01:41:28 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x2ed, &(0x7f0000000540)=[{&(0x7f0000000440)=""/192}, {&(0x7f0000000500)=""/55}, {&(0x7f00000005c0)=""/137}, {&(0x7f0000000680)=""/102}]}, 0x10002) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r2, 0x4d) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x5, 0x9, 0x20, 0x4, 0x101, 0x3a3, 0xe3ed, {0x0, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x1, 0x7, 0x9, 0x80, 0xd8a}}, &(0x7f0000000380)=0xb0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000001b80)={r3, 0x1000, "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"}, &(0x7f00000003c0)=0x1008) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r5 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r6 = ioctl$KVM_CREATE_VM(r5, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r6, 0xae60) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r6, 0xae41, 0x0) getuid() ioctl$KVM_SET_IRQCHIP(r6, 0x4020aea5, &(0x7f0000000100)={0x0, 0x0, @ioapic}) ioctl$KVM_CREATE_PIT2(r6, 0x4040ae77, &(0x7f0000000000)={0x1}) [ 603.826870][ T4033] IPVS: Unknown mcast interface: yam0 [ 603.897603][ T4039] device nr0 entered promiscuous mode 01:41:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) [ 603.994953][ T4039] debugfs: Directory 'vcpu0' with parent '4039-8' already present! 01:41:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) syz_open_dev$vcsa(&(0x7f0000000240)='/dev/vcsa#\x00', 0x6, 0x10106) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) r5 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r6 = fcntl$dupfd(r1, 0x0, r5) r7 = request_key(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f0000000180)='user$nodev\x00', 0xfffffffffffffff9) keyctl$describe(0x6, r7, &(0x7f00000001c0)=""/87, 0x57) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$HIDIOCGRDESC(r6, 0x90044802, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="130800070900000000000b0000000c73e53dec9b9a5363e47010"], 0x20}}, 0x0) [ 604.142228][T12230] usb 1-1: new high-speed USB device number 26 using dummy_hcd [ 604.202014][ T4154] IPVS: Unknown mcast interface: yam0 [ 604.208542][ T4159] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 604.229746][ T4148] IPVS: Unknown mcast interface: yam0 01:41:29 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 604.278163][ T4039] device nr0 entered promiscuous mode [ 604.319982][ T4039] debugfs: Directory 'vcpu0' with parent '4199-8' already present! 01:41:29 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCGISO7816(r5, 0x80285442, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) move_mount(r9, &(0x7f0000000040)='./file0\x00', r10, &(0x7f00000000c0)='./file0\x00', 0xd760fbbafa9af97d) ftruncate(r7, 0x7f) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r13, 0xc0bc5351, &(0x7f0000000100)={0x4, 0x0, 'client1\x00', 0x2, "d87a1155882f85cb", "9938715c3ac1a7aa0b51506a5fe6a22256d93584a84163caf6114757f0bbc35c", 0x6c6, 0x3}) ioctl$TCSETS(r7, 0x5402, &(0x7f0000000200)={0xa0d7, 0xe7b5, 0x1f, 0x868, 0x0, 0x1f, 0x0, 0x2, 0xf7bc, 0xe4, 0x2, 0x80000000}) [ 604.382241][T12230] usb 1-1: Using ep0 maxpacket: 16 01:41:29 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xfffffffffffffffd) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$EVIOCSABS3F(r7, 0x401845ff, &(0x7f0000000000)={0x0, 0x6, 0x80000000, 0x81, 0x2, 0x2}) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r4, 0xddc03c3c58395857, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x2}, 0x0) [ 604.502577][T12230] usb 1-1: New USB device found, idVendor=0ccd, idProduct=10a3, bcdDevice=f4.53 [ 604.511758][T12230] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 604.534540][T12230] usb 1-1: config 0 descriptor?? [ 604.580258][ T4275] IPVS: Unknown mcast interface: yam0 [ 604.797930][T12230] usb 1-1: dvb_usb_v2: found a 'Terratec H7' in warm state [ 605.014856][ T4041] debugfs: Directory 'vcpu0' with parent '4041-5' already present! 01:41:30 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:30 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") ioctl(r2, 0x0, &(0x7f0000000200)="2acb1292709369c086cfd6") r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000180), 0x1) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2, 0x22) ioctl$sock_bt_hidp_HIDPCONNDEL(r5, 0x400448c9, &(0x7f0000000080)={{0x40, 0x6, 0x4, 0x7, 0x1, 0x6}, 0x4}) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB='\t\x00\b\x00', @ANYRES16=r6, @ANYBLOB="130800000000000000000b0000000c0005000800010075647010"], 0x20}}, 0x0) r7 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r8 = ioctl$KVM_CREATE_VM(r7, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r8, 0xae60) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r8, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r8, 0x4020aea5, &(0x7f0000000100)={0x0, 0x0, @ioapic}) ioctl$KVM_IRQ_LINE_STATUS(r8, 0xc008ae67, &(0x7f00000001c0)={0x742, 0x9}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$TUNGETDEVNETNS(r11, 0x54e3, 0x0) 01:41:30 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:41:30 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) [ 605.274271][ T4413] debugfs: Directory 'vcpu0' with parent '4413-9' already present! [ 605.325702][ T4422] device nr0 entered promiscuous mode [ 605.482068][T12230] usb write operation failed. (-71) [ 605.492922][T12230] usb 1-1: dvb_usb_v2: will pass the complete MPEG2 transport stream to the software demuxer [ 605.503968][T12230] dvbdev: DVB: registering new adapter (Terratec H7) [ 605.510789][T12230] usb 1-1: media controller created [ 605.554712][ T4422] device nr0 entered promiscuous mode [ 605.569640][T12230] usb read operation failed. (-71) [ 605.592033][T12230] usb write operation failed. (-71) [ 605.601257][T12230] dvb_usb_az6007: probe of 1-1:0.0 failed with error -5 [ 605.613844][T12230] usb 1-1: USB disconnect, device number 26 [ 606.291879][T12230] usb 1-1: new high-speed USB device number 27 using dummy_hcd [ 606.386230][ T4544] debugfs: Directory 'vcpu0' with parent '4545-5' already present! [ 606.531788][T12230] usb 1-1: Using ep0 maxpacket: 16 01:41:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000000)='fuse\x00', 0x0, &(0x7f00000005c0)={{'fd', 0x3d, r1}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}, 0x2c, {[{@default_permissions='default_permissions'}]}}) lsetxattr$trusted_overlay_redirect(&(0x7f0000000100)='./file0/file0/file0\x00', &(0x7f0000000140)='trusted.overlay.redirect\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x3) lremovexattr(&(0x7f0000000040)='./file0/file0/file0\x00', 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0xa) r2 = socket$inet6(0xa, 0x2, 0x0) dup3(r2, r1, 0x0) 01:41:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0xa1b15cb2a7df0cc5, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000080)) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB="d0800000", @ANYRESDEC=r5, @ANYBLOB="130800000000000000000bbe9aa1d9d8788624821b8d9b0000000c0005000800010075647010"], 0x3}}, 0x0) 01:41:32 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="1e6386dd07"], 0x90ad) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008107e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) r4 = socket(0x11, 0x800, 0x6f) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=ANY=[@ANYBLOB="400000001000050700"/20, @ANYRES32=0x0, @ANYBLOB="0000000000010073697400144531eeacfeea17753d7a00020008000a0000000000080002", @ANYRES32=r7], 0x40}}, 0x0) bind$packet(r4, &(0x7f0000000100)={0x11, 0x5, r7, 0x1, 0x4, 0x6, @random="1aae6a812c17"}, 0x14) signalfd(r3, &(0x7f0000000000)={0x5}, 0x8) 01:41:32 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:41:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_retries\x00', 0x2, 0x0) [ 607.082429][T12230] usb 1-1: device descriptor read/all, error -71 [ 607.142218][ T4558] IPVS: Unknown mcast interface: yam0 [ 607.149491][ T4554] device nr0 entered promiscuous mode [ 607.175856][ T4554] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 01:41:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:32 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) epoll_create(0xbc4f) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r4, @ANYBLOB="13080000000000000000200000000c0005cb7b7d7d812b0008000100fafd7010"], 0x20}}, 0x0) [ 607.325034][ T4661] IPVS: Unknown mcast interface: yam0 01:41:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x5, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) [ 607.407249][ T4554] device nr0 entered promiscuous mode 01:41:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 607.456829][ T4684] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.4'. 01:41:32 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x60, 0x0, 0x0, 0x0, 0x0, 0x7b, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x8000, 0x7, 0x4, 0x4, 0x0, 0x0, 0x1}, 0x0, 0x9, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) fsetxattr$security_ima(r0, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="0463"], 0x2, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x8000002}, 0x1c) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) sendto$inet6(r2, 0x0, 0x0, 0x20000001, &(0x7f0000000040)={0xa, 0x2}, 0x1c) socketpair$unix(0x1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0x80084504, 0x0) splice(r2, 0x0, r1, 0x0, 0x1000000000000003, 0x0) sendmsg$NBD_CMD_RECONFIGURE(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$ARPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x60, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCGDEV(r1, 0x80045432, &(0x7f0000000000)) getpgrp(0xffffffffffffffff) ioctl$RNDGETENTCNT(0xffffffffffffffff, 0x80045200, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$ASHMEM_SET_SIZE(0xffffffffffffffff, 0x40087703, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) sendto$packet(r2, &(0x7f0000000340), 0xfffffffffffffd4d, 0x57, 0x0, 0x0) [ 607.696529][ T4784] IPVS: Unknown mcast interface: yam0 [ 607.717808][ T4726] IPVS: Unknown mcast interface: yam0 01:41:32 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:32 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TUNGETDEVNETNS(r2, 0x54e3, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) fsconfig$FSCONFIG_CMD_CREATE(r5, 0x6, 0x0, 0x0, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 607.988522][ T4815] IPVS: Unknown mcast interface: yam0 01:41:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:33 executing program 2: socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:33 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCSERGETLSR(r3, 0x5459, &(0x7f0000000040)) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vga_arbiter\x00', 0x287e383908853a90, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r4, 0x84, 0x7, &(0x7f00000000c0), &(0x7f0000000100)=0x4) sendmsg$kcm(r0, &(0x7f0000001bc0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001b00)="23000000550081aee4f80b00000f00fe078bc30800000000fd670c87594d0063dac37b", 0x23}], 0x1}, 0x0) [ 608.173919][ T4819] device nr0 entered promiscuous mode 01:41:33 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x0, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:41:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 608.445066][ T4825] IPVS: Unknown mcast interface: yam0 [ 608.451399][ T4830] netlink: 11 bytes leftover after parsing attributes in process `syz-executor.0'. [ 608.460935][ T4830] PF_BRIDGE: br_mdb_parse() with invalid ifindex [ 608.475688][ T4825] IPVS: Unknown mcast interface: yam0 [ 608.516239][ T4819] device nr0 entered promiscuous mode 01:41:33 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:33 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r2 = fcntl$dupfd(r0, 0x406, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$KDGKBENT(r3, 0x4b46, &(0x7f00000000c0)={0xff, 0x20, 0x2}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) sigaltstack(&(0x7f0000ff6000/0x8000)=nil, &(0x7f0000000040)) 01:41:33 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x80000, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x2, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCGMRU(0xffffffffffffffff, 0x80047453, &(0x7f0000000040)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x9fc, 0x0) r1 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r1, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {0xffffffffffffffff, 0xeb, "ed6121", "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"}}, 0x110) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000d80), 0x4) ioctl$UI_DEV_DESTROY(r0, 0x5502) ioctl$UI_DEV_SETUP(0xffffffffffffffff, 0x5501, 0x0) arch_prctl$ARCH_GET_CPUID(0x1011) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x8, 0x10, r2, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) unshare(0x40000000) 01:41:33 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f0000000300)={0x0, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e22, @remote}, {0x2, 0x4e23, @multicast2}, 0x100, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)='veth0_to_hsr\x00', 0x4, 0x400, 0x40}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_G_FRAME_INTERVAL(r8, 0xc0305615, &(0x7f0000000380)={0x0, {0xdb, 0x3ff}}) sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r5, @ANYBLOB="1308b52765246d15f2e43369f1ce72e6f100000000000b000000"], 0x20}}, 0x0) r9 = socket(0x10, 0x3, 0x0) r10 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r9, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2c, r10, 0x401, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_DEL_SERVICE(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x28201084}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)={0x54, r10, 0x300, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@multicast2}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x200}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x7fff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}]}, 0x54}, 0x1, 0x0, 0x0, 0x24004001}, 0x80) [ 608.864174][ T4856] IPVS: ftp: loaded support on port[0] = 21 [ 608.933674][ T4857] IPVS: Unknown mcast interface: yam0 01:41:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:34 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x800000, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x80402463ad87070c, 0x3, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:34 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x7, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000000)=""/14, 0xe}], 0x1d6, 0x0, 0x240}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) write$cgroup_subtree(r5, &(0x7f00000002c0), 0x0) [ 609.232971][ T4856] IPVS: ftp: loaded support on port[0] = 21 [ 609.276966][ T4965] device nr0 entered promiscuous mode 01:41:34 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xffff, 0x40) io_uring_enter(r2, 0x6, 0xfffffffd, 0x2, &(0x7f0000000180)={0x2}, 0x8) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r5, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) clock_gettime(0x6, &(0x7f0000000000)) 01:41:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:34 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x2a, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000040)={0x3, 'veth1_to_team\x00', 0x4}, 0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket$inet(0x2, 0x4000000805, 0x0) r8 = socket$inet_sctp(0x2, 0x5, 0x84) r9 = dup3(r7, r8, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r8, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r9, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r8, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r9, 0x84, 0x66, &(0x7f000059aff8)={r10}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f00000000c0)={r10, 0xfffffff8}, &(0x7f0000000100)=0x8) r12 = socket$inet(0x2, 0x4000000805, 0x0) r13 = socket$inet_sctp(0x2, 0x5, 0x84) r14 = dup3(r12, r13, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r13, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r14, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r13, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r14, 0x84, 0x66, &(0x7f000059aff8)={r15}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r3, 0x84, 0xd, &(0x7f0000000140)=@assoc_id=r15, &(0x7f0000000180)=0x4) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0xe, &(0x7f00000001c0)={r11, 0x0, 0x867, 0x9, 0x4, 0x1ff, 0x401, 0xb93, {r16, @in={{0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0xd}}}, 0x7, 0xfffffffd, 0x4000, 0x8, 0x6}}, &(0x7f00000002c0)=0xb0) r17 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x200, 0x0) ioctl$BLKGETSIZE64(r17, 0x80081272, &(0x7f0000000080)) 01:41:34 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, 0x0) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:41:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000180)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="182b00009f7e6359711ea5be8b134325954fb0266006000000000052b5a7"], 0x1) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x113000}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000000000/0x18000)=nil, 0x0, 0x7b53, 0x0, 0x0, 0xfffffffffffffffc) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 609.682373][ T4965] device nr0 entered promiscuous mode 01:41:34 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r6, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:35 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0xde, &(0x7f0000000a40), 0x10000000000000eb}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_NODELAY(r7, 0x84, 0x3, &(0x7f0000000100), &(0x7f00000002c0)=0x4) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000440)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A', r4}, 0x10) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r8 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\a'], 0x90ad) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f0000000040)={0x1, 0x4, 0xd000, 0x1000, &(0x7f0000ffe000/0x1000)=nil}) 01:41:35 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$NBD_SET_BLKSIZE(0xffffffffffffffff, 0xab01, 0x8) fcntl$getownex(r1, 0x10, &(0x7f0000000040)={0x0, 0x0}) ptrace$peekuser(0x3, r3, 0xffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$SG_SET_COMMAND_Q(r1, 0x2271, &(0x7f0000000240)) semget(0x1, 0x4, 0x40) r4 = semget$private(0x0, 0x2000000010a, 0x0) semop(r4, &(0x7f0000000000)=[{0x0, 0x6}, {}], 0x2) semctl$GETALL(r4, 0x0, 0xd, 0x0) semctl$IPC_INFO(r4, 0x4, 0x3, &(0x7f0000000180)=""/182) r5 = semget$private(0x0, 0x1, 0x102) semctl$GETVAL(r5, 0x4, 0xc, &(0x7f00000003c0)=""/204) r6 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r6}, &(0x7f0000044000)) setpriority(0x0, r6, 0x8) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r7, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:35 executing program 0: syz_usb_connect(0x3, 0x24, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0xa9, 0xe5, 0x14, 0x8, 0x2040, 0xb124, 0xb12f, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0xfb, 0x0, 0x5, [{{0x9, 0x4, 0xb4, 0x0, 0x0, 0x5b, 0x34, 0x22}}]}}]}}, 0x0) 01:41:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 610.354549][ T5113] device nr0 entered promiscuous mode [ 610.578158][ T5121] IPVS: Unknown mcast interface: yam0 [ 610.613905][ T31] usb 1-1: new high-speed USB device number 29 using dummy_hcd 01:41:35 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x0) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 610.638315][ T5113] device nr0 entered promiscuous mode [ 610.861927][ T31] usb 1-1: Using ep0 maxpacket: 8 01:41:36 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) syz_open_dev$sndtimer(&(0x7f0000000000)='/dev/snd/timer\x00', 0x0, 0x480) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 01:41:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x0, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 610.994640][ T31] usb 1-1: config 0 has an invalid interface number: 180 but max is 0 [ 611.003073][ T31] usb 1-1: config 0 has no interface number 0 [ 611.009253][ T31] usb 1-1: New USB device found, idVendor=2040, idProduct=b124, bcdDevice=b1.2f [ 611.018469][ T31] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 01:41:36 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, 0x0) read(r0, &(0x7f0000000100)=""/71, 0x47) [ 611.110101][ T5139] IPVS: Unknown mcast interface: yam0 [ 611.174639][ T5143] device nr0 entered promiscuous mode [ 611.186360][ T31] usb 1-1: config 0 descriptor?? 01:41:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x0, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 611.482268][ T31] usb 1-1: string descriptor 0 read error: -71 [ 611.511068][ T31] usb 1-1: USB disconnect, device number 29 01:41:36 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000040)={0x100000001, 0x1f, 0x100000001}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r5, 0xae60) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r5, 0x4020aea5, &(0x7f0000000100)={0x0, 0x0, @ioapic}) ioctl$KVM_ASSIGN_DEV_IRQ(r5, 0x4040ae70, &(0x7f0000000080)={0x10000, 0x10000, 0xfffff800, 0x400}) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) [ 611.724776][ T5149] device nr0 entered promiscuous mode 01:41:36 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0x0, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 611.778938][ T5163] debugfs: Directory 'vcpu0' with parent '5163-8' already present! [ 612.009710][ T5163] IPVS: Unknown mcast interface: yam0 01:41:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="00de1f0000616a7efc4b322eadf388853b9c3374f09e1a0f869ef277059688dbf952d4ff5e25e0b6fb96b873c413d4ebf46131447640bf94f692fb9d62a9fe2da0a0cf8f2bf82eecb6a77403cd9f5af4158ec9e9f0786ffbf3c6ec0edbd7114d6dddcc096c1e4c8b04920c48bc33ff16510000000000000000e6"], 0x90ad) 01:41:37 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 612.107820][ T5171] debugfs: Directory 'vcpu0' with parent '5163-8' already present! [ 612.132177][ T5170] IPVS: Unknown mcast interface: yam0 [ 612.295291][ T31] usb 1-1: new high-speed USB device number 30 using dummy_hcd [ 612.304397][ T5178] device nr0 entered promiscuous mode 01:41:37 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, 0x0) read(r0, &(0x7f0000000100)=""/71, 0x47) [ 612.581932][ T31] usb 1-1: Using ep0 maxpacket: 8 [ 612.724134][ T31] usb 1-1: config 0 has an invalid interface number: 180 but max is 0 [ 612.732860][ T31] usb 1-1: config 0 has no interface number 0 [ 612.739076][ T31] usb 1-1: New USB device found, idVendor=2040, idProduct=b124, bcdDevice=b1.2f [ 612.748468][ T31] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 612.779265][ T31] usb 1-1: config 0 descriptor?? [ 613.072092][ T31] usb 1-1: string descriptor 0 read error: -71 [ 613.091219][ T31] usb 1-1: USB disconnect, device number 30 01:41:38 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:38 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) move_pages(0x0, 0x5, &(0x7f0000000000)=[&(0x7f0000001000/0x4000)=nil, &(0x7f000000d000/0x2000)=nil, &(0x7f000000d000/0x4000)=nil, &(0x7f0000006000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil], 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(0xffffffffffffffff, &(0x7f0000000180)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r5}}, 0x18) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000400)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f00000001c0)={0x0, 0x119000}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000000000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r4, 0xae9a) ioctl$KVM_RUN(r4, 0xae80, 0x0) 01:41:38 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r5 = fcntl$dupfd(r3, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_S_HW_FREQ_SEEK(r5, 0x40305652, &(0x7f0000000240)={0x75cc, 0x3, 0x6, 0x44b, 0x4, 0x7dee31ed, 0xffff0000}) r6 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x80000, 0x0) ioctl$IMHOLD_L1(r6, 0x80044948, &(0x7f0000000140)) getsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x1e, &(0x7f0000000080), &(0x7f00000000c0)=0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$VIDIOC_QUERYSTD(0xffffffffffffffff, 0x8008563f, &(0x7f0000000400)=0x0) ioctl$VIDIOC_S_STD(r9, 0x40085618, &(0x7f0000000440)=r10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) r14 = syz_open_dev$vivid(&(0x7f0000000340)='/dev/video#\x00', 0x1, 0x2) ioctl$VIDIOC_SUBDEV_S_FMT(r14, 0xc0585605, &(0x7f0000000380)={0x2, 0x0, {0x7f, 0x0, 0x3015, 0x6, 0xb, 0x2, 0x0, 0x2}}) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) bind$vsock_dgram(r13, &(0x7f0000000040)={0x28, 0x0, 0xffffd8ef}, 0x10) r15 = syz_open_dev$sndpcmp(&(0x7f0000000200)='/dev/snd/pcmC#D#p\x00', 0x8, 0x4001) fsconfig$FSCONFIG_SET_PATH(r5, 0x3, &(0x7f0000000180)='):bdev\x00', &(0x7f00000001c0)='./file0\x00', r15) fallocate(r0, 0x10, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) io_uring_setup(0x54, &(0x7f00000002c0)={0x0, 0x0, 0x8, 0x1, 0x26}) 01:41:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = socket$netlink(0x10, 0x3, 0xf) close(r3) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/qat_adf_ctl\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x80000001}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x1b, &(0x7f0000000300)={r5, 0xa5, "1ad1b0007b5e4accd533d62c6bec485ec3f4a69a99b64aa604331557fa86ca1b5a081dc8ef98f27c991579d5294bc78bfe14ab4643e22edb559c261ff3d4252713a73da9510d9485d169e5d1d695673136f33902a79294c85ec1bddda0e75759c7697b3366adf8f9b11cacf6a132450228f0707b87666d8cf0bafa8868d72b565cf9c3b1f0eb2a394772f00d50cff3188982e27a9821652b57760dc2639f89ee556562918a"}, &(0x7f00000003c0)=0xad) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 613.520845][ T5199] device nr0 entered promiscuous mode 01:41:38 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x0, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:38 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)) read(r0, &(0x7f0000000100)=""/71, 0x47) [ 613.985848][ T5199] device nr0 entered promiscuous mode 01:41:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) r4 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x5, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(0xffffffffffffffff, 0xae04) write$FUSE_NOTIFY_INVAL_INODE(r4, &(0x7f0000000080)={0x28, 0x2, 0x0, {0x3, 0x6, 0x6}}, 0x28) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_QUERY_BPF(r10, 0xc008240a, &(0x7f0000000240)={0x5, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}) r11 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r11, &(0x7f0000000000)={0xa, 0x4ea0, 0x9}, 0x1c) listen(r11, 0x4d) r12 = socket$inet6(0xa, 0x400000000001, 0x0) close(r12) r13 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r13, 0x84, 0x1d, &(0x7f0000000200)={0x1, [0x0]}, &(0x7f0000a8a000)) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r12, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value, 0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r11, 0x84, 0x66, &(0x7f00000000c0)={0x0, 0xfff}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x1f, &(0x7f0000000140)={r14, @in6={{0xa, 0x4e23, 0x9, @mcast1, 0x4}}, 0x9, 0x9}, 0x90) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'\x00', 0x1000}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) r6 = syz_open_dev$mice(&(0x7f0000000300)='/dev/input/mice\x00', 0x0, 0x10000) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) splice(r6, &(0x7f0000000340), r7, &(0x7f0000000380), 0x100000001, 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VHOST_RESET_OWNER(r10, 0xaf02, 0x0) r11 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r12 = ioctl$KVM_CREATE_VM(r11, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r12, 0xae60) ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r12, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r12, 0x4020aea5, &(0x7f0000000100)={0x0, 0x0, @ioapic={0x0, 0x0, 0x0, 0x0, 0x0, [{0x0, 0x80}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x6}, {0x0, 0x6}, {}, {}, {}, {0x0, 0x0, 0x0, [], 0xfe}, {}, {0x0, 0xff}]}}) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$KVM_HYPERV_EVENTFD(r12, 0x4018aebd, &(0x7f00000002c0)={0x0, r13, 0x1}) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x90ad) 01:41:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:39 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xf, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00', 0x2}, 0x18) r4 = getpgid(0xffffffffffffffff) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(0xffffffffffffffff, 0xc1105517, &(0x7f00000000c0)={{0x9, 0x0, 0xfffffa38, 0x8, '\x00', 0xffffffff}, 0x3, 0x30, 0x81, r4, 0x9, 0x8, 'syz1\x00', &(0x7f0000000040)=['selinux.\x00', '^\\\x00', 'yam0\x00', 'yam0\x00', 'yam0\x00', 'yam0\x00', 'yam0\x00', 'useruserproc/:]vboxnet0&\x00', 'security*selinuxmime_type@+\x00'], 0x5a, [], [0x7d, 0x5, 0x8, 0x4]}) 01:41:39 executing program 0: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='cpuacct.usage_all\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x70, 0x1f, 0x8000000000000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETLINK(r0, 0x400454cd, 0xc6f4d3deab954f28) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xab1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000680)='.+lgroup/\r\x85\xdc\xb0|\x03>@H\x03%\xde\x00\x04\x00', 0x200002, 0x0) openat$cgroup(r1, &(0x7f0000000400)='syz1\x00', 0x200002, 0x0) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f0000000300)=r0) r2 = openat$cgroup_ro(r1, &(0x7f0000000840)='cpuset.effective_mems\x00o\x90\x99\x05\x05\x98\xd4t\xbf\x02\xfd\x89z\x1b\xba\x9a\xc1\x9b/\xeb\x96-\x87\x98\x89eo\xd6=\xe5Z\xc6\xe9\x83G\xdc\xc9v>\xcd\xe1\x1ca\xe5f\xd4Q\xe7\x84w3\xfdh\x05\x06\xc3\xe7\xcd\v\xe9\'\xc7-+\xb8\xa4\xac\xe0\x17\xf3\x15\xe0\xfb\x8e#\x1b|\xde\x0f\x94\x1c\x18\x15^\xb0\n\xf0\x04\xbe\xbb\x8c\xd6!\xe8_\xcaK5N<\xe7\xf4\x1dQ\x0e_\xb9\xa5\x01\x8c\x99\x010\x13\xfd\b\x01\xb9v\xca\x87\xf0\xc4*\x06P\xd4\"\xdf\x81\xfa\x83i^\xe3\x8b\xf5\xd4+5h\xcbv\x00 \t\x85\xeb\tf\xfc\x81#\xefr(\x8dX\x962N/\x93', 0x0, 0x0) sendmsg$kcm(r2, &(0x7f0000000340)={&(0x7f00000006c0)=@pppoe={0x18, 0x0, {0x2, @random="1250c8010805", 'batadv0\x00'}}, 0x80, 0x0}, 0x5000040) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000080)={'tunl0\x00'}) r3 = openat$cgroup_ro(r0, &(0x7f00000000c0)='/\x02roup.stap\x00\bJ\x96\xec\xf6\xb5\xd2\x9a7\\\xcd\xf0t(\xcb\xf6>V\x92\xe3ra8\r\x8a\xfc\xefX\x1bw\x8c\xd6B\xc7\x1b\x97t\xa8d\xa58\xba\x91\x80\xe0Z\xd4\x86%\xc9\xbeQ~<\xc53\x10:\xae\xdd\xb4s\x7f\x8b\xe9\xeae\x1f\b\xe4\xee\x01B', 0x2761, 0x0) write$cgroup_type(r3, &(0x7f0000000440)='threaded\x00', 0x38b) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000480)=ANY=[]) sendmsg$tipc(r2, &(0x7f0000000540)={&(0x7f0000000380)=@nameseq={0x1e, 0x1, 0x2, {0x2, 0x0, 0x4}}, 0x10, &(0x7f0000000480)=[{&(0x7f00000003c0)="2cbf7274aa17ff5e416616b6bdf5674100a48a29a22c380acd24c0ab3ad94ecda7db6ae3bfd99bc9082f4e0805c9792c", 0x30}], 0x1, &(0x7f00000004c0)="2a1e02f99028d82f3b029eac149b4e773b6cc94e017d22af0e5c381ca7a161c773084b3298df176f0c3e91173b843ed1533b1dfb78aea41e3ba7afdbe04fb421f5b6a0990179312ccb9cce86d5825d789eae327ac66bc64021fc20d57d616035b65544bce9cad721fd1053afa90f1367ded57043", 0x74, 0x8000}, 0x8000) socketpair(0x15, 0x3, 0x1, &(0x7f0000000140)) gettid() perf_event_open(&(0x7f0000000000)={0x0, 0x70, 0x0, 0xccd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000580), 0x0) socket$kcm(0x2b, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000640)={'gretap0\x00', 0x8000}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TIOCGRS485(r7, 0x542e, &(0x7f00000005c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000740)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89f1, &(0x7f0000000580)='ip6_vti0\x00') 01:41:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f00000000c0)={0x0, 0x7}, &(0x7f0000000100)=0x8) lsetxattr$security_evm(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)='security.evm\x00', &(0x7f00000007c0)=@md5={0x1, "a270fa8eeae231b9a77c53d10a8f0349"}, 0x11, 0x0) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f00000002c0)={r1, 0x2}, &(0x7f0000000300)=0x8) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x59, 0xdf, 0x84, 0x40, 0xc45, 0x613e, 0x7c88, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x47, 0x89}}]}}]}}, 0x0) semget(0x0, 0x0, 0x844) syz_usb_control_io$hid(r3, 0x0, 0x0) syz_usb_control_io$cdc_ncm(r3, &(0x7f00000003c0)={0x14, &(0x7f0000000340)={0x40, 0x22, 0x12, {0x12, 0xe, "ef57a6392add187e0bd0ece798936bbf"}}, &(0x7f0000000380)={0x0, 0x3, 0x1a, {0x1a}}}, &(0x7f0000000680)={0x44, &(0x7f0000000440)={0x20, 0x9, 0x8, "b48879f2c1b12d56"}, &(0x7f0000000480)={0x0, 0xa, 0x1, 0x40}, &(0x7f00000004c0)={0x0, 0x8, 0x1, 0x8f}, &(0x7f0000000500)={0x20, 0x80, 0x1c, {0x2, 0x8, 0x2, 0x5, 0x100, 0xff, 0x101, 0x9, 0x6, 0x5, 0x5, 0x9}}, &(0x7f0000000540)={0x20, 0x85, 0x4, 0x7ff}, &(0x7f00000005c0)={0x20, 0x83, 0x2}, &(0x7f0000000600)={0x20, 0x87, 0x2, 0x7f}, &(0x7f0000000640)={0x20, 0x89, 0x2}}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000700)={0x0, 0x0}) prctl$PR_SET_PTRACER(0x59616d61, r5) write$cgroup_subtree(r2, &(0x7f0000000000)=ANY=[@ANYBLOB="0d36fdbeb06211e7f77a3986dd17"], 0x90ad) 01:41:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(0xffffffffffffffff, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:39 executing program 2: r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x9, 0x109403) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f00000000c0)=0x30) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:40 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_emit_ethernet(0x4a, &(0x7f0000000580)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0xffffff89, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd]}, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") recvmmsg(r3, &(0x7f0000000040), 0x0, 0xc0, &(0x7f0000000080)={0x77359400}) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r4, 0x4008af23, &(0x7f0000000000)={0x3, 0x800}) [ 614.916909][ T5252] IPVS: Unknown mcast interface: yam0 01:41:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 615.084165][T12179] usb 5-1: new high-speed USB device number 6 using dummy_hcd 01:41:40 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:41:40 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r4, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x4, 0x4, 0x4, 0x3}, 0x3c) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r5, 0x28, &(0x7f00000000c0)={0x0, 0x0}}, 0x10) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000003c0)={r6}, 0xc) bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000000)={r6, 0xffffffff, 0x34}, 0xc) 01:41:40 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt(r2, 0x1, 0x7fff, &(0x7f0000000080)=""/51, &(0x7f00000000c0)=0x33) r3 = fcntl$dupfd(r1, 0x0, r0) r4 = syz_usb_connect$hid(0x0, 0x36, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000040, 0x1e7d, 0x3232, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r4, 0x0, 0x0) syz_usb_control_io(r4, &(0x7f00000001c0)={0x2c, &(0x7f0000000100)=ANY=[@ANYBLOB='\x00\x00<'], 0x0, 0x0, 0x0, 0x0}, 0x0) syz_usb_ep_write(r4, 0x1a, 0xae, &(0x7f00000002c0)="62c694b774376bd084b3a22ac25d83f1a1fdde07fbf2fc5350324f2ad0ebd21551525ab5366a62e60dddc54517e044c34196d96c72e97ddaa9cdf3edb84e72feb5b3f212153cfba69cadaefa22e03844cd0b8fdf8a125739852844d1de148cbc79d0394d0d27e290ea6f73a2751115c5895683a13ddc135115ad26690da50d16f5850fa6775cab432fcd9beda0b62c684aeaef341b342d87df43c32ee00a08d4afb697c11c048e05523e99d3e441") ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:40 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$KVM_SET_DEVICE_ATTR(r7, 0x4018aee1, &(0x7f00000001c0)={0x0, 0x8, 0x101, &(0x7f0000000000)=0x8}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e22, 0xfffffbff, @local, 0x2}, @in6={0xa, 0x4e21, 0x6, @empty, 0x40}, @in={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, @in6={0xa, 0x4e21, 0x9, @mcast1, 0x2}, @in={0x2, 0x4e20, @broadcast}], 0x84) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@newlink={0x4c, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_LINKINFO={0x2c, 0x12, @ip6gretap={{0x10, 0x1, 'ip6gretap\x00'}, {0x18, 0x2, [@IFLA_GRE_REMOTE={0x14, 0x7, @loopback={0xff00000000000000}}]}}}]}, 0x4c}}, 0x0) 01:41:40 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, 0x0, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:40 executing program 0: pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$inet(0x10, 0x3, 0xc) sendmsg(0xffffffffffffffff, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000000)="2400000002031f001cfffd946fa2830020200a80090001", 0x17}], 0x1}, 0x0) splice(r0, 0x0, r4, 0x0, 0x420000a77, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYRES64=r3, @ANYBLOB="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", @ANYRESHEX, @ANYPTR64=&(0x7f0000000140)=ANY=[@ANYRES64=r5, @ANYPTR=&(0x7f0000000080)=ANY=[@ANYRES64=r6]]], 0xffffffffffffff89) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r9, 0x84, 0x21, &(0x7f0000000040)=0x273, 0x4) [ 615.501965][T12179] usb 5-1: New USB device found, idVendor=0c45, idProduct=613e, bcdDevice=7c.88 [ 615.512273][T12179] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 615.565609][T12179] usb 5-1: config 0 descriptor?? [ 615.592553][T12230] usb 3-1: new high-speed USB device number 25 using dummy_hcd [ 615.606609][T12179] gspca_main: sonixj-2.14.0 probing 0c45:613e [ 615.952195][T12230] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 615.963377][T12230] usb 3-1: New USB device found, idVendor=1e7d, idProduct=3232, bcdDevice= 0.40 [ 615.972811][T12230] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 615.988725][T12230] usb 3-1: config 0 descriptor?? [ 616.224103][ T5244] device nr0 entered promiscuous mode [ 616.342874][T12179] gspca_sonixj: reg_w1 err -71 [ 616.347844][T12179] sonixj: probe of 5-1:0.0 failed with error -71 [ 616.357048][T12179] usb 5-1: USB disconnect, device number 6 [ 616.476116][T12230] ryos 0003:1E7D:3232.0004: unknown main item tag 0x0 [ 616.494665][T12230] ryos 0003:1E7D:3232.0004: hidraw0: USB HID v0.00 Device [HID 1e7d:3232] on usb-dummy_hcd.2-1/input0 [ 616.675722][ T5267] IPVS: Unknown mcast interface: yam0 [ 616.683367][T12230] usb 3-1: USB disconnect, device number 25 [ 617.111885][T12179] usb 5-1: new high-speed USB device number 7 using dummy_hcd [ 617.471969][T12179] usb 5-1: New USB device found, idVendor=0c45, idProduct=613e, bcdDevice=7c.88 [ 617.481063][T12179] usb 5-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 617.481838][T12230] usb 3-1: new high-speed USB device number 26 using dummy_hcd [ 617.493497][T12179] usb 5-1: config 0 descriptor?? [ 617.547157][T12179] gspca_main: sonixj-2.14.0 probing 0c45:613e [ 617.852308][T12230] usb 3-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 617.854262][T12179] gspca_sonixj: reg_r err -71 [ 617.863430][T12230] usb 3-1: New USB device found, idVendor=1e7d, idProduct=3232, bcdDevice= 0.40 [ 617.868167][T12179] sonixj: probe of 5-1:0.0 failed with error -71 [ 617.877195][T12230] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 617.886714][T12230] usb 3-1: config 0 descriptor?? [ 617.897136][T12179] usb 5-1: USB disconnect, device number 7 01:41:43 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/audio\x00', 0x0, 0x0) recvmsg$kcm(r0, &(0x7f0000000100)={&(0x7f00000002c0)=@xdp, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/101, 0x65}, {&(0x7f0000001b80)=""/4096, 0x1000}, {&(0x7f0000000440)=""/255, 0xff}, {&(0x7f00000005c0)=""/92, 0x5c}, {&(0x7f0000000640)=""/216, 0xd8}, {&(0x7f0000000740)=""/106, 0x6a}, {&(0x7f00000007c0)=""/223, 0xdf}], 0x7, &(0x7f0000000940)=""/80, 0x50}, 0x10000) ioctl$int_in(r0, 0x80000000005016, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = socket$kcm(0x10, 0x4000000002, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$KVM_TPR_ACCESS_REPORTING(r4, 0xc028ae92, &(0x7f0000000000)={0x2}) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f00000009c0)=ANY=[@ANYBLOB="006386dd0793468be3ba015e077e00a6bafe753c79faf5a5e0130cc2192bcf582d4f46bdaeee3076ace9917885c7338355ce5602e75213f446b288d7cb713192d652fe275f"], 0x90ad) 01:41:43 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:41:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x0, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:43 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) epoll_create1(0x80000) epoll_create1(0x80000) openat$zero(0xffffffffffffff9c, &(0x7f0000000200)='/dev/zero\x00', 0x101000, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r8 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x40, 0x0) r9 = fcntl$dupfd(0xffffffffffffffff, 0x203, r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$BLKRESETZONE(r9, 0x40101283, &(0x7f0000000040)={0x1, 0x3ff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) accept4$alg(r5, 0x0, 0x0, 0x48e2a076c9d6d2ac) r10 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(r6, 0x4, 0x1, 0x9) r11 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r11, @ANYBLOB="13080000000000000200000000009184050008000100756470100dfbf824805e2dead3db6fff238e8fda443ed5ec5b382fa6cb9cfec291ff1fd778fd1fb0a08b7baaa7d68579b9d91b24730218f7545452e306fa54725bdcf1e707ead354e67515961caabd6f02666eacea821e798ee8a6838172fbb4f30ae0be868cc67829d9241a792a95c8225bf727f12b370e77"], 0x20}}, 0x0) r12 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x101880, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r12, 0x1, &(0x7f0000000180)={0x71, 0x800, 0x9, "878c0247afdeaeab11b2dda1c3f79a9be0039804f8aace5e879539cdd6e25efeedfc15b5a44c0f30f707ade35e3c59b61b5199d940a688833b859d0e7d46e63f939a825ee453ba85d25039d40f1b5893af66c878d9a54181ba02394899972b5831ddbc1c913ffb2d469a4e7fcff8cae094"}) 01:41:43 executing program 0: r0 = syz_usb_connect$hid(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x45e, 0x9d, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x9, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x6}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_GET_FPEXC(0xb, &(0x7f0000000100)) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_G_SLICED_VBI_CAP(r3, 0xc0745645, &(0x7f0000000040)={0x2e3b, [0x7, 0x3, 0x400, 0x1f, 0xb779, 0x2, 0x3ff, 0x81, 0x2, 0x70f, 0x1, 0x2, 0x7f, 0x800, 0xc, 0x8000, 0xff, 0x8, 0x800, 0xfff, 0x0, 0x5, 0x4, 0x4, 0x485a, 0x200, 0x3, 0x1, 0x3, 0x19, 0xffff, 0xffff, 0x38, 0x2, 0xfff, 0x1000, 0x8, 0x8, 0x9, 0x8, 0x0, 0x1ff, 0x7, 0x9, 0x1, 0x7f0, 0x5, 0xab], 0xc}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000140)={0x8}, 0x1) syz_usb_control_io$hid(r0, &(0x7f0000000200)={0x24, 0x0, 0x0, &(0x7f00000000c0)={0x0, 0x22, 0x6, {[@main=@item_012={0x0, 0x0, 0xa}, @global=@item_4={0x3, 0x1, 0x6, "00006ab9"}]}}, 0x0}, 0x0) 01:41:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x0, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 618.084385][ T5408] device nr0 entered promiscuous mode [ 618.204858][T12230] ryos 0003:1E7D:3232.0005: unknown main item tag 0x0 [ 618.240154][T12230] ryos 0003:1E7D:3232.0005: hidraw0: USB HID v0.00 Device [HID 1e7d:3232] on usb-dummy_hcd.2-1/input0 01:41:43 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4d) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f00000002c0)=[@in6={0xa, 0x4e20, 0xb81, @mcast1, 0x9}, @in6={0xa, 0x4e24, 0xe9, @mcast2, 0x96a}, @in6={0xa, 0x4e20, 0x6, @ipv4={[], [], @broadcast}, 0x41}, @in6={0xa, 0x4e22, 0x0, @loopback, 0x3320}, @in={0x2, 0x4e23, @empty}], 0x80) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) read(0xffffffffffffffff, &(0x7f0000000180)=""/132, 0x84) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r5, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) r6 = syz_open_dev$admmidi(&(0x7f0000000080)='/dev/admmidi#\x00', 0x1, 0xc0000) ioctl$TUNGETDEVNETNS(r6, 0x54e3, 0x0) [ 618.281994][ T31] usb 1-1: new high-speed USB device number 31 using dummy_hcd [ 618.326342][ T5516] device nr0 entered promiscuous mode 01:41:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x0, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 618.442739][T12230] usb 3-1: USB disconnect, device number 26 01:41:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_open_dev$amidi(&(0x7f00000001c0)='/dev/amidi#\x00', 0x7fff, 0x2a0000) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400207) r10 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r10, 0x20, 0x70bd26, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x7fffffff, 0x5, 0x9, 0x6}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40000}, 0x20000070) r11 = socket(0x8, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xa, &(0x7f0000000040)=0x2, 0x4) setsockopt$IP_VS_SO_SET_STARTDAEMON(r11, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) [ 618.532118][ T31] usb 1-1: Using ep0 maxpacket: 8 01:41:43 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:43 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f00000002c0)={0x6, {{0x2, 0x4e23, @rand_addr=0x5}}}, 0x88) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="000186dd07"], 0x90ad) [ 618.662374][ T31] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 618.673662][ T31] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 618.687017][ T31] usb 1-1: New USB device found, idVendor=045e, idProduct=009d, bcdDevice= 0.40 [ 618.696166][ T31] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 01:41:43 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) r4 = socket$tipc(0x1e, 0x5, 0x0) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000040)) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r2, 0xc0406619, &(0x7f0000000080)={{0x2, 0x0, @identifier="0546be8d111d98827af18dcde24ac11c"}}) 01:41:43 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) r3 = socket$kcm(0x10, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r6, 0x84, 0x23, &(0x7f00000001c0)={0x0, 0xe4e}, 0x8) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000080), &(0x7f0000000180)=0x40) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") close(r7) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r9, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) [ 618.850160][ T5637] IPVS: Unknown mcast interface: yam0 [ 618.856029][ T5635] device nr0 entered promiscuous mode [ 618.859084][ T31] usb 1-1: config 0 descriptor?? [ 618.890857][ T5640] IPVS: Unknown mcast interface: yam0 01:41:44 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:44 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x0, 0x488080) ioctl$EVIOCSABS20(r3, 0x401845e0, &(0x7f0000000080)={0x9, 0x9, 0x0, 0xb481, 0x101}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) [ 619.192513][ T5752] IPVS: Unknown mcast interface: yam0 [ 619.347037][ T31] microsoft 0003:045E:009D.0006: unbalanced collection at end of report description [ 619.357059][ T31] microsoft 0003:045E:009D.0006: parse failed [ 619.363421][ T31] microsoft: probe of 0003:045E:009D.0006 failed with error -22 [ 619.547149][ T31] usb 1-1: USB disconnect, device number 31 [ 620.311802][T12230] usb 1-1: new high-speed USB device number 32 using dummy_hcd [ 620.551787][T12230] usb 1-1: Using ep0 maxpacket: 8 [ 620.671968][T12230] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 620.683022][T12230] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 9 [ 620.695957][T12230] usb 1-1: New USB device found, idVendor=045e, idProduct=009d, bcdDevice= 0.40 [ 620.705081][T12230] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 620.714700][T12230] usb 1-1: config 0 descriptor?? 01:41:46 executing program 0: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)="2e000000120081aee4050cecff0e00fa048b5bdb4cb904e473730e55cff26d1b0e001d80fffffff05e510befccd7", 0x2e}], 0x1, 0x0, 0x0, 0x88a8ffff00000000}, 0x0) recvmsg(r0, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001580)=[{&(0x7f00000001c0)=""/169, 0xa9}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001380)=""/252, 0xfc}], 0x3}, 0x0) recvmsg(r0, &(0x7f0000002bc0)={0x0, 0x0, &(0x7f0000002b00)=[{&(0x7f0000001740)=""/4096, 0x1000}, {&(0x7f0000001340)=""/48, 0x30}, {&(0x7f0000002780)=""/122, 0x7a}, {&(0x7f0000002800)=""/228, 0xe4}, {&(0x7f0000002900)=""/69, 0x45}, {&(0x7f0000002980)=""/73, 0x49}, {&(0x7f0000002a00)=""/161, 0xa1}], 0x7}, 0x0) semctl$GETVAL(0x0, 0x3, 0xc, &(0x7f0000001480)=""/252) 01:41:46 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=@newlink={0x3c, 0x10, 0x425, 0x0, 0x0, {}, [@IFLA_LINK_NETNSID={0x8}, @IFLA_LINKINFO={0x14, 0x12, @ip6gre={{0xc, 0x1, 'ip6gre\x00'}, {0x4}}}]}, 0x3c}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r4, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r5, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) 01:41:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:46 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(0xffffffffffffffff, &(0x7f0000000100)=""/71, 0x47) 01:41:46 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000080)=0x8) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) r4 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x8, 0x404000) ioctl$HIDIOCGUCODE(r4, 0xc018480d, &(0x7f0000000100)={0x3, 0x3, 0xffffffff, 0x1, 0x7fff, 0x1000}) 01:41:46 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x10000, 0x0) recvmsg$kcm(r2, &(0x7f0000000940)={0x0, 0x3b6, &(0x7f0000000840)=[{&(0x7f0000003bc0)=""/4100, 0x1000}, {&(0x7f0000000100)=""/38, 0x26}, {&(0x7f00000002c0)=""/164, 0xa4}, {&(0x7f0000000440)=""/152, 0x98}, {&(0x7f00000005c0)=""/224, 0x21e}, {&(0x7f0000000380)=""/102, 0x66}, {&(0x7f00000006c0)=""/196, 0xc4}, {&(0x7f0000000500)=""/109, 0x6d}, {&(0x7f00000007c0)=""/79, 0x4f}], 0x9, &(0x7f0000000900)=""/59, 0xfffffffffffffe97}, 0x10200) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r2, 0xc00c642e, &(0x7f0000000980)={0x0, 0x80000, r2}) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(r6, 0xc00c642d, &(0x7f00000009c0)={r7, 0x0, r2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="e872ffff10"], 0x90ad) timerfd_create(0x1, 0x100000) [ 621.052019][T12230] usbhid 1-1:0.0: can't add hid device: -71 [ 621.058195][T12230] usbhid: probe of 1-1:0.0 failed with error -71 [ 621.069501][T12230] usb 1-1: USB disconnect, device number 32 [ 621.160933][ T5775] IPVS: Unknown mcast interface: yam0 [ 621.171539][ T5777] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 621.180285][ T5777] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 621.195989][ T5767] device nr0 entered promiscuous mode 01:41:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 621.214719][ T5794] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 01:41:46 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'yam0\x00'}, 0x18) 01:41:46 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r4, 0x0, r3) recvfrom$unix(r3, &(0x7f0000000200)=""/26, 0x1a, 0x20, &(0x7f00000002c0)=@file={0x0, './file0\x00'}, 0x6e) r5 = fcntl$dupfd(r0, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IPT_SO_GET_INFO(r5, 0x0, 0x40, &(0x7f0000000180)={'mangle\x00'}, &(0x7f0000000080)=0x54) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r7, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) [ 621.492742][ T5777] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 621.503155][ T5794] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 621.518458][ T5890] IPVS: Unknown mcast interface: yam0 [ 621.523194][ T5777] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 621.532529][ T5777] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 621.552811][ T5794] netlink: 'syz-executor.0': attribute type 29 has an invalid length. [ 621.576154][ T5887] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 01:41:46 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="0400000007404943af6aa3d76c0c672125855e311c95e45de9353bab13263617df059dc5e17e62e72be91e17f061"], 0x90ad) 01:41:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 621.595819][ T5937] netlink: 'syz-executor.0': attribute type 29 has an invalid length. 01:41:46 executing program 0: r0 = syz_usb_connect$hid(0x5, 0xc, &(0x7f00000000c0)={{0x12, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000000040, 0x56a, 0xd2, 0x40, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x9, 0x3, 0x1, 0x0, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x1}}}}]}}]}}, 0x0) syz_usb_control_io(r0, 0x0, 0x0) 01:41:46 executing program 2: lsetxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)='trusted.overlay.upper\x00', &(0x7f0000000300)={0x0, 0xfb, 0x6356bb3621fded8c, 0x4, 0x40, "b2258d7fe5715e2f9df7330647732014", "e97302b66638182a64e720fb2447a18c907c813310396c56fd4b361e7a1939575fab57ffaf"}, 0x3a, 0x5) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000240)) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f00000001c0)={0x3, 'bcsh0\x00'}, 0x234) ioctl$KVM_GET_TSC_KHZ(0xffffffffffffffff, 0xaea3) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r2, 0xc08c5335, &(0x7f0000000040)={0x0, 0x6, 0x6, 'queue0\x00', 0x3}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r3}, &(0x7f0000044000)) tkill(r3, 0xf) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") getsockopt$IP_VS_SO_GET_TIMEOUT(r4, 0x0, 0x486, &(0x7f0000000100), &(0x7f0000000140)=0xc) 01:41:46 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 621.788296][ T6003] device nr0 entered promiscuous mode 01:41:46 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") fsetxattr$trusted_overlay_opaque(r5, &(0x7f0000001140)='trusted.overlay.opaque\x00', &(0x7f0000001180)='y\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) ioctl$sock_SIOCGPGRP(r9, 0x8904, &(0x7f0000000080)=0x0) r11 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r11}, &(0x7f0000044000)) r12 = socket$inet6_udp(0xa, 0x2, 0x0) r13 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r13, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) r14 = openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x80, 0x0) sendmsg$netlink(r8, &(0x7f0000001100)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbfd, 0x20204002}, 0xc, &(0x7f0000000200)=[{&(0x7f00000002c0)={0x258, 0x36, 0x790, 0x70bd2b, 0x25dfdbfb, "", [@generic="ec6218073819fd8d64836d0500bf5d8505e68cbf529c9c3d5edc3a0a1428bd7a099e11db6d2b80dfa1350610cbc0d5cd4d227a2090f491b164b7e155ffb64e728e0a1889ab8cceb0e7098dde175576d00521c485e002c7a541a0be9c855bba51b061025528bccf367fbab676342a836223290c2571e05a5daccc373057a287542fd405b87a9263ab6f14fe03e05f21d2c473d40c19555ce4bbce4b031e0745280c2de487b7d7d19b517a0c2af2498b522bca", @typed={0x8, 0x83, @str='udp\x10'}, @typed={0x8, 0x89, @u32=0x6b}, @generic="8201d54460a69491a6b9e5b3a035fb70520118eb8996ab1dcc87bc1058107bf501df49b2ba71abc30e87346a487e803a3a8898194104455c125c2f3be21c00f29e4c66a886843f4deedc879a31b062d33bdd11d2f5d432aef1f57c8eb5c004ec3ede4bc7d4988787a2929595f09d846c22f4aa719fd237506bedc13b80ae3743dc97ce393d0fecf2670ef8bc9d255d5f17361b948e590819bedebc026e1c3a87c35c6cccce1e9b27e808f64e0210ae9c3a3d2d8edc1fecb074baad95ee36e1bebf9d1012927d7ffc0c4f765ecb63e99b95c45d886e85dc3e80c828636b9e6c3502cae893884fdcb394dd6e8581ece4", @typed={0xc, 0x5e, @u64=0x7}, @generic="0aa07a5d5b196a45bd55720d62717684ba55f1fd44e5b893411fe71adc296ce6994429cd68dd6c60d7f412368e4d7ac49261361622e2b4156eaad17f9eb49b0431d459c67cd30faa3abbcfbd00c2a9a95b7efcc7efd06e410502e94d6cf434c097b3c0cd2b924aa28813502e", @typed={0x14, 0x58, @ipv6=@dev={0xfe, 0x80, [], 0x13}}, @typed={0x8, 0x4f, @pid=r10}]}, 0x258}, {&(0x7f0000000180)={0x10, 0x37, 0x200, 0x70bd2c, 0x25dfdbfc}, 0x10}, {&(0x7f0000000540)={0x298, 0x3f, 0x2, 0x70bd2b, 0x25dfdbfe, "", [@nested={0x80, 0x24, [@generic="c9ab99ad9c4baccad699eda42cdfdaebd72ad08b2e56180871126f32fc3f160eb4c8400cce12d4eab34c0a30aca0982b5f26337e4a965a78970d111c94e5e2538abbc88fb04f807813e03f76074ebc285d5c4f96ea0ede54b1eae7d720348d3e2901cd4d92f8", @typed={0xc, 0x8, @u64}, @typed={0x8, 0x82, @ipv4=@empty}]}, @generic, @typed={0x3c, 0x49, @binary="0f2ed596791b961b8b39ecbb75cf03e645b0808dd7822a801a84143546c9e3ecc714588eabd62b60038bf26a5f805e0b2c1b2cea58b4"}, @nested={0xd8, 0x39, [@generic="d9f09d519ec812c2bb6eff88ce893faec53273ea0a1662d8fef35c70a8e05c97a4f00b368684556987122f1cbd70a39fb0e49898974bd0fdfc26ee5e0d2eb1192f304d1e8155ad30710f6b95c2fd7a4fc1ec06defd889719e62192c8384d90b9809c4f35948515b575afacb8b24f4cd34954cb71bf14e2fbd229639da460cd8ef6d0e78912dc275685ceb86e503d6bd662399cd9ad56c4dc07516dc44231c268db1cfa43f223e0bb277dfff28dc6f8791d88ec4df8b910dfa03f5cdb50d8a9a6f00e5bd2a2", @typed={0x8, 0x5b, @pid=r11}, @typed={0x4, 0x89}]}, @typed={0x8, 0x2c, @fd=r12}, @typed={0x8, 0x69, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @nested={0xe4, 0x88, [@generic="5bce46e9a0faaa6e4c9d0c9d1c15a8f56f61d31864fb8f1d8b6adad346494aec5ff8a0f610ba434534718ec1573aad6e43720e256a1605bb64ec06357f742062d5b879f80e51ec5e211f7f5ccfe13458340c7d2319888bf01abe33c81a5772f580045c0633bba8d90c6403978f3b399cc34fd2ba06505352bb314303b1fc1d4ac2a7ec202d0825ab36be52001e0ab77d2b4daa1d96ab80a4fc3fbd1b17d666196564fb2b5d8986d42e6e5339f5ea7bd7c2d2c2c497770d1deb7d14675695aac1e7e549bb68ccdcb38435879d7bc55d6ba54ad21c56e4", @typed={0x8, 0x5, @u32=0x6}]}]}, 0x298}, {&(0x7f0000000800)={0x230, 0x17, 0x400, 0x70bd29, 0x25dfdbfe, "", [@generic="2c13240406805bf64d670cad6b17665f729febcba5f3209f6b1ac5fb6181e295b6839cd7cdac2ea714ab2a9672c0fb99819d29f2bf99c0a62311a72f2271a0b381481ad18ed374afbe37ba7ac4b3abe1135c911f734469ae8c437701165c6c79c76bd5183e1d72a72b87cf885dd334e960f0ab399ab11978944d27", @typed={0xc, 0x42, @u64=0x14}, @typed={0x8, 0x48, @fd=r13}, @nested={0x190, 0x91, [@typed={0xd8, 0x17, @binary="d516802fbc5899d2c7e4475bd6b8e6e594cca0c4262fb49ba95aa19c736360edbeec3cc20c02969412373ae93251d6cf875bacdf16300f9494de21c708f0e9cf24af59679fbec1730cc5274515d0ca29969362fd6d03cdb1fbd644aba32d1f868d8b1bbb5ad46639bde549967a54a2df8e14ee0a1e2d6c7d1f52d0fe57e7b2f5ec239fe55be0f995211917887a56b09289fc30c970faef6b37a3c6a86b5b4dff7e5efd098f90f5c8f9be3eb1e39d9d910da54c39e6cb20b1587892610a30b8909ef6bc9960fbd0cf7b035383e6581157d474"}, @generic="6248b82f23526b51ac4839304866227f4c337c428b6372ec9382813966ac553f3c95d4b593cf4b783d2e850162ea664d239bdef9d9f389f06bba55a967e031b1e9afff4dec4cf7b434ce7d52e35f758620a63c16713865e67b9ba7d6c2b631e77f6ff5532d1ac1a9d1820432214f69f0181d69e522b06ccbbed2558d2ef0068fa39f8d231e30b3c0e44c5996ff9a91e2eee158f90b806956e050306be3970c14e5128f8901d34572d6431c091f949c93c569"]}]}, 0x230}, {&(0x7f0000000a40)={0x18c, 0x27, 0x200, 0x70bd28, 0x25dfdbfd, "", [@nested={0x17c, 0x6d, [@generic="f068b49b1b4e1c5408244fe03ba8d18490ad9d2525dc51fb793a5c339fe3738369e3fe4ad78eee6a8c74f7d2de30554a7545170630507b1a17ffe2c8b67010f449e4b96a251c95b4401d931e64b83f9077ebab2951a38d6a270cbd1d1c65525f91db6f40bf3eeeb48a60674fc11004c2b7c5e4211e0dcb99a0420982419b7ab86861ddc0c3e74e5a07d1f24fddcc64eac6acf6eba076c5770e832b661d3870249f30144508efa978778090a86c0d5dac5e287667716a7a076ba7cae12536c4c0c197898ab39aa8f4cdb6cd0f1da8a5a40fab7a24c7c3ea069648a5ca77b5feabcda359fd04", @generic="c83b1ce631a51c0372807dc36e09c633", @generic="75d0ccc0fbe77fdd7d4b9b1a026e4649a7cb809040ba56a1718064e596a9ab04ddf52ab2efb2fc2abd77f6dba8e22b2f49573fc8cf6362792063ef1769c03d0681ce0ffac64465b04ea9f6f8e77665fe6026b37aa0843f", @generic="63ce7851ddafa1c4b0f1265c989c04a2e404989be09d5c14d8ffb25b61abea4413c1d50c9cb83cc39d"]}]}, 0x18c}, {&(0x7f0000000c00)={0x4f0, 0x22, 0x20, 0x70bd2b, 0x25dfdbfb, "", [@typed={0x4, 0x16}, @nested={0x1c0, 0x78, [@generic, @typed={0x8, 0x50, @fd=r14}, @generic="85ac4be167d3a0fbebff8e6f685da4d2d3d98d237fa1cd51e18593d7194cd7ecc71feec4eb0d3e20b46159cf9b91a91421ababa7120da1e29fbc8617bf64ed756a5da2e9c8d8d689cc0570e2bf76b48b638da526cce62b7354aa576cecc70dfd8ac746b41b22fe847fce2df5a4ac7cfebbf387d81a0b5aa181915896a07a6f435df4acf1c6da08bc07371faa90a563340c996a0938dbc80145b8d69ca0beea4a953482d3fabdc2e0f4df7dd2f7143c3f875c68965aac8279327e4e49046e976d19e7d2fc3b", @typed={0x4, 0x3e}, @typed={0x14, 0x40, @ipv6=@initdev={0xfe, 0x88, [], 0x1, 0x0}}, @generic="dae94a725a25931b672f9ab7", @generic="0db003f94b819749140ff6d47a2f46d01f56027145bc65b73f3d14acbe2797874946075f62b73a7137be9f3a1a6a424417589317027f69105debbe1fd830162ec92dd8da5f43fdb772ce0ad4", @generic="0b5ca7282ee1a18a24392b1e3973538b7131c0d226b0ce935d30079d50a0f0adef5d5a409f12b73fc3fb3594ea0d1826f212909669128bdd211bbf650756de796468b40463ee154b3c0358dc2cce4425a3d60aa665f33870e4c44d53c1aaaa5b2ce6dc6182a17eb415fd85e67efeb734b8bc9cc2a802406b7c0757bfcb107b"]}, @generic="9b3f8b4f853da768e02b38ad8aaea55ca801f51a88d8e6247d1f468a7030670a592c7707236d67d61c76312bd627b653a475cae7ce6ffe92cec39145a1bfe20de2bd9fb2884535a6cb34f6528d74b7493c9cebed7e880d753942b18bde74bde1833491b28e6dc493dbe4fbbac6eab207560dd020304871ae1b34f92ee64f12a762110bb198524af7816418fce2cd3d6d8b", @nested={0x288, 0x37, [@generic="134e7771c0303b8354a16736be", @generic="6e428e74f13159ece9a307e2eaf980f84c39db536c5f32fabc9fffcdc6677715f7c01921efcbc3c8db8ab699a542a504a5cef2a846ec65dba8c3d372697420a7d61db0d73e484e4aae7b3edc433a02a1fc3bb386e99266547e3f276f8f30dad66a1c9003e932df06bfc89a9b14d1f212b547b6dd7b52929a7ebce57f8f8658215272751fe1f6cd36f26e029c58ef71eeeeb71b96d0776cde240df75afb651d3dc71bf1605c2cc10e49f55f1d79c870fb01f13543d959c49c202964a87d17ffb78e1a55987bdbb63a6a7263de2d6bb7808d15f68cf0a0802b46c364d8deb5eb74fd325dc3ab5c5d8d49e2675aed55de4843b2", @generic="fc281fb8b6a64ee531caaea49a97be781f92f2bec6d825d6f8458734b35ae7080834d956f900f3a10ad2b10e7b02082c46be75f87311cdd89b85f094031cc0491dad6453ffc4e1b8dfb5f8901700b27b6d9c346f05f4da0fba141054c57b0a17de5b058a717773712e471ac7ef4e431d", @typed={0x4, 0x23}, @generic="44074d20f452fbccf37741a03738591dc083e045ca0a638132d35030027d7f59518163974bea076b8883d7ee2922a673b8587879ad4aa1154e1ac675984c3aac8d9fe77b464cf05e3f49b276fbaaa64ddd44ce744c75064de1c8c4a270e7f525afc5f3e3daa7d1497f555e978ea744689b01ba884f9b4555339c6ffa8d33df4040804b0fe5", @generic="338fe4a86cbdfafb29305ceaa7a7c52cdf9096bca822627c1bf30ad220608259b40ad2b30b71e7bab0f5d9296422c8a81c279a38b8002123651a38f857c8436a9331f19867bed170a8a3ac70accb64d049ed3fedc8460888c0e2b6f0f1d5d63cb2052cad8253e33a6c3b71ca44a89154626df1269453a343baa34f4d6091316d214e4cac7d796af074"]}]}, 0x4f0}], 0x6, 0x0, 0x0, 0x80}, 0x40000) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r4, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) 01:41:47 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(0xffffffffffffffff, &(0x7f0000000100)=""/71, 0x47) 01:41:47 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_usb_connect(0x4, 0x49c, &(0x7f00000002c0)={{0x12, 0x1, 0x310, 0xf6, 0x3e, 0x20, 0x28, 0x17cc, 0x1010, 0x7e67, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x48a, 0x1, 0x3, 0x7f, 0x8, 0xb8, [{{0x9, 0x4, 0xb1, 0x8, 0xb, 0x5c, 0x64, 0x56, 0x5, [@uac_control={{0xa, 0x24, 0x1, 0x8, 0x81}, [@input_terminal={0xc, 0x24, 0x2, 0x1, 0x1fe, 0x1, 0x4, 0x2, 0x20, 0x8}, @input_terminal={0xc, 0x24, 0x2, 0x6, 0x3, 0x1, 0x4, 0x9, 0x5, 0x40}, @input_terminal={0xc, 0x24, 0x2, 0x3, 0xe57f261bf0cc8a91, 0x1, 0x5, 0x1f, 0x7, 0x9}, @output_terminal={0x9, 0x24, 0x3, 0x5, 0x101, 0x5, 0x3, 0x5}, @input_terminal={0xc, 0x24, 0x2, 0x5, 0x200, 0x5, 0x8, 0x1ff, 0x81, 0x80}, @extension_unit={0xd, 0x24, 0x8, 0x1, 0x1, 0xfd, "92687257dd7c"}]}, @generic={0x44, 0x11, "da42b71561aa281d23793f1d2e58be7690f7e7a1461d199db22f42480d7130a5f1704f0bd9a0afb1f235dcb6591e3f10d4dcb730322d00168b413dce286158439c08"}], [{{0x9, 0x5, 0x4, 0x0, 0x1c2, 0x1, 0x6, 0x3f, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x4b, 0x4}]}}, {{0x9, 0x5, 0x3c34266d81f4753a, 0x4, 0x146, 0x8, 0x7, 0x5, [@generic={0x16, 0x21, "7dfb4985217977acc8459be91423da264a4a61e4"}, @generic={0xf3, 0x8, "e54bff4c4081537746fea914d8e36a63b7c66ffd3a1b22284396535bd8da81288fe092731ec4e29ed3e44600a3982993fe9d2dab6c07421a8bb02dd5aeb1bfc3976066eb0b1d0ac17f32a0c08d3e04fee24acc31223d727284a9ae3425c74c44a234834f33d1c6fd680e34c20276495d30121f2128be69d5d0a2d96bd43b3c5147d095ce43c89f98e54ef154614a3a6096cd602c6dd3a5b905117c36c1026828dd22db67ce70a949b059f2b3536b0723cb9a61094c3b1e4a1e38063e767fc5dd0257b580488ae5e0b6ff9951431c03278b7e36fecdf283d931575552da21a77deefd61aca47a4603f29da8ed9b49ffb74b"}]}}, {{0x9, 0x5, 0x0, 0x10, 0x235, 0x0, 0x63, 0x4, [@generic={0x3f, 0xa, "2e9e6cbfd84fa5bad28423264648090ae25d8d07166a89f649fba302897dd6077b855d642126b1f1cb431e0abb45c8cd92c1f0dc48cfe70f49140eb3e9"}]}}, {{0x9, 0x5, 0xd, 0x4160e9d92e0a73a, 0x72, 0x7, 0x1, 0x2, [@generic={0xe3, 0x3, "a8350e16f0998577ffa46d1cd14b36d9aeaf7ef466a97abeec6642dfb613a6b0caf2422202ddea7aca1f03e8021282acdcb372b733b6c38b19c1a68600097732c32847bf53fdc8621fd77c5c18479a5f821288b01647eda184299ae5399545eb6f1136263ab21159425c173462bf080a434f63837b4ac8ba8a8f518045d54bf36c754bed7235755e8cda6ec88f5facde0012a47ff7a902906482eddec93fa78de419ba5d8ff1e97fa3c17821e2a9f456209d8aa2f7fd390af2e38bb3ebf12b096381dcbdf2835f1606791f8c9dffd510ea6c4ddadf67f931058f29b20b88c7c204"}]}}, {{0x9, 0x5, 0xe, 0x0, 0x303, 0x3, 0x2, 0x7, [@uac_iso={0x7, 0x25, 0x1, 0x1c2, 0x5, 0x101}]}}, {{0x9, 0x5, 0x2, 0x2, 0x22a, 0x9, 0x80, 0x9}}, {{0x9, 0x5, 0x1b, 0x3, 0x326, 0x0, 0x1, 0x44, [@generic={0x74, 0x0, "ccf39bdf7e2de8161d45dff5c90cab7741a656b2972a33d801d938899f5f74981788d43ec199ab258d00969e225ec6f0a7d6ad294a1a4a62a3dd6290eaa9e74046dcc6f0b671279ba97838fcce77c81b79a058a9dd8438e67e5094dec7526338274fd37391892c99f15ffbfcf665fafe0fd5"}]}}, {{0x9, 0x5, 0xb, 0x0, 0xc7, 0xb2, 0xd5, 0x4, [@generic={0x8a, 0x4, "74159a9cd8bdb8506e845e9a661d6734bffbe7fe6c9d0d2cbfd98ab94cd481e9a947f0cc9ab7872308b672a8179791c291b2712d0ea22266e5d3bf086f133e5bccb7393a91b460839252c5395f5552ce3d1674afb824761157ea1e958ea67d9835cc611e19b3ca7afb6a0396ac037893dbdab49a78cc74aadd16a99e30d1182fc88cd17d7f63aaf7"}]}}, {{0x9, 0x5, 0x18, 0x10, 0x249, 0x2, 0x6, 0x65, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x7, 0x2}]}}, {{0x9, 0x5, 0x8, 0x10, 0x2ea, 0x4, 0x8, 0x8, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x0, 0x9}]}}, {{0x9, 0x5, 0x0, 0x1, 0x25a, 0x1, 0x8, 0x80, [@generic={0x3d, 0xe, "af848bd7b9f3ba6609cfe6534b477d7425f1df1ae3fee00ab06c4b78a68f4c9b7ffb22a2439935a4d7e9f0798ae43dc2a497f4922b6a803d8ae099"}]}}]}}]}}]}}, &(0x7f00000001c0)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x0, 0x8, 0xff, 0x0, 0x2c, 0x1}, 0x3f, &(0x7f0000000080)={0x5, 0xf, 0x3f, 0x4, [@ss_container_id={0x14, 0x10, 0x4, 0x9, "7670fffa75944f62fe5f3eab17df4e0e"}, @wireless={0xb, 0x10, 0x1, 0xc, 0x8, 0x80, 0x5, 0x1, 0x1f}, @ss_container_id={0x14, 0x10, 0x4, 0x81, "6c4e1b29a5a1dd5d4a4eeb941cf1ed76"}, @ext_cap={0x7, 0x10, 0x2, 0x10, 0x3, 0x4, 0x2}]}, 0x1, [{0xf7, &(0x7f00000000c0)=@string={0xf7, 0x3, "c0ef2e38c3f9b150a3e223dc5e56100621a00651f5ad2c7915b6102189ab744279deb12bd41d013b2a8810511150c42f35517bd1dc54a0e684af410eb871aa53b563ff35e0515a1daf2396702910b473f93304978a377a007d5acd4ecb017c8893913be7e9546cddffa92b522047acf3f453257d726bae8e8ee0c3f01884836a6e267688fde485f2996ee002b534d5701dc2a9e7f3861752104d812a5e91502fa681d83dd825ad021f1678f33df86f133081b0aa90afd518e1b4c3999e0169ae8b254b7acd7fc3305d4a52d5e68dc2fa3afde828aa946331f21d078b64d6b0c73fa1d764fc76e257df2c810a7eed42d569692fc7ce"}}]}) syz_usb_control_io$hid(r2, &(0x7f0000000900)={0x24, &(0x7f0000000780)={0x0, 0x22, 0xf7, {0xf7, 0x23, "c2ca2ab7f91ee1b2d05991b610641f3affa015f19098918ef249296f9f02310328256735e923aae4a9dcc3bb1ece0620b4c5a43dbc7c27ca7c19cbbd9cb86f2e00fdaab5afae06ad9bfb5f8f61093f5a4713f570368add51cfc48ea041707c2786405a2ebcde1995425e6a479e3e6f84264b0fcb829699ffe81ea773cc40f6091bea3e136c9ba90c3eea743e0ccad44561f9188a4dfae5b414df218a0e218d82d3b2d10c6f246df7c7f407907252c8bc6370a7b60b0b1ea778ad9e101b5ea1cecf317d38662ab4d5b0953d16b691f293585886a6b3b22a6e013db45555b8b9d99dfa407364024ad1eb7f2f4f6b5af099b02511cafa"}}, &(0x7f0000000200)={0x0, 0x3, 0x52, @string={0x52, 0x3, "0b4cd9692a3c639fa112ba0ded70ee6f2db9b0e48550adfb22fe6b10e06344b801e19b48f1fed631b2a40aa963cfc6f3b86cf4f44970df043ffdd483044d5085863a0d0a0a632312a13ba47b23c2ff5e"}}, &(0x7f0000000880)={0x0, 0x22, 0x3, {[@main=@item_012={0x2, 0x0, 0x8, "815a"}]}}, &(0x7f00000008c0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x4, 0xc9, 0x1, {0x22, 0xdab}}}}, &(0x7f0000000b40)={0x2c, &(0x7f0000000940)={0x95eb229be8c77c6b, 0x1, 0xd7, "bb3d1c72725c70c051d31f1d93e75e2f1e6f2344a99596ef9f998021240c5460f44e7474ed1b2f62101caefa770b9a270e13252199590882510c9f5b3a25e97f5a8642785ba7349a631ad3082c52cb9b6d00c38d8dc9505d5e1240287fae37401fbbb49fb4757785f2c667a869e700df1e005d3c493ed02bad48c29dc2939a019201078c437f9e9bcf3b8abd385fab4a818cfd84fad9127b8156d553acefda9cfb52042ab20514de596c5041f76d253ff3fecac3f286620723cfac960d3a7f8d335a4459f0c05337e36c7ede02f18f26eff069d5d859a3"}, &(0x7f0000000a40)={0x0, 0xa, 0x1, 0x5}, &(0x7f0000000a80)={0x0, 0x8, 0x1, 0x4}, &(0x7f0000000ac0)={0x20, 0x1, 0x9, "325250ef3138914e62"}, &(0x7f0000000b00)={0x20, 0x3, 0x1, 0x5}}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:47 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0x0, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 622.125082][ T6003] device nr0 entered promiscuous mode 01:41:47 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in6=@mcast2, 0x4e23, 0x0, 0x4e23, 0x0, 0xa, 0xa0, 0x0, 0xc, 0x0, r5}, {0x80000000, 0x51, 0x9, 0x5, 0x8, 0x7ff, 0x0, 0x8}, {0xffffffffffffff81, 0x7, 0xfffffffffffffff8, 0xfffffffffffffffb}, 0x3f, 0x0, 0x4, 0x0, 0x1}, {{@in=@multicast2, 0x4d2, 0x51}, 0x2, @in6=@empty, 0x34ff, 0x2, 0x1, 0x0, 0x1, 0x7fff, 0xb1}}, 0xe8) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r7) getgroups(0x4, &(0x7f0000000140)=[0x0, r6, r7, 0x0]) fchownat(r2, &(0x7f0000000140)='./file0\x00', r5, r7, 0x400) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_RESET(r11, 0x2403, 0x0) r12 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) r13 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r13, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES16=r8, @ANYRESHEX=r13], 0x3}}, 0x24004800) r14 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x8, 0x612440) read$usbmon(r14, &(0x7f0000000180)=""/161, 0xa1) 01:41:47 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0x0, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:47 executing program 5: r0 = dup(0xffffffffffffffff) r1 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000300)={&(0x7f0000000080), 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000426bd7000fddbdf922da80526abc7a5000500000008000300ca0d0000989101f6e2411ea054d6f9359c6b4b1610c3ba80db59d058bb66cef21d67d0830c131866e9191814c7a0e7d08632914b4f004e7986fbff112c42c0fef64b8d47515347277713e32e9b2c266355e3c998ea5e0bf7b1fa77a42a64e97cd40b1835a3aac238f36593bcdb8b49425f76d807a2c1483cc756063be0a808e556f8429f2be8bd453471b8c00f2e5976f76a969c7dfc3396c48933721e25b9fcfdc7bdbd51aff3f1904d0076e177"], 0x24}, 0x1, 0x0, 0x0, 0x80}, 0x40000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r6, @ANYBLOB="130800000000000000000b0000000c76a7000800010075647010"], 0x20}}, 0x0) 01:41:47 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0x0, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-control\x00', 0x0, 0x0) r2 = socket$inet6(0xa, 0x400000000001, 0x0) close(r2) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) fremovexattr(r2, &(0x7f0000000100)=@known='security.apparmor\x00') setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r2, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r4}, 0x8) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000440)={r4, @in={{0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") signalfd4(r6, &(0x7f0000000380)={0x40}, 0x8, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r7 = socket$kcm(0x29, 0x2, 0x0) r8 = open(&(0x7f00000005c0)='./file0\x00', 0x40, 0x248) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r8, 0x84, 0x9, &(0x7f0000000600)={0x0, @in6={{0xa, 0x4e23, 0x4, @mcast2, 0x1f}}, 0x200, 0x1, 0x23f, 0x7fff, 0x68}, 0x98) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') ioctl$KVM_SET_BOOT_CPU_ID(0xffffffffffffffff, 0xae78, &(0x7f0000000000)=0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f00000002c0)=ANY=[@ANYBLOB="006386dd0754823d44073759562235fcfa55ce9d681b221e9efaf000c587906f313dc97d3de5974b545594686f49f8a3644ffb38c279d56299078389de82dae2b84b5cfab4c1a62a3fbe1f04ee0407f761235f70163ba4683a647ca5fe23348fdf5b5a7fb66ba8d34afcbec5f32c5475f9593eda2667f734e20805a7b3c38ca3cd25f2d4fc4e4c4cfd1fed3968172fb0efcf02cdcd4e74392c"], 0x90ad) [ 622.525232][T12179] usb 3-1: new high-speed USB device number 27 using dummy_hcd [ 622.549005][ T6141] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.5'. [ 622.660795][ T6212] sctp: [Deprecated]: syz-executor.4 (pid 6212) Use of struct sctp_assoc_value in delayed_ack socket option. [ 622.660795][ T6212] Use struct sctp_sack_info instead [ 622.690972][ T6212] device nr0 entered promiscuous mode [ 622.831979][T12179] usb 3-1: device descriptor read/64, error 18 01:41:47 executing program 0: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(0xffffffffffffffff, &(0x7f0000000100)=""/71, 0x47) 01:41:47 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:47 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(0xffffffffffffffff, &(0x7f0000000100)=""/71, 0x47) 01:41:47 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r4, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video36\x00', 0x2, 0x0) [ 622.994792][ T6212] sctp: [Deprecated]: syz-executor.4 (pid 6212) Use of struct sctp_assoc_value in delayed_ack socket option. [ 622.994792][ T6212] Use struct sctp_sack_info instead 01:41:48 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 623.083826][ T6328] device nr0 entered promiscuous mode [ 623.252266][T12179] usb 3-1: device descriptor read/64, error 18 [ 623.531878][T12179] usb 3-1: new high-speed USB device number 28 using dummy_hcd [ 623.811929][T12179] usb 3-1: device descriptor read/64, error 18 [ 624.201814][T12179] usb 3-1: device descriptor read/64, error 18 [ 624.288273][ T6373] IPVS: Unknown mcast interface: yam0 [ 624.321938][T12179] usb usb3-port1: attempt power cycle [ 625.031880][T12179] usb 3-1: new high-speed USB device number 29 using dummy_hcd 01:41:50 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:50 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) ioctl$NBD_DO_IT(r2, 0xab03) 01:41:50 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r3, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x402}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)={0xe0, r4, 0x300, 0x70bd27, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_PORT={0x317, 0x4, 0x4e21}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x74}, @IPVS_SVC_ATTR_FWMARK={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_AF={0x0, 0x1, 0xa}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0xff3b, 0x7, 0x4}]}, @IPVS_CMD_ATTR_DAEMON={0x0, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x0, 0x6, @mcast2}]}, @IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_PORT={0x0, 0x4, 0x4e23}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x41}, @IPVS_SVC_ATTR_FWMARK={0x0, 0x5, 0x3}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xff}, @IPVS_CMD_ATTR_DAEMON={0x0, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x0, 0x5, @loopback}]}]}, 0xe0}, 0x1, 0x0, 0x0, 0x120bdc1fa167c69c}, 0x0) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r5, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$KVM_SET_DEVICE_ATTR(r8, 0x4018aee1, &(0x7f0000000080)={0x0, 0x2, 0x4d, &(0x7f0000000000)=0x4}) 01:41:50 executing program 4: r0 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r0}, &(0x7f0000044000)) perf_event_open(&(0x7f0000000200)={0x0, 0xfffffffffffffdc2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0xe0ad1096fbe00fdf, 0x0) ioctl$KVM_KVMCLOCK_CTRL(r3, 0xaead) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x20, 0xc00) splice(r1, &(0x7f0000000000), r5, &(0x7f00000002c0), 0x4, 0xcd06363ba2b08ebd) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:41:50 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, 0x0, 0x0) 01:41:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 625.312128][T12179] usb 3-1: device descriptor read/64, error 18 [ 625.415514][ T6386] IPVS: Unknown mcast interface: yam0 [ 625.427253][ T6383] device nr0 entered promiscuous mode [ 625.444187][ T6390] IPVS: Unknown mcast interface: yam0 01:41:50 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:50 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003d00)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000040)=""/155, 0x9b}, {&(0x7f0000000100)=""/235, 0xeb}, {&(0x7f0000000200)=""/16, 0x10}], 0x3}}, {{&(0x7f00000002c0)=@hci, 0x80, &(0x7f0000000340)}, 0x1}, {{&(0x7f0000000380)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000400)=""/132, 0x84}], 0x1, &(0x7f0000000500)=""/4096, 0x1000}, 0x4}, {{0x0, 0x0, &(0x7f0000001580)=[{&(0x7f0000001500)=""/94, 0x5e}], 0x1, &(0x7f00000015c0)=""/150, 0x96}, 0x9}, {{&(0x7f0000001680)=@isdn, 0x80, &(0x7f00000018c0)=[{&(0x7f0000001700)=""/72, 0x48}, {&(0x7f0000001780)=""/36, 0x24}, {&(0x7f00000017c0)=""/223, 0xdf}], 0x3, &(0x7f0000001900)=""/47, 0x8}, 0x1}, {{&(0x7f0000001940)=@nfc, 0x80, &(0x7f0000003bc0)=[{&(0x7f00000019c0)=""/4096, 0x1000}, {&(0x7f00000029c0)=""/4082, 0xff2}, {&(0x7f00000039c0)=""/219, 0xdb}, {&(0x7f0000003ac0)=""/237, 0xed}], 0x4, &(0x7f0000003c00)=""/200, 0xc8}, 0x6}], 0x6, 0x143, &(0x7f0000003e80)={0x0, 0x1c9c380}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:41:50 executing program 5: r0 = gettid() r1 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="2321252e296677ecb4"], 0x9) r2 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r2, 0x10e, 0xc, &(0x7f0000000040)={0x7fe}, 0x10) socket$inet_udplite(0x2, 0x2, 0x88) sendto$inet(0xffffffffffffffff, &(0x7f0000000300), 0x0, 0x85, &(0x7f0000000400)={0x2, 0x0, @empty}, 0x10) setsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f00000001c0)={@multicast2, @local}, 0xc) r3 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) fcntl$setlease(r3, 0x400, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) close(r1) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) [ 625.787198][ T6500] IPVS: Unknown mcast interface: yam0 [ 625.803973][ T6497] IPVS: Unknown mcast interface: yam0 01:41:50 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:50 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 625.924071][ T6569] device nr0 entered promiscuous mode 01:41:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$inet6(0xa, 0x400000000001, 0x0) close(r4) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB="80000000", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) setsockopt$inet_sctp6_SCTP_DELAYED_SACK(r4, 0x84, 0x10, &(0x7f00000002c0)=@assoc_value={r6}, 0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000140)={r6, 0x4e2bbcad}, 0x8) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0xa}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r8}]]}}}]}, 0x40}}, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'vcan0\x00', r8}) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) r10 = fcntl$dupfd(r9, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r13, 0x84, 0x10, &(0x7f0000000300)=@sack_info={0x0, 0x20, 0x2}, &(0x7f0000000340)=0xc) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r10, 0x84, 0x7c, &(0x7f0000000380)={r14, 0x4, 0x6}, &(0x7f0000000400)=0x8) r15 = socket(0x11, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r15, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = fcntl$dupfd(r17, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) getpeername$tipc(r18, &(0x7f0000000080), &(0x7f00000000c0)=0x10) 01:41:51 executing program 5: r0 = socket(0x10, 0x2, 0xc) write(r0, &(0x7f00000000c0)="1f0000000202fffffd3b000007110000f30501000b000600020423ca0000cf", 0x1f) [ 626.095013][ T6622] sctp: [Deprecated]: syz-executor.2 (pid 6622) Use of struct sctp_assoc_value in delayed_ack socket option. [ 626.095013][ T6622] Use struct sctp_sack_info instead 01:41:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 626.317877][ T6622] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 626.369194][ T6622] sctp: [Deprecated]: syz-executor.2 (pid 6622) Use of struct sctp_assoc_value in delayed_ack socket option. [ 626.369194][ T6622] Use struct sctp_sack_info instead 01:41:51 executing program 5: unshare(0x6c060000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) pipe2(0x0, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000240)=@newlink={0x94, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x74, 0x12, @ipip6={{0xc, 0x1, 'ip6tnl\x00'}, {0x64, 0x2, [@tunl6_policy=[@IFLA_IPTUN_FLAGS={0x8, 0x8, 0x3e}], @tunl6_policy, @IFLA_IPTUN_PROTO={0x8}, @tunl6_policy=[@IFLA_IPTUN_REMOTE={0x14, 0x3, @local}, @tunl_policy=[@IFLA_IPTUN_ENCAP_SPORT={0x8}], @tunl_policy=[@IFLA_IPTUN_TOS={0x8}], @IFLA_IPTUN_REMOTE={0x14, 0x3, @initdev={0xfe, 0x88, [], 0x0, 0x0}}], @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}, @IFLA_IPTUN_PROTO={0x8}]}}}]}, 0x94}}, 0x0) 01:41:51 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, 0x0, 0x0) 01:41:51 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:41:51 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:41:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r2, 0xc1205531, &(0x7f0000000100)={0x0, 0xff800000, 0xfff, 0x9, [], [], [], 0xfffffbff, 0x0, 0xfffff00e, 0x6, "d9aa1cd109b40f9fdbf34d023132d8b3"}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000040)={0x3, 'irlan0\x00'}, 0x18) 01:41:51 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f0000000140)='/dev/media#\x00', 0x4, 0x5288b2c86f7da174) ioctl$HIDIOCGDEVINFO(r0, 0x801c4803, &(0x7f00000002c0)=""/104) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x20000000) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000000)) prctl$PR_GET_THP_DISABLE(0x2a) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') write$binfmt_misc(r5, &(0x7f0000000100)={'syz1', "99ad24d64f9977006082895a5995488142bf98db"}, 0x18) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="66fa8eff96f5b1b5d43d8910e49feb66d9a36cd8eff5518db5fdc88ec484da75c58f20a5a047d14f3bafaaeddabc997bbb1d3b9e5952ef93cf7f0d98f492ca3ea6d666aa910423a6f999af303456775998c863739fdf83cbab00"/103], 0x90ad) [ 626.548403][ T6639] IPVS: ftp: loaded support on port[0] = 21 01:41:51 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 626.629371][ T6649] device nr0 entered promiscuous mode 01:41:51 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuacct.stat\x00', 0x0, 0x0) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f0000000080)={[{0x2, 0x12d0, 0x8, 0x4, 0x8, 0x5, 0x9, 0x3, 0x0, 0x6, 0x75, 0x94, 0x3ff}, {0x3, 0x8, 0x9, 0x8, 0x13, 0x3, 0x5, 0x1, 0x8, 0x9d, 0x9, 0x80}, {0x6, 0x3e45, 0x0, 0x3, 0x3, 0x5, 0x0, 0xef, 0x1, 0x9, 0x76, 0x64, 0x10000}], 0x1000}) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:51 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 626.893837][ T6759] IPVS: Unknown mcast interface: yam0 01:41:52 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000340)="40b63a4cad032f34732e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900000000000fbb89c617766619381ed07b492b7b6deb347cfbd9c337f2bb200a10723a91f4fa2cd33ba884e05c62794b994e7ddbf2088daff5b852cdbf5fffa6da0978ee449cb14a8605be83193ea5aa42c5145bbdc2b00d96544c76fbe796aa1f7b1296d1daba8027762ad239926893de61670fbc06d1e6d2084a8b2eff3dfac3dbed", 0xffffffffffffff80}], 0x1}, 0x1) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VIDIOC_ENUMINPUT(r5, 0xc050561a, &(0x7f00000002c0)={0x0, "65dd265b730b72c3e90d10a05b78aaf6863d3296d30b317dfcb7a695a16852a6", 0x3, 0x4, 0x5, 0x200, 0xf6103f7460474339, 0x2}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:41:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$VFIO_IOMMU_MAP_DMA(0xffffffffffffffff, 0x3b71, &(0x7f0000000040)={0x20, 0x2, 0x0, 0x40, 0x1}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:52 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 627.174006][ T6772] IPVS: Unknown mcast interface: yam0 [ 627.180101][ T6770] device nr0 entered promiscuous mode 01:41:52 executing program 5: epoll_create1(0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_create1(0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) r0 = socket$inet6(0xa, 0x2000000001, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', 0x0}) 01:41:52 executing program 1: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, 0x0, 0x0) 01:41:52 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_SET_SREGS(0xffffffffffffffff, 0x4138ae84, &(0x7f0000000340)={{0xd000, 0x4000, 0xc, 0x7, 0x20, 0x7, 0x80, 0x1f, 0x5, 0x0, 0x66, 0x40}, {0xf000, 0x4000, 0xd, 0x8, 0x40, 0x1, 0x3d, 0x7, 0x5, 0xfb, 0x1, 0x8}, {0x0, 0x2, 0x9, 0x7, 0x8, 0x8, 0x8, 0x0, 0xf9, 0x3f, 0x0, 0x8f}, {0xe000, 0x6000, 0x3, 0xfd, 0x0, 0x1, 0x20, 0x4, 0xfc, 0xff, 0x7, 0xc1}, {0x5000, 0xf000, 0xc, 0x5, 0x6, 0x4, 0x8, 0x3f, 0xfb, 0x4, 0x0, 0x2}, {0x2000, 0x4000, 0x0, 0x1, 0xb3, 0x5, 0x81, 0x80, 0x7f, 0x7f, 0x2b, 0x9}, {0x4ccfb63915f8f4bc, 0x1000, 0x9, 0x1, 0x0, 0x4, 0x2, 0x1, 0xb6, 0x20, 0x1, 0x1}, {0xd000, 0x4, 0x1, 0x7, 0x40, 0xfc, 0xff, 0x7, 0x40, 0x7, 0xff, 0x5}, {0x59afe967a318a421}, {0x1}, 0x10000000, 0x0, 0x4000, 0x5e701fad9eb237a4, 0xd, 0x180, 0x6000, [0x0, 0x7f, 0x7, 0x8001]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r9, &(0x7f00000002c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000240)={0xffffffffffffffff}, 0x13f, 0x1}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r6, &(0x7f0000000300)={0x13, 0x10, 0xfa00, {&(0x7f0000000040), r10, 0x6}}, 0x18) 01:41:52 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, 0x0, &(0x7f00000001c0)) 01:41:52 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 627.834985][ T6783] IPVS: Unknown mcast interface: yam0 [ 627.887718][ T6790] IPVS: Unknown mcast interface: yam0 01:41:53 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, 0x0, &(0x7f00000001c0)) 01:41:53 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, 0x0, &(0x7f00000001c0)) [ 628.127053][ T6770] device nr0 entered promiscuous mode 01:41:53 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = syz_open_dev$sndpcmc(&(0x7f00000001c0)='/dev/snd/pcmC#D#c\x00', 0x635b, 0x0) sendmsg$inet_sctp(r7, &(0x7f0000000300)={&(0x7f0000000200)=@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000002c0)=[{&(0x7f0000000240)="87167d87057c8b13ae15b739c7e405bec17f36e2c593f5b0b267f7e75d94b5e17f4ab47f", 0x24}], 0x1, 0x0, 0x0, 0x4}, 0x40000000) r8 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) mq_getsetattr(r8, &(0x7f0000000180)={0x9, 0x9ee, 0x2, 0x1, 0x0, 0x9, 0x1fa, 0x40}, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) r13 = fcntl$getown(0xffffffffffffffff, 0x9) pidfd_open(r13, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r7, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@empty, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@local}}, &(0x7f0000000440)=0xe8) ioprio_set$uid(0x3, r14, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r12, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r12, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r15, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) write$RDMA_USER_CM_CMD_DESTROY_ID(r11, &(0x7f0000000140)={0x1, 0x10, 0xfa00, {&(0x7f0000000100), r15}}, 0x18) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000480)={0x3, 0x6}, 0xc) open_tree(r8, &(0x7f0000000040)='./file0\x00', 0x7f72da718f41e609) r16 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) r17 = openat$vsock(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vsock\x00', 0x20200, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r17, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:53 executing program 5: epoll_create1(0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) epoll_create1(0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) r0 = socket$inet6(0xa, 0x2000000001, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', 0x0}) 01:41:53 executing program 5: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ustat(0x0, 0x0) 01:41:53 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, 0x0) 01:41:53 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000040)={{}, 'port0\x00', 0x5, 0x20, 0xff, 0x80000001, 0x11eaba11, 0x9, 0x5, 0x0, 0x4, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") ioctl$sock_inet_SIOCRTMSG(r4, 0x890d, &(0x7f0000000140)={0x0, {0x2, 0x4e24, @rand_addr=0xc7e1}, {0x2, 0x4e22, @broadcast}, {0x2, 0x4e24, @empty}, 0xa8b982a540743f7, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000100)='teql0\x00', 0x5, 0x8, 0x1}) 01:41:53 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x7ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) bind$alg(r0, &(0x7f0000000040)={0x26, 'hash\x00', 0x0, 0x0, 'sha1\x00'}, 0x58) r1 = accept4$alg(r0, 0x0, 0x0, 0x0) sendto(r1, &(0x7f00005c8f58), 0xfffffffffffffd65, 0x0, 0x0, 0xfffffffffffffe29) 01:41:53 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x1000}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SG_GET_LOW_DMA(r5, 0x227a, &(0x7f0000000480)) r6 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0xa95ea25e122df31a, 0x0) r7 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r7, 0x4d) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r7, 0x84, 0x1a, &(0x7f00000002c0)={0x0, 0xe4, "3c8df17dbf249e401e854a291a0d1319553a4e6e15fc3d40c1e214aa709abe5bfd868b253a7f4a443589c332551244bec3b502f084ad0f92ef4b196b553374700fd2ca5a07ffbaf93f20a75a01fdd6df7941f5f44e0a24a29e82bf4720f33bffd711903204f35c30259cd635d2c8507604557f8a4bec9f9b70ef2b4a1ca5e3b511393eeb1174ee027887b98748b9f18368b0e85b5a1f03334911079bdb38d0a153d5c0750b9fc88543228e73018759755fc10cbaf944c0431baaf6c832ce28f7b188c01c1550d81f3bef0ca19360e9eadf45ef56f27461463d755e8c49613c56a3a38a1b"}, &(0x7f0000000100)=0xec) getsockopt$inet_sctp6_SCTP_CONTEXT(r6, 0x84, 0x11, &(0x7f00000003c0)={r8, 0x1}, &(0x7f0000000440)=0x8) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:41:53 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, 0x0) 01:41:53 executing program 5: r0 = open(&(0x7f0000000040)='./bus\x00', 0x8001141042, 0x0) fallocate(r0, 0x10, 0x81, 0x800) 01:41:53 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 628.730725][ T6933] IPVS: Unknown mcast interface: yam0 01:41:53 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) prctl$PR_SET_NAME(0xf, &(0x7f0000001140)='[!vboxnet1\x00') [ 628.832695][ T6933] IPVS: Unknown mcast interface: ^ Ïè{ 01:41:53 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f00000002c0)={0x0, 0x1, 0x5, 0xd3ec, 0x800, 0x8, 0x8, 0x1000, {0x0, @in={{0x2, 0x4e22, @remote}}, 0x5, 0x6a, 0x400, 0x200, 0x2}}, &(0x7f0000000100)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r3, 0x84, 0x23, &(0x7f0000000380)={r4, 0x1f}, 0x8) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$KVM_DIRTY_TLB(0xffffffffffffffff, 0x4010aeaa, &(0x7f0000000000)={0x0, 0xaba8}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r6 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r5, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x90ad) 01:41:53 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, 0x0) 01:41:54 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCGDEV(r0, 0x80045432, &(0x7f0000000140)) 01:41:54 executing program 2: getsockname(0xffffffffffffffff, &(0x7f00000000c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, &(0x7f0000000140)=0x80) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000002c0)={0x1, {{0x2, 0x4e20, @remote}}, 0x1, 0x1, [{{0x2, 0x4e21}}]}, 0x110) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) r4 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x8, 0x4) setsockopt$inet6_dccp_int(r4, 0x21, 0x7, &(0x7f0000000080), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$EVIOCGKEYCODE_V2(r8, 0x80284504, &(0x7f00000000c0)) 01:41:54 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x800e0b7}) [ 629.092731][ T6954] device nr0 entered promiscuous mode 01:41:54 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000200)='cpuset\x00W\xb0\xd9\xe4\\\x00\xb8-\x03_\xff\xde\x9a0K#\x82\xd1\x0e\xde/s!\xc1\xc0\xf0\x11\xc0\xec\xf2|4/\x81\x1e\xb0U\x97\x00\xd2mK\xe8Q5pL4\xf3\x01\x17\xb8\x9d-\xa3\x13\x17\xfa\xb2h\x1a\x9eh\x10l\x0e\x89a\xb3\x8a)\x8cjc\xc3#\"\xb1\xa7A\x87\x86c\x84\xc1\xf1$\xea\r\xb5\xf2(,\xaa\x0f\xed\x83\xde\x92T\xf4\x0e#u\xa3\xeaE\x15\xa6\x15\x12\x97m\x11\xe0\xddnJ\xab\x98\xbf\xa7LZ\\PG\xda\xeeu\x8f\x84\x99\xbf\xc6\xa4f\xf8\xff\n\xaeD\xcc\xda\xfb=W\xc3BU') perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x4008001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r0, 0x3, 0x0) 01:41:54 executing program 3: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0}, &(0x7f0000cab000)=0xc) setresuid(r1, 0x0, 0x0) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f00000000c0)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffb) 01:41:54 executing program 1: syz_emit_ethernet(0x4e, &(0x7f00000002c0)={@local, @link_local={0x1, 0x80, 0xc2, 0x689, 0x3}, [], {@ipv6={0x86dd, {0x0, 0x6, 'v`Q', 0x18, 0x0, 0x0, @remote={0xfe, 0x80, [0x6, 0x543, 0xff7f, 0x5, 0x50000000000000d, 0x8848000000f0ffff, 0x0, 0x8dffffff00000000, 0x0, 0xfe03, 0x0, 0x0, 0xffffca88], 0xffffffffffffffff}, @mcast2={0xff, 0x2, [0x0, 0xfffffffffffff000]}, {[], @icmpv6=@mld={0x0, 0x0, 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, [], 0x0, 0x0}}}}}}}, 0x0) [ 629.425024][ T6972] IPVS: Unknown mcast interface: yam0 01:41:54 executing program 3: r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x1400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) shmget$private(0x0, 0x2000, 0x400, &(0x7f0000ffd000/0x2000)=nil) geteuid() r3 = creat(0x0, 0x0) accept4$alg(r3, 0x0, 0x0, 0x80000) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x1) ioctl$TIOCNXCL(0xffffffffffffffff, 0x540d) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000100)) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f00000001c0)={0x0, 0x3, 0x0, 0x2}) sched_setaffinity(0x0, 0x31f, &(0x7f0000000500)) r4 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(r4, 0x1, &(0x7f00000001c0)={{0x6, 0x0, 0xee01, 0x0, 0xee01}, 0x0, 0x4, 0x0, 0x20, 0x0, 0x0, 0x200}) shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmget(0x1, 0x2000, 0x0, &(0x7f0000ffd000/0x2000)=nil) r5 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmctl$IPC_SET(r5, 0x1, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$KVM_GET_PIT(0xffffffffffffffff, 0xc048ae65, &(0x7f00000005c0)) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) write$binfmt_script(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYRES32], 0x4) sendfile(r1, r2, 0x0, 0x20000102000007) ioctl$VIDIOC_SUBSCRIBE_EVENT(0xffffffffffffffff, 0x4020565a, &(0x7f0000000240)={0x8001003, 0x1, 0x1}) r6 = socket(0x200000000000011, 0x4000000000080002, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002d80)={@multicast2, @local, r7}, 0xc) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000900)={{{@in6=@ipv4={[], [], @loopback}, @in=@multicast1}}, {{@in=@remote}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xfd) syz_genetlink_get_family_id$team(&(0x7f00000000c0)='team\x00') socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000a00)='/dev/snd/pcmC#D#c\x00', 0x101, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000040), 0xc, &(0x7f00000005c0)={&(0x7f0000000740)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYPTR, @ANYRES32, @ANYBLOB="08f406000000000034000100240001006270665f686173685f66756e63000000000000000000000000000000000000000800030007000000040004000800af97b56c5817ba57a8d0043d19f26cf668fa7bc88ed4ef8e3421024f4dd04c45e202d49f4d5b3465f7be04507e300c0ae71d6b46b963b29750e40795c12e354a536b372bda9fb0bce0830f2d41fcc035d184a668fc9123ce629bfafec1a1de96bf7c3926d0258cbe208e3e794bafab4f2cb11015ae84fd26599b2194f325f742209b982eb0dc0760e594c470e7024106f267c64d609bca4012ca9616a14a44cca20bc10b596433574008", @ANYRES32, @ANYBLOB="0400020008000100", @ANYRES32, @ANYBLOB="f400020040000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b"], 0xb}}, 0x4000) sendmsg(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f00000015c0)=ANY=[], 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r8, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000140)={0x0, @rand_addr, @initdev}, &(0x7f0000000180)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, 0x0, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f0000002d80)={@multicast2, @local}, 0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'Veth\xe0w\xef\xdd@\xf8\x84~\xe5\xfc\x00'}) setsockopt$packet_int(r6, 0x107, 0x14, &(0x7f0000000180), 0x4) 01:41:54 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x4, 0x80000, 0xff) setsockopt$sock_int(r1, 0x1, 0x31, &(0x7f0000000040), 0x4) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) prctl$PR_SET_UNALIGN(0x6, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40042409, 0x1) [ 629.486407][ T6954] device nr0 entered promiscuous mode 01:41:54 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:41:54 executing program 1: socket(0xa, 0x1, 0x0) r0 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, 'gre0\x00'}, 0x18) 01:41:55 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000040)=@filename='./file0/../file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x1000, 0x0) creat(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 01:41:55 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$inet_int(r3, 0x0, 0x31, &(0x7f0000000000)=0x1, 0x4) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4d) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={0x0, 0x80000000}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_MAXSEG(r4, 0x84, 0xd, &(0x7f0000000300)=@assoc_value={r5, 0x10001}, &(0x7f0000000340)=0x8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:41:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x9, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:55 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 630.274048][ T7027] device nr0 entered promiscuous mode [ 630.708060][ T7027] device nr0 entered promiscuous mode 01:41:55 executing program 5: timer_create(0x2, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f0000000180)={{0x77359400}, {0x0, 0x1c9c380}}, &(0x7f00000001c0)) 01:41:55 executing program 1: mount$fuseblk(&(0x7f0000000040)='/dev/loop0\x00', 0x0, 0x0, 0x0, 0x0) r0 = getpgrp(0x0) setpriority(0x0, r0, 0xffff) ptrace$getenv(0x4201, r0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$loop(&(0x7f0000000280)='/dev/loop#\x00', 0x0, 0x100082) r2 = memfd_create(&(0x7f0000000380)='\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x00\x01\x00\x00\x00v\x8e\x05\xf7\xc1U\xad}\xc6\x94|W>Zi$Nv8,\n\xa6=W^\xa3Y\x7f\x8b\x17(\'~\xf7k0TM{\xa9-\xcf\x97\x8f\x1f\x81\xdc\x1b\x7f\x8f{4Q\xda\xda\x02\xec\xb4\xf1\xdd\xcc\x8bRA\xda\x89Efn\x00s\xc2Zb\x01\x00M\xbe\xa3z\xab\xd3\xeb\x98\x88\xc4\xc6)A\x9fP\x93zhH\xe0\xd2\x81\xdb\xeeV\x8cM\xe9\xa06\xc2o\x19\"\xf6Iq\xd4\xdf\x97\xfb\xab\x04\xe8\xceI8\xb3\x1d\xcf%\x9bK\xc6\t\x01\xe1\x86a\xfa\xb8\xfb)\x88\xcd+\xc2`\xc2\xf5r5>k\xb0\xa0\x02\xfc\x16MO\x18\x9b\x06\x80b\xd1\x01\x00\x00\x00\x00\x00\x00\x00@\f\fL\xa5{Tk\x940\x17.\xa56.\xe0\x14\x1b=\xf0j\xd25\xe8\x15\xd8\x9e\xea\xd3\xd9G4\t\xc0\x9c.\'\xa9R3z$\xf2\x01\x88\xc0\x13\x12<\xc01j3\xd8\xb4CE7s\xe4\xa0\x9e\xdd\x801\x12M\xee\x13\xce\x9cu(\x8f.\xc83\xc7\xe6j\xf5\xb1\x9a\x00\x00\x00\x00\x00\x00\x00', 0x0) geteuid() r3 = creat(0x0, 0x1) accept4$alg(0xffffffffffffffff, 0x0, 0x0, 0x80000) ioctl$TIOCGSID(r3, 0x5429, 0x0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f0000000340)=[{&(0x7f0000000180)='\'', 0x1}], 0x1, 0x8180a) ioctl$LOOP_CHANGE_FD(r1, 0x4c00, r2) sendfile(r1, r2, 0x0, 0x20000102000007) 01:41:55 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) sendmsg$nl_route_sched(r5, &(0x7f0000000540)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80004}, 0xc, &(0x7f0000000500)={&(0x7f0000000240)=@deltaction={0x288, 0x31, 0x400, 0x70bd26, 0x25dfdbff, {}, [@TCA_ACT_TAB={0x2c, 0x1, [{0x18, 0x6, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x10, 0x12, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}]}, @TCA_ACT_TAB={0x40, 0x1, [{0x14, 0x4, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x14, 0x1b, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x14, 0xa, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}]}, @TCA_ACT_TAB={0x58, 0x1, [{0x10, 0x10, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}, {0x10, 0x1c, @TCA_ACT_INDEX={0x8, 0x3, 0x80}}, {0x14, 0x17, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x10, 0x11, @TCA_ACT_INDEX={0x8, 0x3, 0x8}}, {0x10, 0x3, @TCA_ACT_KIND={0x8, 0x1, 'nat\x00'}}]}, @TCA_ACT_TAB={0x18, 0x1, [{0x14, 0x13, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}]}, @TCA_ACT_TAB={0x28, 0x1, [{0x10, 0x1b, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x14, 0x1e, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}]}, @TCA_ACT_TAB={0x94, 0x1, [{0x10, 0xd, @TCA_ACT_INDEX={0x8, 0x3, 0x1}}, {0x14, 0xa, @TCA_ACT_KIND={0xc, 0x1, 'skbmod\x00'}}, {0x14, 0x2, @TCA_ACT_KIND={0xc, 0x1, 'vlan\x00'}}, {0x10, 0xa, @TCA_ACT_INDEX={0x8, 0x3, 0x7}}, {0x10, 0x0, @TCA_ACT_KIND={0x8, 0x1, 'ipt\x00'}}, {0x14, 0x20, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x14, 0x15, @TCA_ACT_KIND={0xc, 0x1, 'sample\x00'}}, {0x10, 0xd, @TCA_ACT_INDEX={0x8, 0x3, 0xce}}]}, @TCA_ACT_TAB={0x18, 0x1, [{0x14, 0xa, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}]}, @TCA_ACT_TAB={0x14, 0x1, [{0x10, 0xa, @TCA_ACT_INDEX={0x8, 0x3, 0x9}}]}, @TCA_ACT_TAB={0x54, 0x1, [{0x14, 0x14, @TCA_ACT_KIND={0xc, 0x1, 'police\x00'}}, {0x18, 0x6, @TCA_ACT_KIND={0x10, 0x1, 'connmark\x00'}}, {0x14, 0x1b, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0xb, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}]}, @TCA_ACT_TAB={0x5c, 0x1, [{0x10, 0x6, @TCA_ACT_KIND={0x8, 0x1, 'ife\x00'}}, {0x14, 0x13, @TCA_ACT_KIND={0xc, 0x1, 'skbedit\x00'}}, {0x10, 0x18, @TCA_ACT_KIND={0x8, 0x1, 'xt\x00'}}, {0x14, 0xa, @TCA_ACT_KIND={0xc, 0x1, 'gact\x00'}}, {0x10, 0xe, @TCA_ACT_INDEX={0x8, 0x3, 0x5}}]}]}, 0x288}, 0x1, 0x0, 0x0, 0x22000090}, 0x20000002) r6 = socket(0xa, 0x1, 0x0) r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f0000000580)={0x0}, &(0x7f00000005c0)=0xc) fcntl$lock(r0, 0x0, &(0x7f0000000600)={0x3, 0x0, 0x800, 0x5, r8}) ioctl$KVM_GET_CPUID2(r2, 0xc008ae91, &(0x7f0000000100)={0x2, 0x0, [{}, {}]}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) r9 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x741002, 0x0) write$nbd(r9, &(0x7f0000000080)={0x67446698, 0x0, 0x3, 0x2, 0x2, "073848a937064b5502024b356d9e80127bf484ffa4833b014fefdcf4dcecb55d47de5d507e788bb64a8c3e5acff40fc7705f1504f9462197aa1da35c744dde27778e160075df6ebb8eac25265cf51bfa59d530ca365e26889e087037618d16"}, 0x6f) syz_open_dev$sndtimer(&(0x7f0000000180)='/dev/snd/timer\x00', 0x0, 0x4000) 01:41:55 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='\x00\x00\x00') lseek(r0, 0x0, 0x3) 01:41:55 executing program 3: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x106543, 0x0) 01:41:56 executing program 5: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup\x00', 0x200002, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x10, 0xffffffffffffffff, 0x0) r2 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) fchdir(r2) r3 = creat(&(0x7f00000001c0)='./bus\x00', 0x0) write$FUSE_ENTRY(r3, &(0x7f0000000500)={0x90}, 0xffffff2a) lseek(r3, 0x0, 0x3) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x9) setsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, 0x0, 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x1) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80000, 0x0) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) io_submit(0x0, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f0000000000), 0x10000}]) [ 631.061326][ T7138] IPVS: Unknown mcast interface: yam0 01:41:56 executing program 3: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]}) syncfs(0xffffffffffffffff) 01:41:56 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r2, 0xae60) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) ioctl$KVM_SET_IRQCHIP(r2, 0x4020aea5, &(0x7f0000000100)={0x0, 0x0, @ioapic}) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r2, 0x8008ae9d, &(0x7f00000002c0)=""/233) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:41:56 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:41:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) fsetxattr$security_smack_entry(r2, &(0x7f0000000040)='security.SMACK64EXEC\x00', &(0x7f0000000080)='\'nodev$self%selinux\x00', 0x14, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x10001) socket(0x3, 0x4, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'vcan0\x00', 0x2000}, 0x18) [ 631.399465][ T32] audit: type=1326 audit(1571794916.426:64): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7200 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd3a code=0xffff0000 [ 631.479917][ T7231] debugfs: Directory 'vcpu0' with parent '7231-5' already present! [ 631.498966][ T7231] device nr0 entered promiscuous mode 01:41:56 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$VT_RESIZEX(r5, 0x560a, &(0x7f0000000040)={0x2, 0x6, 0xd3, 0x72ea, 0x400, 0x6}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x20000, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r6, 0x0, 0x484, &(0x7f0000000100)=""/86, &(0x7f0000000000)=0x56) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$SIOCGETNODEID(r9, 0x89e1, &(0x7f0000000180)={0x1}) r10 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r10, 0x0, 0x48b, &(0x7f00000000c0)={0x0, 'vxcan1\x00', 0x4}, 0xffffffffffffffa5) 01:41:56 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000040)) [ 631.884006][ T7371] IPVS: length: 86 != 24 01:41:56 executing program 1: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]}) ioperm(0x0, 0x4, 0x5) 01:41:57 executing program 5: r0 = gettid() perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vhci\x00', 0x0) read(r1, &(0x7f00000001c0)=""/11, 0x349) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/mcfilter6\x00') dup3(r2, r1, 0x0) tkill(r0, 0x1000000000013) [ 632.025510][ T7269] IPVS: length: 86 != 24 [ 632.075573][ T7380] debugfs: Directory 'vcpu0' with parent '7231-5' already present! [ 632.100005][ T32] audit: type=1326 audit(1571794917.146:65): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7378 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd3a code=0xffff0000 01:41:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) fsetxattr(r8, &(0x7f0000000040)=@known='com.apple.FinderInfo\x00', &(0x7f0000000080)='\xc5\x00', 0x2, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0xff6) r9 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r9, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) [ 632.109582][ T7380] device nr0 entered promiscuous mode [ 632.137696][ T32] audit: type=1326 audit(1571794917.186:66): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7200 comm="syz-executor.3" exe="/root/syz-executor.3" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd3a code=0xffff0000 01:41:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x81, 0x7, 0x5, 0x1}, 0xcc) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000240)={r0, &(0x7f0000000180), &(0x7f0000000240)}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r0, &(0x7f0000000180)}, 0x10) 01:41:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 01:41:57 executing program 5: r0 = creat(&(0x7f0000000000)='./bus\x00', 0x0) ftruncate(r0, 0x208200) open(&(0x7f0000000780)='./bus\x00', 0x14103e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x10, 0xffffffffffffffff, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) setsockopt$bt_BT_SNDMTU(0xffffffffffffffff, 0x112, 0xc, 0x0, 0x0) alarm(0x0) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) getsockname$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) 01:41:57 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x1, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(0xffffffffffffffff, 0x0, 0x0) [ 632.423884][ T7491] IPVS: Unknown mcast interface: yam0 01:41:57 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) r3 = shmget(0x0, 0x4000, 0x40, &(0x7f0000ffa000/0x4000)=nil) shmctl$SHM_STAT(r3, 0xd, &(0x7f00000002c0)=""/235) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:41:57 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) openat$cgroup(r2, &(0x7f0000000040)='syz0\x00', 0x200002, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:57 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 632.823482][ T7586] device nr0 entered promiscuous mode [ 632.846035][ T32] audit: type=1326 audit(1571794917.896:67): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7378 comm="syz-executor.1" exe="/root/syz-executor.1" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd3a code=0xffff0000 [ 632.856532][ T7609] IPVS: Unknown mcast interface: yam0 01:41:57 executing program 5: seccomp(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x100006, 0x0, 0x0, 0xfffffffffffffffe}]}) rt_sigaction(0x5, 0x0, 0x0, 0x8, &(0x7f0000000300)) 01:41:58 executing program 1: clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) lsetxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) [ 632.977180][ T32] audit: type=1326 audit(1571794918.026:68): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7616 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd3a code=0xffff0000 01:41:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:41:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 01:41:58 executing program 2: clone(0x2050000, &(0x7f00000002c0)="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", &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)="5daed4c293db2468eefa08dd5a0a2d7a217670b9e0318618e20e507e86af8b04314c82db7a2b4ab981eb5be95b85e432e7cccdc312924e99879cfd72f86a9c844ed9e203cc2c7fca3b764b35ae1e0e0541056b98703be0e97f289290cad6f5f8da0991200a43071ec05627dc60af6083209fe6b6d27e977109e200b235d3a4f4d62e3db4e30605ab5b49956513b3bc37fd54c63dad090af9546d262dbd790f316754099a2b99aea6ca765d0cffdc7cd94e946dc985f904b9a8ca4175c30c3ddaf20769270d2436cff1edf89ada7d29777213a77dbcde45faf00add0e1e0307") socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:41:58 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) [ 633.231089][ T7586] device nr0 entered promiscuous mode 01:41:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:41:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:41:58 executing program 1: sched_setaffinity(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f0000000280)={0x0, 0x2000, &(0x7f0000000000)=[{&(0x7f0000000140)="2e0000003100050ad25a80648c6394fb0124fc0010000b400c000200053582c137153e37090001802f641700d1bd", 0x2e}], 0x1}, 0x0) [ 633.604326][ T7643] IPVS: Unknown mcast interface: yam0 [ 633.620363][ T7639] IPVS: Unknown mcast interface: yam0 [ 633.624285][ T7652] netlink: 'syz-executor.1': attribute type 2 has an invalid length. 01:41:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) r3 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x2, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") ioctl$sock_kcm_SIOCKCMUNATTACH(r3, 0x89e1, &(0x7f00000002c0)={r4}) openat$md(0xffffffffffffff9c, &(0x7f0000000000)='/dev/md0\x00', 0x8502, 0x0) r5 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r5, 0x4d) getsockopt$inet6_IPV6_IPSEC_POLICY(r5, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@mcast2, @in=@loopback}}, {{@in6}, 0x0, @in=@multicast1}}, &(0x7f0000000440)=0xe8) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:41:58 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:41:58 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 633.778177][ T32] audit: type=1326 audit(1571794918.826:69): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=7616 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45cd3a code=0xffff0000 01:41:58 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) semop(0x0, &(0x7f0000000080)=[{}], 0x2) semctl$IPC_RMID(0x0, 0x0, 0x10) 01:41:58 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$IMSETDEVNAME(r6, 0x80184947, &(0x7f0000000040)={0x7, 'syz0\x00'}) 01:41:58 executing program 1: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0xa00000000000000, 0x80, 0x0, 0x78) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$media(&(0x7f00000001c0)='/dev/media#\x00', 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0xc0347c03, &(0x7f0000000000)) socketpair$unix(0x1, 0x0, 0x0, 0x0) 01:41:59 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 633.948560][ T7668] IPVS: Unknown mcast interface: yam0 01:41:59 executing program 1: setitimer(0x1, &(0x7f0000000080)={{0x77359400}, {0x0, 0x7530}}, 0x0) 01:41:59 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:41:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000040)={0x0, 'bridge0\x00', 0x2}, 0xffffffffffffffdb) 01:41:59 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:41:59 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000100)={0x6, &(0x7f0000000000)=[{0xfd, 0x7, 0x4, 0x40}, {0x40, 0x1, 0xfd, 0x7fffffff}, {0x4, 0x7, 0x1, 0x8}, {0x33a4, 0x3, 0x7}, {0x1b19, 0xe0, 0x5, 0x1}, {0x9, 0x7f, 0xf8, 0xfffffffb}]}, 0x10) r1 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:41:59 executing program 1: 01:41:59 executing program 5: 01:41:59 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:41:59 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r4, 0x4018620d, &(0x7f0000000040)={0x73622a85, 0x1000, 0x2}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x800004001fe) r8 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r8, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) [ 634.506233][ T7800] device nr0 entered promiscuous mode 01:41:59 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f00000001c0)={0x79}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r0, 0xae80, 0x0) 01:41:59 executing program 1: 01:41:59 executing program 5: 01:41:59 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:41:59 executing program 1: 01:41:59 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f00000001c0)={0x79}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r0, 0xae80, 0x0) 01:41:59 executing program 5: [ 635.048264][ T7819] IPVS: Unknown mcast interface: yam0 [ 635.058286][ T7811] IPVS: Unknown mcast interface: yam0 [ 635.084550][ T7802] device nr0 entered promiscuous mode 01:42:00 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000100)=0x200000c0) r3 = accept4$inet(0xffffffffffffffff, &(0x7f00000003c0)={0x2, 0x0, @multicast2}, &(0x7f0000000440)=0x10, 0x140000) getpeername$inet(r3, &(0x7f0000000480)={0x2, 0x0, @broadcast}, &(0x7f00000004c0)=0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4d) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r4, 0x84, 0x6e, &(0x7f00000002c0)=[@in6={0xa, 0x4e22, 0x40, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x40}, @in6={0xa, 0x4e20, 0x6, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xc7}, @in6={0xa, 0x4e21, 0x3, @loopback, 0x5}, @in6={0xa, 0x4e24, 0xec1, @dev={0xfe, 0x80, [], 0x19}}, @in6={0xa, 0x4e20, 0x4, @dev={0xfe, 0x80, [], 0xd}, 0xa6af}, @in6={0xa, 0x4e24, 0x2, @dev={0xfe, 0x80, [], 0x23}, 0x80000001}, @in6={0xa, 0x4e21, 0x9, @local, 0x7}], 0xc4) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x90ad) 01:42:00 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:00 executing program 1: 01:42:00 executing program 5: 01:42:00 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f00000001c0)={0x79}) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_SET_REGS(r0, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r0, 0xae80, 0x0) 01:42:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) fcntl$setsig(r3, 0xa, 0x2b) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) [ 635.330283][ T7838] IPVS: Unknown mcast interface: yam0 01:42:00 executing program 1: 01:42:00 executing program 5: 01:42:00 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 635.423261][ T7844] device nr0 entered promiscuous mode 01:42:00 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r1, 0xae80, 0x0) 01:42:00 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept$unix(r4, &(0x7f0000000040)=@abs, &(0x7f00000000c0)=0x6e) fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400012) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:42:00 executing program 5: [ 635.855313][ T7866] IPVS: Unknown mcast interface: yam0 [ 635.898804][ T7844] device nr0 entered promiscuous mode 01:42:01 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="0004000000e45a1f21dd20073c2c85f8d0b6efb57b52ee567cacb8ba4944efa00d74877bb6b1d3a3e796960a52d328d31357754ec3f6d014237b541851feffb962d1d30491a76cdfc557d40f9e99b415103c0b68ab3a3172f58a56b44e7477ce59908d67055746b4d88a514c12ba63fd50e99b3b7652c0e168b27aa9e26426cc60d81a7f8823bb7d3acc8bbe0df72001ccdc285ea5fbd6e7afefe5d6d6d822"], 0x90ad) 01:42:01 executing program 1: 01:42:01 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:01 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r1, 0xae80, 0x0) 01:42:01 executing program 5: 01:42:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x5, 0x1) ioctl$VIDIOC_SUBDEV_S_FMT(r2, 0xc0585605, &(0x7f0000000040)={0x0, 0x0, {0x800, 0x7, 0x1002, 0x8, 0x5, 0x4, 0x2, 0x4}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000100), 0x18) 01:42:01 executing program 5: 01:42:01 executing program 1: 01:42:01 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r1, 0xae80, 0x0) 01:42:01 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) [ 636.186544][ T7882] device nr0 entered promiscuous mode 01:42:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_REFRESH(r2, 0x2402, 0x6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0xa, 0x1, 0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r6, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x1}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r6, 0x84, 0x1f, &(0x7f0000000180)={r7, @in={{0x2, 0x4e23, @rand_addr=0x5}}, 0x28, 0x4}, &(0x7f0000000240)=0x90) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$VIDIOC_SUBDEV_S_SELECTION(r10, 0xc040563e, &(0x7f0000000040)={0x0, 0x0, 0x6816a4aae0569978, 0x4, {0x8000, 0x1000, 0x7, 0x71a}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:42:01 executing program 1: [ 636.594597][ T7904] IPVS: Unknown mcast interface: yam0 [ 636.631458][ T7882] device nr0 entered promiscuous mode [ 636.711135][ T7905] IPVS: Unknown mcast interface: yam0 01:42:01 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r2 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$setopts(0xffffffffffffffff, r2, 0x4, 0x2b) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(0xffffffffffffffff, 0x111, 0x1, 0x6, 0x4) 01:42:01 executing program 5: 01:42:01 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:01 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 01:42:01 executing program 1: 01:42:01 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0x13, 0x0, 0x6) socketpair(0x5, 0x2ceaffcb7ec7dac7, 0x63, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f00000000c0)={'bond_slave_1\x00', &(0x7f0000000080)=@ethtool_sset_info={0x37, 0x20, 0x3, [0xfb, 0x1000, 0x800, 0x3, 0x5, 0x4]}}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, '\x00\x00m0mz\x01/\x11V\xa9\x99\x00'}, 0x18) 01:42:01 executing program 1: 01:42:01 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, 0x0, 0x0) 01:42:02 executing program 5: [ 636.948691][ T7920] device nr0 entered promiscuous mode 01:42:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:02 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x93\x00', 0x14}, 0x382) 01:42:02 executing program 1: [ 637.411592][ T7920] device nr0 entered promiscuous mode 01:42:02 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, @perf_config_ext}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0xa4, &(0x7f0000000040)=[{&(0x7f0000000100)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x400000c) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bind$isdn(r4, &(0x7f0000000540)={0x22, 0x1, 0x9, 0xf5, 0x7}, 0x6) writev(r3, &(0x7f0000000880)=[{&(0x7f0000000080)="819ce69d3018e9084a630884a08c31a7147dcab71eff053e78ea08cf44886fe4509bca29d3483b890761af4ca132bba44f0d6b6fc1b2b835d57ac064", 0x3c}, {&(0x7f0000001b80)="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", 0x1000}, {&(0x7f00000002c0)="7fb7710c384a69aa275b1542d5da24007c3484c688b5c4a8a12e8199f92665859d59a9d8f9c92a77f79b117201e7511212c67b71d39568eb72d3b80ff69ff0dfe974142522d582bcbadd80ed1e9af1ef5dd5dc3a135cddd02d79c4957e7db1dd9ab2c2d6d647e7146a61963034f9f687c4f001868ea5793bf509f3f1a9e99bc0e259387591794b9efa919d3ff018f3f9c8000ff5a8e3c8815d0df7e0b8eb0aa561bff377fda1c8ecafab9e47f2003d4f9e7cf34c6bf1", 0xb6}, {&(0x7f0000000140)}, {&(0x7f0000000440)="34e249e56195be5215300f2fecd9d0b1ea093cd316d8693b7c9bd2d347029b6887a62b88db80c66b3e9f8c145789e1321964e9988baf9828c1ec2741e64cf848067b1969270400ae6308e7b550ed80164729a156b1ad5d0dbbadf74b2bfeb4dca0da0c51e30d69c4944306660ba3dcf378768db66cc08e7bffd683939185f9b47c4abc1ce0bf8b9f42bb79a304e4fa18ac95c3a8f1578b4304197bd3a83dcc181466d2e96f87c7d0c89e4f3ff5d61867fc8066498115d4d1f979f67a522270ba2472fa988ffab3d016caa6086eff3195e0794cfc81680c6652d4f8844289cf58b0a7e6e29d993ce1a2f07ade40350ca17a7e32f627dd", 0xf6}, {&(0x7f0000000380)="f61b60fe05c1a709f42a9050c2600651722e4de7bf10b547c928cdaef9f2137bf3399f5e06a1ffe501aa2444e512de9f70a45e65fc58630c336297e4d263146fedd08a92b39c022558f95b1a01ddf6765ef963b46309af3d9bd5aaf6673bc53cb4b5d665fb00704939babcab5f2ce442f34f49087bbef65e", 0x78}, {&(0x7f00000005c0)="63d733b0a684c98a1ce5381fb96a3fb97288bd4452a86ddd4de43b465de064c0483bcefa8a6fdedcb4502f50af5d4c425f6263c38d6ec4a32fbe7fa1f238664e1df34d50868d46f06e7670118e620503a22aeecd9b23f0ed16639572a176850c5e0b6b87657eb619db270e2734d0583571968e2e3bd590b362c276eef2a19743b879d4503d7fc1a85805ca8a1f2c5ccda8eab4f067600b85c29536f6a1ff7bef805249eeabcbae2357dab1b99ee3890b26e76f838cc7923430fc469117d8fb722553dbbbc267f1016b5ddd104e16d9c357d84961b638d97f3631fb8f0363a897d80d4e48e8ef148a9aee593e928681373fb5b951", 0xf4}, {&(0x7f00000006c0)="a1af35aceb79850cd094149ba88015c7964ca4e3469c8a280d742943714f33982114fd175183a302ca690bb17e317aea532a462c42c2774a8bc448ea320371252fc93466777a50b4fef0bd6f1e7185b9f0a1e49a1f7cff8a4a5c86b8e2948df351944a6ae8881c1972c331a5eda41eb781730f1811bd5e9265cce9aaae43df22bafed640bbbdf7784a8cfdd99248b7a939f02edb8b54c58b06ca804a9def8cbfb67e706dc70b8575dde27dbcad6a5ddb5da832505b699b970be9342260b952d41d22886f9133eae00b74324dc158844cd4bd0054f639fdbb980c61347dab3c46323778", 0xe3}, {&(0x7f00000007c0)="810c01a171f7c258d298d884f8d804832df3f95a3813a0bb163cfb4aaba3a107bb532f3032c834452eeb42a8503591ec24aa50b6a7f33a1924732d93a508ef7aff220cdfd83eb25e1fbe2bd5b1003daa7cff1ccb460227dc2add9eb634f669de982141f2000d27e7b8478a2acaa4afb0340c5f5e1ca2b212c0cfc16b60dbf8bfadf3ed228f365e675d180f37cd6a24", 0x8f}], 0x9) 01:42:02 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000080)={'veth1\x00', &(0x7f0000000040)=@ethtool_rxfh={0x46, 0x4, 0x80000001, 0xfb3c, 0x1, "7f8044", 0x80000001, [0x6, 0xfabf77d, 0x20, 0x0, 0x7, 0x7f, 0x1, 0x8, 0xf]}}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setns(r6, 0x20000) 01:42:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 01:42:02 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:02 executing program 5: 01:42:02 executing program 1: 01:42:02 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 637.595480][ T7954] IPVS: Unknown mcast interface: yam0 [ 637.634868][ T7954] IPVS: Unknown mcast interface: yam0 01:42:02 executing program 5: 01:42:02 executing program 1: request_key(0x0, 0x0, 0x0, 0xfffffffffffffffd) epoll_create1(0x0) socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x0) socket$inet_udp(0x2, 0x2, 0x0) creat(0x0, 0x0) r0 = socket$inet6(0xa, 0x2000000001, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', 0x0}) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 01:42:02 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) [ 637.741525][ T7964] device nr0 entered promiscuous mode 01:42:02 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r5, 0xc0305710, &(0x7f0000000040)={0x0, 0x3, 0x1, 0x7fffffff}) r6 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r6, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:42:02 executing program 5: [ 638.093437][ T7980] IPVS: Unknown mcast interface: yam0 [ 638.116426][ T7977] IPVS: Unknown mcast interface: yam0 [ 638.131129][ T7964] device nr0 entered promiscuous mode 01:42:03 executing program 5: 01:42:03 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r1, 0xae80, 0x0) 01:42:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) 01:42:03 executing program 1: 01:42:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) clone3(&(0x7f00000001c0)={0x204000, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), 0x41, 0x0, &(0x7f0000000100)=""/140, 0x8c, &(0x7f00000002c0)=""/252}, 0x40) r3 = socket(0xa, 0x5bec34cc629bcb76, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") recvmmsg(r4, &(0x7f0000004800)=[{{&(0x7f0000000200)=@x25, 0x80, &(0x7f00000004c0)=[{&(0x7f00000003c0)=""/156, 0x9c}, {&(0x7f0000000480)=""/11, 0xb}], 0x2}}, {{&(0x7f0000000500)=@nfc, 0x80, &(0x7f0000001c00)=[{&(0x7f0000000580)=""/4096, 0x1000}, {&(0x7f0000001580)=""/45, 0x2d}, {&(0x7f00000015c0)=""/108, 0x6c}, {&(0x7f0000001640)=""/147, 0x93}, {&(0x7f0000001700)=""/178, 0xb2}, {&(0x7f00000017c0)=""/229, 0xe5}, {&(0x7f00000018c0)=""/132, 0x84}, {&(0x7f0000001980)=""/252, 0xfc}, {&(0x7f0000001a80)=""/107, 0x6b}, {&(0x7f0000001b00)=""/247, 0xf7}], 0xa, &(0x7f0000001cc0)=""/33, 0x21}, 0xffffffff}, {{&(0x7f0000001d00), 0x80, &(0x7f0000004140)=[{&(0x7f0000001d80)=""/4096, 0x1000}, {&(0x7f0000002d80)=""/218, 0xda}, {&(0x7f0000002e80)=""/75, 0x4b}, {&(0x7f0000002f00)=""/4096, 0x1000}, {&(0x7f0000003f00)}, {&(0x7f0000003f40)=""/48, 0x30}, {&(0x7f0000003f80)=""/203, 0xcb}, {&(0x7f0000004080)=""/71, 0x47}, {&(0x7f0000004100)=""/22, 0x16}], 0x9, 0xffffffffffffffff}, 0x4}, {{&(0x7f0000004200)=@nfc, 0x80, &(0x7f0000004680)=[{&(0x7f0000004280)=""/231, 0xe7}, {&(0x7f0000004380)=""/129, 0x81}, {&(0x7f0000004440)=""/91, 0x5b}, {&(0x7f00000044c0)=""/151, 0x97}, {&(0x7f0000004580)=""/215, 0xd7}], 0x5, &(0x7f0000004700)=""/236, 0xec}, 0x5}], 0x4, 0x80000000, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:42:03 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) syz_usb_connect(0x3, 0x1319, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], &(0x7f00000005c0)=ANY=[@ANYBLOB='\n\x00\x00\x00', @ANYPTR=&(0x7f0000000100)=ANY=[@ANYBLOB="0a060003000692202000"], @ANYBLOB="1b000000", @ANYPTR=&(0x7f00000002c0)=ANY=[@ANYBLOB="050f1b00020b1001e50400ff000900060b10010c0400060500005a"], @ANYBLOB="0400000004000000566a053a48c7f085ccd173258872c60e20c80c3fb6fa4e45c771904c2299d266ac931510c9fac4251ffaaac0824ea1583b9100db14b79be266573e0d5eb2a0cb", @ANYPTR=&(0x7f0000000300)=ANY=[@ANYBLOB="0403fff8"], @ANYBLOB="04000000", @ANYPTR=&(0x7f0000000340)=ANY=[@ANYBLOB="0403aa08"], @ANYBLOB='o\x00\x00\x00', @ANYPTR=&(0x7f0000000380)=ANY=[@ANYBLOB="6f0366affc4750b5c5efe1754f547f6d498ecc46df3df15ea22c6da19145c6a7069f8ec5b1597752d9fd71cb566bfa6764fe6446f1e96f787e707d0bf4ed8ded48d84bf7180c95c8c7ef4cff6e5c8b411309418085f604bbd15eb704ad1a4501956af3a2511d941457b564f7f7dc83"], @ANYBLOB=';\x00\x00\x00', @ANYPTR=&(0x7f0000000440)=ANY=[@ANYBLOB="3b03fb3b8387da91427c8643e61ca0c2591f73139a177713f9b02cd7baedfdac1d2e0048600225289dfb629686ab36525e157bb74cfec5c5fe0aa2"]]) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r2 = semget$private(0x0, 0x2000000010a, 0x0) semop(r2, &(0x7f0000000000)=[{0x0, 0x6}, {}], 0x2) semctl$GETALL(r2, 0x0, 0xd, 0x0) semop(r2, &(0x7f0000000540)=[{0x2, 0x7, 0x800}, {0x2, 0x6}, {0x3, 0xa3d0}, {0x0, 0xfff8, 0x800}, {0x0, 0x7}, {0x2, 0x5a29, 0x1000}], 0x6) listen(r1, 0x4d) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000000)) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) syz_open_dev$vcsa(&(0x7f0000000500)='/dev/vcsa#\x00', 0xffffffffffffa1e0, 0x48ca00) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:42:03 executing program 1: 01:42:03 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, &(0x7f00000001c0)={0x79}) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x2) ioctl$KVM_SET_REGS(r1, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r1, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r1, 0xae80, 0x0) 01:42:03 executing program 5: 01:42:03 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'y`m0\x00', 0x4}, 0x18) 01:42:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 01:42:03 executing program 1: 01:42:03 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:03 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x70, 0x3ea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f00000000c0)='queue1\x00\x00\x00\x00\x00\x00\x00\x001;\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01\x00\x00\x06\x00\x00\x00\x00\x00\xcc\xbf}\xdd\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb2\x1e\x00', 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = dup2(r0, r1) write$sndseq(r2, 0x0, 0x0) 01:42:03 executing program 1: mkdir(&(0x7f0000002000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(0x0, &(0x7f0000000480)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', &(0x7f0000000300)='tracefs\x00', 0x0, 0x0) symlink(0x0, &(0x7f00000002c0)='./file0\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000780)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) unlink(&(0x7f0000000000)='./file0\x00') [ 638.730871][ T8010] IPVS: Unknown mcast interface: y`m0 [ 638.759685][ T8013] IPVS: Unknown mcast interface: y`m0 [ 638.772121][ T31] usb 5-1: new high-speed USB device number 8 using dummy_hcd 01:42:03 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 01:42:03 executing program 2: writev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000080)="86dea0e4512f4509ee5b5731ad7ec92e791a4ab16b591117ed512b1e2bd7634f5d94893dbd1fef4be96b6cf64eec33ad44f6c3db83045e314573c6e60e68b9af4c33c3defb0f0188cae84ff6423004a9d93e8571b7383d9576164923e62a2a5c48b30a4d333fd1ac7a42ebdc1af8d3f54be1cbcbb2c19105bc0fe573622cb7d9921179628900ee589bbe32f2016eaf911f769c4b26e5115c4a2542e1330cf16f75301bdf60095b3e0f7884540b6828b8e40932564df52090c2c63cddb884fe914f7fc6c29a12fbc247eca67d34f7550d70302a0e30acda2ed41b304788dc28c84c", 0xe1}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) [ 639.036628][ T31] usb 5-1: Using ep0 maxpacket: 32 [ 639.036751][ T8087] IPVS: Unknown mcast interface: yam0 [ 639.302194][ T31] usb 5-1: config index 0 descriptor too short (expected 9, got 0) [ 639.310193][ T31] usb 5-1: can't read configurations, error -22 [ 639.461954][ T31] usb 5-1: new high-speed USB device number 9 using dummy_hcd [ 639.701921][ T31] usb 5-1: Using ep0 maxpacket: 32 [ 639.951989][ T31] usb 5-1: config index 0 descriptor too short (expected 9, got 0) [ 639.960067][ T31] usb 5-1: can't read configurations, error -22 [ 639.966747][ T31] usb usb5-port1: attempt power cycle [ 640.611112][ T8136] device nr0 entered promiscuous mode [ 640.691914][ T31] usb 5-1: new high-speed USB device number 10 using dummy_hcd [ 640.931807][ T31] usb 5-1: Using ep0 maxpacket: 32 [ 641.182079][ T31] usb 5-1: config index 0 descriptor too short (expected 9, got 0) [ 641.190211][ T31] usb 5-1: can't read configurations, error -22 [ 641.341883][ T31] usb 5-1: new high-speed USB device number 11 using dummy_hcd [ 641.591803][ T31] usb 5-1: Using ep0 maxpacket: 32 01:42:06 executing program 1: rt_sigprocmask(0x0, &(0x7f0000000140)={0xfffffffffffffffd}, 0x0, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = gettid() tkill(r3, 0x3c) 01:42:06 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 01:42:06 executing program 2: r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x8, 0x40) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r0, 0xc1105517, &(0x7f00000002c0)={{0x8, 0x0, 0x1, 0x8, 'syz1\x00', 0x4}, 0x0, 0x3, 0x7f, r1, 0x8, 0x384d, 'syz0\x00', &(0x7f0000000100)=['keyringposix_acl_access^proc-\x00', 'mime_type*&(wlan1ppp1vboxnet0keyringe&+-ppp0user\x00', 'syz_tun\x00', 'syz_tun\x00', 'syz_tun\x00', 'syz_tun\x00', 'syz_tun\x00', 'syz_tun\x00'], 0x7f, [], [0x1, 0x8, 0x1, 0x200]}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0xa, 0x1, 0x0) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008914, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r7 = dup(r6) write$USERIO_CMD_SET_PORT_TYPE(r7, &(0x7f0000000040), 0x2) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f00000000c0)={0x1, 'syz_tun\x00', 0x7}, 0xcf9d782007d233ca) 01:42:06 executing program 5: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz'}, &(0x7f0000000a80), 0xfffffffffffffffd) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) syz_open_dev$evdev(&(0x7f00000000c0)='/dev/input/even\a#\x00', 0x101, 0x80000) accept$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xb2) r0 = socket$inet6(0xa, 0x2000000001, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x89f4, &(0x7f0000000080)={'sit0\x00', 0x0}) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) ioctl$EXT4_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x0) 01:42:06 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) r3 = semget$private(0x0, 0x2000000010a, 0x0) semop(r3, &(0x7f0000000000)=[{0x0, 0x6}, {}], 0x2) semctl$GETALL(r3, 0x0, 0xd, 0x0) semctl$SEM_INFO(r3, 0x1, 0x13, &(0x7f0000001b80)=""/4096) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 641.776815][ T31] usb 5-1: device descriptor read/all, error -71 [ 641.791593][ T31] usb usb5-port1: unable to enumerate USB device 01:42:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:06 executing program 1 (fault-call:7 fault-nth:0): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 641.923610][ T8208] device nr0 entered promiscuous mode 01:42:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) ioctl$VIDIOC_S_CTRL(r2, 0xc008561c, &(0x7f00000000c0)={0x6, 0x80}) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x3, 'yam0\x00\xaf\xdc\xe10\xec\x88\xfaX\x00'}, 0x18) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(0xffffffffffffffff, 0x84, 0x6b, &(0x7f0000000100)=[@in6={0xa, 0x4e23, 0x8001, @local, 0x2}], 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCGSID(r6, 0x5429, &(0x7f00000001c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x406, r9) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) r12 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r12, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x1, 0x0, 0xffffffffffffffa2}, 0x0) r13 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r13, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r14 = fcntl$dupfd(r13, 0x203, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$PPPIOCGUNIT(r14, 0x80047456, &(0x7f0000000180)) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$VHOST_VSOCK_SET_GUEST_CID(r11, 0x4008af60, &(0x7f0000000140)={@my=0x1}) ioctl$TIOCGSID(r8, 0x5429, &(0x7f0000000040)=0x0) ptrace$getenv(0x4201, r15, 0xff, &(0x7f0000000080)) [ 642.111732][ T8263] FAULT_INJECTION: forcing a failure. [ 642.111732][ T8263] name failslab, interval 1, probability 0, space 0, times 0 [ 642.124695][ T8263] CPU: 0 PID: 8263 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 642.132549][ T8263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 642.142650][ T8263] Call Trace: [ 642.146011][ T8263] dump_stack+0x191/0x1f0 [ 642.150425][ T8263] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 642.156390][ T8263] should_fail+0xa3f/0xa50 [ 642.160860][ T8263] __should_failslab+0x264/0x280 [ 642.165835][ T8263] should_failslab+0x29/0x70 [ 642.170456][ T8263] __kmalloc+0xae/0x430 [ 642.174651][ T8263] ? kmsan_memcpy_memmove_metadata+0x109/0x2e0 [ 642.180831][ T8263] ? kcalloc+0x86/0x110 [ 642.185017][ T8263] kcalloc+0x86/0x110 [ 642.189033][ T8263] start_sync_thread+0x1147/0x4310 [ 642.194189][ T8263] ? refcount_dec_and_test_checked+0x14c/0x210 [ 642.200374][ T8263] ? sync_thread_master+0x1b10/0x1b10 [ 642.205798][ T8263] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 642.211745][ T8263] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 642.217688][ T8263] do_ip_vs_set_ctl+0x52f/0x2cb0 [ 642.222679][ T8263] ? do_ip_setsockopt+0x435a/0x5fa0 [ 642.227920][ T8263] ? kmsan_internal_set_origin+0x6a/0xb0 [ 642.233587][ T8263] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 642.239694][ T8263] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 642.245630][ T8263] ? local_bh_enable+0x40/0x40 [ 642.250429][ T8263] nf_setsockopt+0x47c/0x4e0 [ 642.255066][ T8263] ip_setsockopt+0x24a/0x2b0 [ 642.259792][ T8263] udp_setsockopt+0x108/0x1b0 [ 642.264515][ T8263] ? udp_lib_setsockopt+0x1140/0x1140 [ 642.269908][ T8263] ipv6_setsockopt+0x310/0x350 [ 642.274695][ T8263] ? ipv6_update_options+0x4f0/0x4f0 [ 642.280009][ T8263] ? ipv6_update_options+0x4f0/0x4f0 [ 642.285326][ T8263] tcp_setsockopt+0x1c0/0x1f0 [ 642.290035][ T8263] ? tcp_disconnect+0x1d40/0x1d40 [ 642.295092][ T8263] sock_common_setsockopt+0x13b/0x170 [ 642.300498][ T8263] __sys_setsockopt+0x7c3/0xa30 [ 642.305401][ T8263] ? sock_common_recvmsg+0x290/0x290 [ 642.310728][ T8263] __se_sys_setsockopt+0xdd/0x100 [ 642.315785][ T8263] __x64_sys_setsockopt+0x62/0x80 [ 642.320835][ T8263] do_syscall_64+0xb6/0x160 [ 642.325368][ T8263] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 642.331280][ T8263] RIP: 0033:0x459ef9 [ 642.335202][ T8263] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 642.354829][ T8263] RSP: 002b:00007fdd3014ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 642.363270][ T8263] RAX: ffffffffffffffda RBX: 00007fdd3014ac90 RCX: 0000000000459ef9 [ 642.371253][ T8263] RDX: 000000000000048b RSI: 0000000000000000 RDI: 0000000000000006 [ 642.379259][ T8263] RBP: 000000000075bf20 R08: 0000000000000018 R09: 0000000000000000 [ 642.387247][ T8263] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fdd3014b6d4 [ 642.395238][ T8263] R13: 00000000004cfa80 R14: 00000000004de790 R15: 0000000000000007 01:42:07 executing program 5 (fault-call:4 fault-nth:0): syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:42:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 642.422337][ T8267] IPVS: Unknown mcast interface: yam0 01:42:07 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f00000000c0)={0x0, 0x4, 0x101, 0x6}) r3 = fcntl$dupfd(r1, 0x0, r0) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$DRM_IOCTL_GET_UNIQUE(r4, 0xc0106401, &(0x7f0000000040)={0x1000, &(0x7f00000002c0)=""/4096}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r7 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r7, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") ppoll(&(0x7f0000000100)=[{r6, 0x4000}, {r7}], 0x2, &(0x7f0000000140), &(0x7f0000000180)={0xff}, 0x8) 01:42:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x0, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 642.606109][ T8279] IPVS: Unknown mcast interface: yam0 01:42:07 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:07 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x4d) prctl$PR_GET_CHILD_SUBREAPER(0x25) r2 = accept$inet6(r1, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={[], [], @dev}}, &(0x7f00000000c0)=0x1c) recvmmsg(r2, &(0x7f00000018c0)=[{{&(0x7f00000001c0)=@isdn, 0x80, &(0x7f0000000380)=[{&(0x7f0000000240)=""/35, 0x23}, {&(0x7f0000000280)=""/240, 0xf0}], 0x2, &(0x7f00000003c0)=""/177, 0xb1}, 0x7}, {{&(0x7f0000000480)=@tipc=@name, 0x80, &(0x7f0000000540)=[{&(0x7f0000000500)=""/47, 0x2f}], 0x1, &(0x7f0000000580)=""/200, 0xc8}, 0x20}, {{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000680)=""/57, 0x39}, {&(0x7f00000006c0)=""/169, 0xa9}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x3, &(0x7f00000017c0)=""/253, 0xfd}, 0x6}], 0x3, 0x40010200, &(0x7f0000001980)={0x0, 0x1c9c380}) read(r0, &(0x7f0000000100)=""/71, 0x47) [ 643.030352][ T8405] device nr0 entered promiscuous mode 01:42:08 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xffffffffffffffff, 0x10000) write$smack_current(r1, &(0x7f0000000100)='nr0\x01\x00', 0x5) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r3 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r2, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r2, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:42:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r0) openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) r2 = socket(0xa, 0x3, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r2, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:42:08 executing program 1 (fault-call:7 fault-nth:1): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:08 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040), 0x0, 0x4) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) [ 643.354286][ T8505] FAULT_INJECTION: forcing a failure. [ 643.354286][ T8505] name failslab, interval 1, probability 0, space 0, times 0 [ 643.367249][ T8505] CPU: 1 PID: 8505 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 643.375087][ T8505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 643.385159][ T8505] Call Trace: [ 643.388485][ T8505] dump_stack+0x191/0x1f0 [ 643.392849][ T8505] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 643.398777][ T8505] should_fail+0xa3f/0xa50 [ 643.403237][ T8505] __should_failslab+0x264/0x280 [ 643.408209][ T8505] should_failslab+0x29/0x70 [ 643.412830][ T8505] __kmalloc+0xae/0x430 [ 643.417019][ T8505] ? start_sync_thread+0x1325/0x4310 [ 643.422334][ T8505] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 643.428267][ T8505] start_sync_thread+0x1325/0x4310 [ 643.433422][ T8505] ? sync_thread_master+0x1b10/0x1b10 [ 643.438837][ T8505] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 643.444777][ T8505] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 643.450698][ T8505] do_ip_vs_set_ctl+0x52f/0x2cb0 [ 643.455675][ T8505] ? do_ip_setsockopt+0x435a/0x5fa0 [ 643.460917][ T8505] ? kmsan_internal_set_origin+0x6a/0xb0 [ 643.466581][ T8505] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 643.472683][ T8505] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 643.478604][ T8505] ? local_bh_enable+0x40/0x40 [ 643.483395][ T8505] nf_setsockopt+0x47c/0x4e0 [ 643.488028][ T8505] ip_setsockopt+0x24a/0x2b0 [ 643.492656][ T8505] udp_setsockopt+0x108/0x1b0 [ 643.497366][ T8505] ? udp_lib_setsockopt+0x1140/0x1140 [ 643.502763][ T8505] ipv6_setsockopt+0x310/0x350 [ 643.507546][ T8505] ? ipv6_update_options+0x4f0/0x4f0 [ 643.512867][ T8505] ? ipv6_update_options+0x4f0/0x4f0 [ 643.518175][ T8505] tcp_setsockopt+0x1c0/0x1f0 [ 643.522882][ T8505] ? tcp_disconnect+0x1d40/0x1d40 [ 643.527942][ T8505] sock_common_setsockopt+0x13b/0x170 [ 643.533348][ T8505] __sys_setsockopt+0x7c3/0xa30 [ 643.538231][ T8505] ? sock_common_recvmsg+0x290/0x290 [ 643.543547][ T8505] __se_sys_setsockopt+0xdd/0x100 [ 643.548602][ T8505] __x64_sys_setsockopt+0x62/0x80 [ 643.553660][ T8505] do_syscall_64+0xb6/0x160 [ 643.558202][ T8505] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 643.564106][ T8505] RIP: 0033:0x459ef9 [ 643.568038][ T8505] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 643.587657][ T8505] RSP: 002b:00007fdd3014ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 643.596097][ T8505] RAX: ffffffffffffffda RBX: 00007fdd3014ac90 RCX: 0000000000459ef9 [ 643.604091][ T8505] RDX: 000000000000048b RSI: 0000000000000000 RDI: 0000000000000006 [ 643.612090][ T8505] RBP: 000000000075bf20 R08: 0000000000000018 R09: 0000000000000000 [ 643.620123][ T8505] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fdd3014b6d4 [ 643.628107][ T8505] R13: 00000000004cfa80 R14: 00000000004de790 R15: 0000000000000007 01:42:08 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:08 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000200)=[{{&(0x7f0000000040)=@nfc={0x27, 0x0, 0x0, 0x1}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="23774eeebbc5dde815101a77e6c5c1c82874f72b3a570c009bb5b2ee5cca7a6b85f6af955ca18f412db2e9fc97f365498011a2e8ceb778cdcbea3e1e168b397d09a0feb24f674dc6660221d4e01081c629fa3cd9bad5715239af5dc64a7bc230caa9410927980244dd714fa18cecd1c07d26f99cc77f71d84e05f44efaf888ae7931d5", 0x83}, {&(0x7f0000000180)="cfb3e5d4d021f573498745bca8408896e5e515f53d206a201416b02829c34e9d06", 0x21}], 0x2, &(0x7f00000002c0)=[{0xe8, 0x4f, 0xe031, "cb2fe1fe2f92f4cb087c01edbbdb8663e615d104bb17db1e8a2ec75c44b4ca11aae499d3a4c2d404546d64e43e7b3b822c5b70850bdfa3da24bc3d6889f69e57a2bdd08f4ce62ae04218467fd17f5ff711be420772d5a45648502743a2a7759713fd2c264c03d3b6a3370da16de8fe630759906914bf7573f501b0ddb0cbce498182dc62b3b75d50b6f9878dfcdd426a218e3804bb04ca25f44060c9953b34be019677d825396bef00a3d7c39f46e4a7dfa79af34a01c5d34cc4411cd4a1e1beeae89db8478956e208d2cdb16f3abaca445b9c88103d6f"}, {0xb0, 0x3, 0x1, "0081150d272043ee9afd609166f57b4271e06b0494256f753d27bcb8b48d3545c6f6914917ddbb5ec74419ebe3633754ffb2a2f302cc912d5eff0d7519aa606a9d209006aafc89932db529650243f50f777a30d1fd52d9fdeabc5ec0804cbd737338be9ddc7232d3a1d604d946caa6c1666174022db8058d6782432d6bf23e401695ccd42f4d252ad13c66af3bbbe57cbfc624b828d0b03287c7e435d48ab5"}, {0x60, 0x1, 0x30b, "c8c878c89cbe4956245139965ce6440457ba7c13500ada351a32e3545e37071a52ec55ec98963d0d20578790ad5f13c115ec04f2624f7b9add41df703950eb7eae8c78b7e8e34f779935"}, {0x38, 0x0, 0x3, "235cb34a88ab1cf412f54f0829c5f5408d6de6cda5463c8a617dd16ab5fb6f916b"}, {0xa0, 0x10a, 0x5, "6c99610667bc6adbd05c9a639f4fdbffd1f95874756ad2b609b2f4bbf0ad9d1307b3b1d3d2fed069cd15c6d7ba76ee90ed2cb828275dec50cff26fb40ce2a594660e22725466913a6b404afd0383d5336b3a96af3d674e2fddb31ceca33986fe454611c86eddf11089fa5ed00f6b0f0b7110c03ae923ab63336453dd8df74def157764da6c675ee576ff2be5"}], 0x2d0}}], 0x1, 0x840) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) [ 643.884070][ T8588] device nr0 entered promiscuous mode 01:42:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:09 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) [ 644.296073][ T8631] IPVS: Unknown mcast interface: yam0 [ 644.308035][ T8629] IPVS: Unknown mcast interface: yam0 [ 644.352668][ T8588] device nr0 entered promiscuous mode 01:42:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:09 executing program 1 (fault-call:7 fault-nth:2): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:09 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0xa, 0x1, 0x0) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) r5 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dlm-control\x00', 0x200, 0x0) ioctl$VIDIOC_G_EXT_CTRLS(r5, 0xc0205647, &(0x7f00000002c0)={0x4, 0x401, 0xffff0001, [], &(0x7f0000000280)={0x990a6b, 0x2, [], @p_u16=&(0x7f0000000240)=0x9cc3}}) listen(r4, 0x4d) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r4, 0x84, 0xf, &(0x7f0000000140)={r6, @in6={{0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, [], 0x13}, 0x1ff}}, 0x1, 0x4, 0x7f, 0x3ff, 0xfffffe00}, &(0x7f00000000c0)=0x98) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:42:09 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r1 = dup(r0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000080)=""/18, &(0x7f00000000c0)=0x12) r2 = syz_open_dev$sndpcmp(&(0x7f0000000180)='/dev/snd/pcmC#D#p\x00', 0xffffffffffffaad7, 0x80) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r4, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_LINK_RESET_STATS(r2, &(0x7f0000000380)={&(0x7f00000001c0), 0xc, &(0x7f0000000340)={&(0x7f0000000200)={0x104, r4, 0x4, 0x70bd2b, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x58, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3e}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x50}]}]}, @TIPC_NLA_BEARER={0x98, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x7, 0x7, @local, 0x6}}, {0x14, 0x2, @in={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x18}}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x633}, @TIPC_NLA_BEARER_PROP={0x4c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x2f}]}]}, 0x104}, 0x1, 0x0, 0x0, 0x20008050}, 0x40) syz_usb_ep_write(0xffffffffffffffff, 0x4, 0x0, 0x0) r5 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r5}], 0x1, 0x0) read(r5, &(0x7f0000000100)=""/71, 0x47) 01:42:09 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x1000000000000000, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = socket$inet6(0xa, 0x6, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000004c0)=0x0) ioctl$sock_SIOCSPGRP(r2, 0x8902, &(0x7f0000000500)=r4) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4d) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000000)=ANY=[@ANYBLOB="0400000000007e00"], 0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$VIDIOC_EXPBUF(r7, 0xc0405610, &(0x7f0000000480)={0x5, 0xab1}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$mouse(&(0x7f0000000540)='/dev/input/mo5se#\x00', 0x530a, 0x80200) ioctl$sock_kcm_SIOCKCMATTACH(r0, 0x89e0, &(0x7f00000005c0)={0xffffffffffffffff, r8}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) sendmsg$TIPC_CMD_SHOW_STATS(r14, &(0x7f0000000640)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2080000}, 0xc, &(0x7f0000000680)={&(0x7f0000000380)={0x1c, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {}, ["", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x24024000}, 0xc6e1edab2480e3d2) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="ef63776d7527a2dfcd033ecaa23007b7ed0baa8628cdfb6bacc104ea712511c11fe0ef9d51f52018c90308c61870601a5ed8a8d710bb7380ee2d70d5fc56477ed8e554dac9b53ec38d602bb1128f0e1e94dc842ada1d1d6a49485e414fff03f250f5a9f232df631d8de2060c1a7b54f2cd28e0bdbf6f9187aa3f3320e848a40b03296f72"], 0x90ad) [ 644.623047][ T8746] FAULT_INJECTION: forcing a failure. [ 644.623047][ T8746] name failslab, interval 1, probability 0, space 0, times 0 [ 644.636303][ T8746] CPU: 1 PID: 8746 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 644.644163][ T8746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 644.654260][ T8746] Call Trace: [ 644.657618][ T8746] dump_stack+0x191/0x1f0 [ 644.662038][ T8746] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 644.667995][ T8746] should_fail+0xa3f/0xa50 [ 644.672462][ T8746] __should_failslab+0x264/0x280 [ 644.677437][ T8746] should_failslab+0x29/0x70 [ 644.682053][ T8746] kmem_cache_alloc+0xd6/0xd10 [ 644.686845][ T8746] ? sock_alloc_inode+0x58/0x180 [ 644.691818][ T8746] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 644.697751][ T8746] sock_alloc_inode+0x58/0x180 [ 644.702548][ T8746] ? sockfs_init_fs_context+0x160/0x160 [ 644.708130][ T8746] new_inode_pseudo+0xb1/0x590 [ 644.712922][ T8746] __sock_create+0x2f1/0xf00 [ 644.717544][ T8746] ? kmsan_get_metadata+0x39/0x350 [ 644.722695][ T8746] ? kmsan_internal_set_origin+0x6a/0xb0 [ 644.728352][ T8746] sock_create_kern+0xf0/0x100 [ 644.733159][ T8746] start_sync_thread+0x18e9/0x4310 [ 644.738308][ T8746] ? sync_thread_master+0x1b10/0x1b10 [ 644.743718][ T8746] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 644.749677][ T8746] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 644.755611][ T8746] do_ip_vs_set_ctl+0x52f/0x2cb0 [ 644.760599][ T8746] ? do_ip_setsockopt+0x435a/0x5fa0 [ 644.765846][ T8746] ? kmsan_internal_set_origin+0x6a/0xb0 [ 644.771514][ T8746] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 644.777631][ T8746] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 644.783553][ T8746] ? local_bh_enable+0x40/0x40 [ 644.788349][ T8746] nf_setsockopt+0x47c/0x4e0 [ 644.792989][ T8746] ip_setsockopt+0x24a/0x2b0 [ 644.797620][ T8746] udp_setsockopt+0x108/0x1b0 [ 644.802332][ T8746] ? udp_lib_setsockopt+0x1140/0x1140 [ 644.807733][ T8746] ipv6_setsockopt+0x310/0x350 [ 644.812521][ T8746] ? ipv6_update_options+0x4f0/0x4f0 [ 644.817836][ T8746] ? ipv6_update_options+0x4f0/0x4f0 [ 644.823140][ T8746] tcp_setsockopt+0x1c0/0x1f0 [ 644.827847][ T8746] ? tcp_disconnect+0x1d40/0x1d40 [ 644.832903][ T8746] sock_common_setsockopt+0x13b/0x170 [ 644.838309][ T8746] __sys_setsockopt+0x7c3/0xa30 [ 644.843201][ T8746] ? sock_common_recvmsg+0x290/0x290 [ 644.848522][ T8746] __se_sys_setsockopt+0xdd/0x100 [ 644.853576][ T8746] __x64_sys_setsockopt+0x62/0x80 [ 644.858623][ T8746] do_syscall_64+0xb6/0x160 [ 644.863156][ T8746] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 644.869072][ T8746] RIP: 0033:0x459ef9 [ 644.872998][ T8746] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 644.892623][ T8746] RSP: 002b:00007fdd3014ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 644.901062][ T8746] RAX: ffffffffffffffda RBX: 00007fdd3014ac90 RCX: 0000000000459ef9 [ 644.909830][ T8746] RDX: 000000000000048b RSI: 0000000000000000 RDI: 0000000000000006 [ 644.917834][ T8746] RBP: 000000000075bf20 R08: 0000000000000018 R09: 0000000000000000 [ 644.925833][ T8746] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fdd3014b6d4 [ 644.933831][ T8746] R13: 00000000004cfa80 R14: 00000000004de790 R15: 0000000000000007 [ 644.942367][ T8746] socket: no more sockets [ 644.946741][ T8746] IPVS: Error during creation of socket; terminating [ 644.978347][ T8753] IPVS: Unknown mcast interface: yam0 01:42:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 645.008014][ T8786] device nr0 entered promiscuous mode 01:42:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:10 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket(0x1, 0x2, 0x24) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) write$vnet(r2, &(0x7f00000000c0)={0x1, {&(0x7f0000000040), 0x0, &(0x7f0000000080)=""/43, 0x1, 0x3}}, 0x68) 01:42:10 executing program 1 (fault-call:7 fault-nth:3): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 01:42:10 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") getsockopt$inet_int(r1, 0x0, 0xc, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 01:42:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) 01:42:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) [ 645.538970][ T8877] FAULT_INJECTION: forcing a failure. [ 645.538970][ T8877] name failslab, interval 1, probability 0, space 0, times 0 [ 645.551951][ T8877] CPU: 1 PID: 8877 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 645.559801][ T8877] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 645.569895][ T8877] Call Trace: [ 645.573229][ T8877] dump_stack+0x191/0x1f0 [ 645.577595][ T8877] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 645.583543][ T8877] should_fail+0xa3f/0xa50 [ 645.588004][ T8877] __should_failslab+0x264/0x280 [ 645.593166][ T8877] should_failslab+0x29/0x70 [ 645.597778][ T8877] kmem_cache_alloc+0xd6/0xd10 [ 645.602568][ T8877] ? sk_prot_alloc+0xed/0x5c0 [ 645.607298][ T8877] sk_prot_alloc+0xed/0x5c0 [ 645.611838][ T8877] sk_alloc+0xf3/0xb60 [ 645.615961][ T8877] inet_create+0x7d4/0x1380 [ 645.620506][ T8877] ? ipip_gro_complete+0x200/0x200 [ 645.625638][ T8877] __sock_create+0x8ee/0xf00 [ 645.630264][ T8877] sock_create_kern+0xf0/0x100 [ 645.635069][ T8877] start_sync_thread+0x18e9/0x4310 [ 645.640215][ T8877] ? sync_thread_master+0x1b10/0x1b10 [ 645.645630][ T8877] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 645.651564][ T8877] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 645.657487][ T8877] do_ip_vs_set_ctl+0x52f/0x2cb0 [ 645.662465][ T8877] ? do_ip_setsockopt+0x435a/0x5fa0 [ 645.667717][ T8877] ? kmsan_internal_set_origin+0x6a/0xb0 [ 645.673390][ T8877] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 645.679496][ T8877] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 645.685411][ T8877] ? local_bh_enable+0x40/0x40 [ 645.690212][ T8877] nf_setsockopt+0x47c/0x4e0 [ 645.694847][ T8877] ip_setsockopt+0x24a/0x2b0 [ 645.699476][ T8877] udp_setsockopt+0x108/0x1b0 [ 645.704188][ T8877] ? udp_lib_setsockopt+0x1140/0x1140 [ 645.709582][ T8877] ipv6_setsockopt+0x310/0x350 [ 645.714371][ T8877] ? ipv6_update_options+0x4f0/0x4f0 [ 645.719687][ T8877] ? ipv6_update_options+0x4f0/0x4f0 [ 645.724996][ T8877] tcp_setsockopt+0x1c0/0x1f0 [ 645.729702][ T8877] ? tcp_disconnect+0x1d40/0x1d40 [ 645.734767][ T8877] sock_common_setsockopt+0x13b/0x170 [ 645.740203][ T8877] __sys_setsockopt+0x7c3/0xa30 [ 645.745127][ T8877] ? sock_common_recvmsg+0x290/0x290 [ 645.750491][ T8877] __se_sys_setsockopt+0xdd/0x100 [ 645.755563][ T8877] __x64_sys_setsockopt+0x62/0x80 [ 645.760620][ T8877] do_syscall_64+0xb6/0x160 [ 645.765162][ T8877] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 645.771077][ T8877] RIP: 0033:0x459ef9 [ 645.775001][ T8877] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 645.794642][ T8877] RSP: 002b:00007fdd30129c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 645.803099][ T8877] RAX: ffffffffffffffda RBX: 00007fdd30129c90 RCX: 0000000000459ef9 [ 645.811085][ T8877] RDX: 000000000000048b RSI: 0000000000000000 RDI: 0000000000000006 [ 645.819074][ T8877] RBP: 000000000075bfc8 R08: 0000000000000018 R09: 0000000000000000 [ 645.827062][ T8877] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fdd3012a6d4 01:42:10 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 645.835048][ T8877] R13: 00000000004cfa80 R14: 00000000004de790 R15: 0000000000000007 [ 645.843380][ T8877] IPVS: Error during creation of socket; terminating 01:42:10 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$inet_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000440)={0x3}, 0x4) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r3 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)}, 0x0) recvmsg$kcm(r3, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r5 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r4, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r4, &(0x7f0000000040)=ANY=[@ANYBLOB="0180614987b9e07022e263368b85"], 0x90ad) r6 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r6, 0x1000008912, &(0x7f0000000440)) r7 = accept(r6, &(0x7f00000002c0)=@alg, &(0x7f0000000000)=0x80) r8 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r8, 0x4d) recvfrom$inet(0xffffffffffffffff, &(0x7f0000000480)=""/115, 0x73, 0x20000000, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_HMAC_IDENT(r8, 0x84, 0x16, &(0x7f0000000380)=ANY=[@ANYBLOB="0300020009000600023d"], &(0x7f00000003c0)=0xa) ioctl$sock_SIOCGIFBR(r7, 0x8940, &(0x7f0000000340)=@add_del={0x2, &(0x7f0000000100)='veth1_to_bond\x00'}) 01:42:11 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x3, 0x82) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000040)={0x0, 0xe, "f79bc0acfb6eb8df1a4e8602865d"}, &(0x7f0000000080)=0x16) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x84) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x0, 'yam0\x00'}, 0x18) 01:42:11 executing program 1 (fault-call:7 fault-nth:4): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 646.067569][ T8997] device nr0 entered promiscuous mode [ 646.096974][ T8999] IPVS: Unknown mcast interface: yam0 01:42:11 executing program 3 (fault-call:1 fault-nth:0): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:11 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = syz_usb_connect$cdc_ecm(0x5, 0x4e, &(0x7f0000000080)={{0x12, 0x1, 0x300, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x3c, 0x1, 0x1, 0xef, 0x10, 0x2, [{{0x9, 0x4, 0x0, 0x4, 0x3, 0x2, 0x6, 0x0, 0x1, {{0x6, 0x24, 0x6, 0x0, 0x0, "87"}, {0x5, 0x24, 0x0, 0x3}, {0xd, 0x24, 0xf, 0x1, 0x3ff, 0x400, 0x20, 0x3}}, {[], {{0x9, 0x5, 0x82, 0x2, 0x30f, 0x80, 0x0, 0x20}}, {{0x9, 0x5, 0x3, 0x2, 0x3da, 0x5, 0xad, 0x61}}}}}]}}]}}, &(0x7f0000000600)={0xa, &(0x7f00000002c0)={0xa, 0x6, 0x201, 0x0, 0x0, 0x8, 0x8}, 0x11a, &(0x7f0000000300)={0x5, 0xf, 0x11a, 0x6, [@generic={0x82, 0x10, 0x3, "f9428015ef683ae57f7c4ff84252a712cff2075c93840496857961f041ec2583a0e444e1dece666f9d475ebd129759ea4033ea12ef72ba7de214ec879a9dfbb0bd63ea04837c4a88796b4643c32955b29dc7a5223584c76581a67558c774c76fcfc6e019d886c5c8cb044ecaf496c951892eb98468e74302acc262c435ef63"}, @generic={0x4f, 0x10, 0xdf01ce33aba36c5b, "39c519e019e2c18e432c20fc74328391f5dd85bf49667334d9d5c831256b29aa6814ed55ea08d9866a9487a827cc78cf45c7b4d34c135f2c6d91af289bca1d9581099c399b39eacc7570bbe7"}, @ssp_cap={0xc, 0x10, 0xa, 0x0, 0x0, 0x6, 0x8, 0x2}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x1f, 0x7, 0x5, 0x857e}, @ss_cap={0xa, 0x10, 0x3, 0x2, 0x8, 0x9, 0x8}, @ssp_cap={0x24, 0x10, 0xa, 0x4, 0x6, 0x0, 0xf88f, 0x7, [0xc000, 0xfe7fc7, 0xff00c0, 0x0, 0xffc0f0, 0xf]}]}, 0x4, [{0x2, &(0x7f0000000440)=@string={0x2}}, {0x38, &(0x7f0000000480)=@string={0x38, 0x3, "c34223fd94a494b848e43209e03f33fef0b60198d5005f669e24ddeff0db757b93321b846d2e740853f470b20c8f26abbc2fabbbc29f"}}, {0x4, &(0x7f00000004c0)=@lang_id={0x4, 0x3, 0x20}}, {0xd7, &(0x7f0000000500)=@string={0xd7, 0x3, "b5ce928d902873f6ca9420d5b2e57f4be9ad3ccd9ac9ba0a4b430236fcffe729b8d926887952fb1a887707c88f04a78b8c3fcf7e126416c998bdac00e026663b0bfa53353532b8962ba693032a3da3b2cef19a2913354ba853de52a569f347f4a801c86b01d8c73347838db945769bef27d930619243ad9f767b740779d953069706e43e7b792abfb900323bbb088bd3f961732ff8b97df46c5eea260a4dba911f3da165d21f97f8dd514fec289ba9c69ff111ac1cf4acebc8ee11e1e393ef9f176b0a2d110ae02c10dd53fcf9ed98d59a5b49b7ed"}}]}) syz_usb_control_io(r4, &(0x7f00000007c0)={0x2c, &(0x7f0000000680)={0x0, 0x2, 0x2b, {0x2b, 0x31, "3f702afb6d0e9be7f9703a37735fcff2ebe0ab92455396e63b7dec375236a587f0f60d4a6319e2ef8e"}}, &(0x7f00000006c0)={0x0, 0x3, 0x6, @string={0x6, 0x3, "eca81adf"}}, &(0x7f0000000700)={0x0, 0xf, 0x5, {0x5, 0xf, 0x5}}, &(0x7f0000000740)={0x20, 0x29, 0xf, {0xf, 0x29, 0xbd, 0x2, 0x8, 0x81, "cb60502c", "63d3f81e"}}, &(0x7f0000000780)={0x20, 0x2a, 0xc, {0xc, 0x2a, 0x0, 0x0, 0x5, 0x1, 0x8, 0x174, 0x400}}}, &(0x7f0000000cc0)={0x84, &(0x7f0000000800)={0x30, 0xe, 0xf1, "58b9f2f6c09799b9067717387a2e7a24853771a2616243813f680c023e816a00e392a40295c15557778412bee701c2bda53b94b7e39da0b913a2b1ee0c50d5ce02a12a99df02e0cc5cef2032f810dd321e2ca29c456a31b30340f71b1deb44630f535609e1ba1707416ec17d2f4bb39121c1501521d3e3d6ceeb8f31a9c864f497e90a2d8f4c89b994a8c969ebdd201198b818e8decf059b657d2474d02183a95fefdb4b32190bdf07ae9b377334cc8c431fa60a9520b22db483261492d0f4e340e7dbc38a3c8a469c0955b4c320f8d85b86fce80ac05e2572ea6885f51fda611a5b7e856f71f0c701430a466394423166"}, &(0x7f0000000900)={0x0, 0xa, 0x1, 0x44}, &(0x7f0000000940)={0x0, 0x8, 0x1, 0x7f}, &(0x7f0000000980)={0x20, 0x0, 0x4, {0x5, 0x3}}, &(0x7f00000009c0)={0x20, 0x0, 0x8, {0x400, 0x20, [0x365c18c9a05c65b7]}}, &(0x7f0000000a00)={0x40, 0x7, 0x2, 0x2f}, &(0x7f0000000a40)={0x40, 0x9, 0x1, 0x1f}, &(0x7f0000000a80)={0x40, 0xb, 0x2, "daed"}, &(0x7f0000000ac0)={0x40, 0xf, 0x2, 0x8}, &(0x7f0000000b00)={0x40, 0x13, 0x6, @random="ab2b9249bbdb"}, &(0x7f0000000b40)={0x40, 0x17, 0x6, @random="1c528f5a700f"}, &(0x7f0000000b80)={0x40, 0x19, 0x2, "8c51"}, &(0x7f0000000bc0)={0x40, 0x1a, 0x2, 0x2}, &(0x7f0000000c00)={0x40, 0x1c, 0x1, 0x1}, &(0x7f0000000c40)={0x40, 0x1e, 0x1, 0xd9}, &(0x7f0000000c80)={0x40, 0x21, 0x1, 0x2}}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) accept$packet(r7, &(0x7f0000001740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000001780)=0x14) sendto$packet(r3, &(0x7f00000001c0)="cc74c48c66bb766c5f1c34948219966e40c5e3eed1912b6c8852fb3b297d794431037544b2a64d00e42705fc0d87320226e67b693045b313b8071bb42ec00ee063b433bc764d99528bf95b883af0259028f9dda6103ccbb68a2fa3931672889751d540998b4356e5ac5d2c9cdf5759222aaf3b87443f5ecc162d3a1c51d08221f5f61e51e526e22a47e35bca1a81a3be75373e0b2594ea8908524c349ee8b55048f7c88890fa4c604e62e1f7d4f2bc943c0df8536506ea818da7f23e73100d52c42d379d4e6a280e6f7d76e961e5230c302ef9e0a132831863e18354edb4d560ad6b080d", 0xe4, 0x80, &(0x7f00000017c0)={0x11, 0x5, r8, 0x1, 0x65, 0x6, @local}, 0x14) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:42:11 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) io_setup(0x14, &(0x7f0000000100)=0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x200000005, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000400)={'\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02\x00', 0x20000005001}) io_submit(r2, 0x0, 0x0) io_submit(r2, 0x8, &(0x7f0000000600)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x800000000001, 0x0, r3, &(0x7f0000000080), 0xa}]) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) [ 646.271266][ T9010] FAULT_INJECTION: forcing a failure. [ 646.271266][ T9010] name failslab, interval 1, probability 0, space 0, times 0 [ 646.284415][ T9010] CPU: 0 PID: 9010 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 646.292265][ T9010] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 646.302365][ T9010] Call Trace: [ 646.305729][ T9010] dump_stack+0x191/0x1f0 [ 646.310144][ T9010] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 646.316120][ T9010] should_fail+0xa3f/0xa50 [ 646.320640][ T9010] __should_failslab+0x264/0x280 [ 646.325644][ T9010] should_failslab+0x29/0x70 [ 646.330265][ T9010] kmem_cache_alloc_node+0x103/0xe70 [ 646.335590][ T9010] ? __alloc_skb+0x215/0xa10 [ 646.340230][ T9010] __alloc_skb+0x215/0xa10 [ 646.344686][ T9010] netlink_sendmsg+0x783/0x1330 [ 646.349594][ T9010] ? netlink_getsockopt+0x1430/0x1430 [ 646.354992][ T9010] ___sys_sendmsg+0x14ff/0x1590 [ 646.359873][ T9010] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 646.366003][ T9010] ? __fget_light+0x6b1/0x710 [ 646.370708][ T9010] ? kmsan_internal_set_origin+0x6a/0xb0 [ 646.376378][ T9010] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 646.382301][ T9010] __se_sys_sendmsg+0x305/0x460 [ 646.387208][ T9010] __x64_sys_sendmsg+0x4a/0x70 [ 646.392007][ T9010] do_syscall_64+0xb6/0x160 [ 646.396540][ T9010] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 646.402446][ T9010] RIP: 0033:0x459ef9 [ 646.406365][ T9010] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 646.425990][ T9010] RSP: 002b:00007f4d27f38c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 646.434431][ T9010] RAX: ffffffffffffffda RBX: 00007f4d27f38c90 RCX: 0000000000459ef9 [ 646.442418][ T9010] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 646.450408][ T9010] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 646.458393][ T9010] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d27f396d4 [ 646.466383][ T9010] R13: 00000000004c8224 R14: 00000000004de250 R15: 0000000000000004 [ 646.482616][ T9012] FAULT_INJECTION: forcing a failure. [ 646.482616][ T9012] name failslab, interval 1, probability 0, space 0, times 0 [ 646.495542][ T9012] CPU: 1 PID: 9012 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 646.503393][ T9012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 646.513497][ T9012] Call Trace: [ 646.516835][ T9012] dump_stack+0x191/0x1f0 [ 646.521210][ T9012] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 646.527148][ T9012] should_fail+0xa3f/0xa50 [ 646.531625][ T9012] __should_failslab+0x264/0x280 [ 646.536612][ T9012] should_failslab+0x29/0x70 [ 646.541228][ T9012] kmem_cache_alloc_trace+0xf7/0xd20 [ 646.546545][ T9012] ? apparmor_sk_alloc_security+0xe7/0x220 [ 646.552384][ T9012] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 646.558313][ T9012] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 646.564236][ T9012] apparmor_sk_alloc_security+0xe7/0x220 [ 646.569892][ T9012] ? apparmor_setprocattr+0x1580/0x1580 [ 646.575468][ T9012] security_sk_alloc+0x125/0x1f0 [ 646.580441][ T9012] sk_prot_alloc+0x3aa/0x5c0 [ 646.585067][ T9012] sk_alloc+0xf3/0xb60 [ 646.589174][ T9012] inet_create+0x7d4/0x1380 [ 646.593714][ T9012] ? ipip_gro_complete+0x200/0x200 [ 646.598853][ T9012] __sock_create+0x8ee/0xf00 [ 646.603499][ T9012] sock_create_kern+0xf0/0x100 [ 646.608307][ T9012] start_sync_thread+0x18e9/0x4310 [ 646.613459][ T9012] ? sync_thread_master+0x1b10/0x1b10 [ 646.618869][ T9012] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 646.624801][ T9012] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 646.630723][ T9012] do_ip_vs_set_ctl+0x52f/0x2cb0 [ 646.635720][ T9012] ? do_ip_setsockopt+0x435a/0x5fa0 [ 646.640956][ T9012] ? kmsan_internal_set_origin+0x6a/0xb0 [ 646.646626][ T9012] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 646.652831][ T9012] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 646.658750][ T9012] ? local_bh_enable+0x40/0x40 [ 646.663539][ T9012] nf_setsockopt+0x47c/0x4e0 [ 646.668185][ T9012] ip_setsockopt+0x24a/0x2b0 [ 646.672814][ T9012] udp_setsockopt+0x108/0x1b0 [ 646.677529][ T9012] ? udp_lib_setsockopt+0x1140/0x1140 [ 646.682931][ T9012] ipv6_setsockopt+0x310/0x350 [ 646.687716][ T9012] ? ipv6_update_options+0x4f0/0x4f0 [ 646.693054][ T9012] ? ipv6_update_options+0x4f0/0x4f0 [ 646.698510][ T9012] tcp_setsockopt+0x1c0/0x1f0 [ 646.703246][ T9012] ? tcp_disconnect+0x1d40/0x1d40 [ 646.708315][ T9012] sock_common_setsockopt+0x13b/0x170 [ 646.713729][ T9012] __sys_setsockopt+0x7c3/0xa30 [ 646.718627][ T9012] ? sock_common_recvmsg+0x290/0x290 [ 646.723948][ T9012] __se_sys_setsockopt+0xdd/0x100 [ 646.729009][ T9012] __x64_sys_setsockopt+0x62/0x80 [ 646.734058][ T9012] do_syscall_64+0xb6/0x160 [ 646.738589][ T9012] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 646.744508][ T9012] RIP: 0033:0x459ef9 [ 646.748470][ T9012] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 646.768319][ T9012] RSP: 002b:00007fdd3014ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 646.776774][ T9012] RAX: ffffffffffffffda RBX: 00007fdd3014ac90 RCX: 0000000000459ef9 [ 646.784764][ T9012] RDX: 000000000000048b RSI: 0000000000000000 RDI: 0000000000000006 [ 646.792762][ T9012] RBP: 000000000075bf20 R08: 0000000000000018 R09: 0000000000000000 [ 646.800754][ T9012] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fdd3014b6d4 [ 646.808742][ T9012] R13: 00000000004cfa80 R14: 00000000004de790 R15: 0000000000000007 [ 646.817615][ T9012] IPVS: Error during creation of socket; terminating 01:42:12 executing program 3 (fault-call:1 fault-nth:1): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:12 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0xff, 0x101000) r1 = socket$inet(0x2, 0x4000000805, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = dup3(r1, r2, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r3, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r2, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f000059aff8)={r4}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f00000000c0)={r4, 0x6, 0xeec8abdd7c62eb7c, 0x80000001, 0x6}, &(0x7f00000001c0)=0x18) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000200)={r5, 0x8}, 0x8) r6 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r6}], 0x1, 0x0) ioctl$int_in(r6, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r6, &(0x7f0000000100)=""/71, 0x47) [ 647.086587][ T9124] FAULT_INJECTION: forcing a failure. [ 647.086587][ T9124] name failslab, interval 1, probability 0, space 0, times 0 [ 647.099424][ T9124] CPU: 0 PID: 9124 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 647.107279][ T9124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.117380][ T9124] Call Trace: [ 647.120736][ T9124] dump_stack+0x191/0x1f0 [ 647.125112][ T9124] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 647.131039][ T9124] should_fail+0xa3f/0xa50 [ 647.135508][ T9124] __should_failslab+0x264/0x280 [ 647.140498][ T9124] should_failslab+0x29/0x70 [ 647.145120][ T9124] __kmalloc_node_track_caller+0x1c9/0x13d0 [ 647.151044][ T9124] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 647.157134][ T9124] ? kmem_cache_alloc_node+0x1b6/0xe70 [ 647.162631][ T9124] ? netlink_sendmsg+0x783/0x1330 [ 647.167691][ T9124] ? netlink_sendmsg+0x783/0x1330 [ 647.172747][ T9124] __alloc_skb+0x306/0xa10 [ 647.177188][ T9124] ? netlink_sendmsg+0x783/0x1330 [ 647.182249][ T9124] netlink_sendmsg+0x783/0x1330 [ 647.187142][ T9124] ? netlink_getsockopt+0x1430/0x1430 [ 647.192543][ T9124] ___sys_sendmsg+0x14ff/0x1590 [ 647.197434][ T9124] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 647.203585][ T9124] ? __fget_light+0x6b1/0x710 [ 647.208288][ T9124] ? kmsan_internal_set_origin+0x6a/0xb0 [ 647.213957][ T9124] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 647.219876][ T9124] __se_sys_sendmsg+0x305/0x460 [ 647.224770][ T9124] __x64_sys_sendmsg+0x4a/0x70 [ 647.229585][ T9124] do_syscall_64+0xb6/0x160 [ 647.234118][ T9124] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 647.240031][ T9124] RIP: 0033:0x459ef9 [ 647.243957][ T9124] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 647.263585][ T9124] RSP: 002b:00007f4d27f38c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 647.272023][ T9124] RAX: ffffffffffffffda RBX: 00007f4d27f38c90 RCX: 0000000000459ef9 01:42:12 executing program 1 (fault-call:7 fault-nth:5): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 647.280012][ T9124] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 647.288007][ T9124] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 647.295995][ T9124] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d27f396d4 [ 647.303987][ T9124] R13: 00000000004c8224 R14: 00000000004de250 R15: 0000000000000004 01:42:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:12 executing program 3 (fault-call:1 fault-nth:2): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 647.425656][ T9134] FAULT_INJECTION: forcing a failure. [ 647.425656][ T9134] name failslab, interval 1, probability 0, space 0, times 0 [ 647.439008][ T9134] CPU: 1 PID: 9134 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 647.446865][ T9134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.456965][ T9134] Call Trace: [ 647.460327][ T9134] dump_stack+0x191/0x1f0 [ 647.464730][ T9134] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 647.470699][ T9134] should_fail+0xa3f/0xa50 [ 647.475207][ T9134] __should_failslab+0x264/0x280 [ 647.480215][ T9134] should_failslab+0x29/0x70 [ 647.484865][ T9134] __kmalloc+0xae/0x430 [ 647.489088][ T9134] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 647.495215][ T9134] ? sock_kmalloc+0x164/0x2d0 [ 647.499925][ T9134] sock_kmalloc+0x164/0x2d0 [ 647.504471][ T9134] __ip_mc_join_group+0x431/0x800 [ 647.509537][ T9134] ip_mc_join_group+0x70/0x80 [ 647.514249][ T9134] start_sync_thread+0x22a0/0x4310 [ 647.519510][ T9134] ? sync_thread_master+0x1b10/0x1b10 [ 647.524938][ T9134] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 647.530867][ T9134] do_ip_vs_set_ctl+0x52f/0x2cb0 [ 647.535845][ T9134] ? do_ip_setsockopt+0x435a/0x5fa0 [ 647.541082][ T9134] ? kmsan_internal_set_origin+0x6a/0xb0 [ 647.546751][ T9134] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 647.552942][ T9134] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 647.558865][ T9134] ? local_bh_enable+0x40/0x40 [ 647.563653][ T9134] nf_setsockopt+0x47c/0x4e0 [ 647.568300][ T9134] ip_setsockopt+0x24a/0x2b0 [ 647.572929][ T9134] udp_setsockopt+0x108/0x1b0 [ 647.577649][ T9134] ? udp_lib_setsockopt+0x1140/0x1140 [ 647.583057][ T9134] ipv6_setsockopt+0x310/0x350 [ 647.587845][ T9134] ? ipv6_update_options+0x4f0/0x4f0 [ 647.593157][ T9134] ? ipv6_update_options+0x4f0/0x4f0 [ 647.598474][ T9134] tcp_setsockopt+0x1c0/0x1f0 [ 647.603182][ T9134] ? tcp_disconnect+0x1d40/0x1d40 [ 647.608239][ T9134] sock_common_setsockopt+0x13b/0x170 [ 647.613643][ T9134] __sys_setsockopt+0x7c3/0xa30 [ 647.618531][ T9134] ? sock_common_recvmsg+0x290/0x290 [ 647.623869][ T9134] __se_sys_setsockopt+0xdd/0x100 [ 647.628955][ T9134] __x64_sys_setsockopt+0x62/0x80 [ 647.634037][ T9134] do_syscall_64+0xb6/0x160 [ 647.638607][ T9134] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 647.644536][ T9134] RIP: 0033:0x459ef9 [ 647.648470][ T9134] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 647.668109][ T9134] RSP: 002b:00007fdd3014ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 647.677592][ T9134] RAX: ffffffffffffffda RBX: 00007fdd3014ac90 RCX: 0000000000459ef9 [ 647.685670][ T9134] RDX: 000000000000048b RSI: 0000000000000000 RDI: 0000000000000006 [ 647.693666][ T9134] RBP: 000000000075bf20 R08: 0000000000000018 R09: 0000000000000000 [ 647.701664][ T9134] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fdd3014b6d4 [ 647.709683][ T9134] R13: 00000000004cfa80 R14: 00000000004de790 R15: 0000000000000007 [ 647.718048][ T9134] IPVS: Error joining to the multicast group [ 647.799685][ T9156] FAULT_INJECTION: forcing a failure. [ 647.799685][ T9156] name failslab, interval 1, probability 0, space 0, times 0 [ 647.812825][ T9156] CPU: 0 PID: 9156 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 647.820677][ T9156] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 647.830797][ T9156] Call Trace: [ 647.834135][ T9156] dump_stack+0x191/0x1f0 [ 647.838501][ T9156] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 647.844438][ T9156] should_fail+0xa3f/0xa50 [ 647.848900][ T9156] __should_failslab+0x264/0x280 [ 647.853872][ T9156] should_failslab+0x29/0x70 [ 647.858489][ T9156] kmem_cache_alloc+0xd6/0xd10 [ 647.863280][ T9156] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 647.869194][ T9156] ? skb_clone+0x326/0x5d0 [ 647.873642][ T9156] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 647.879751][ T9156] skb_clone+0x326/0x5d0 [ 647.884040][ T9156] netlink_deliver_tap+0x804/0xeb0 [ 647.889212][ T9156] netlink_unicast+0xde9/0x1020 [ 647.894103][ T9156] netlink_sendmsg+0x110f/0x1330 [ 647.899086][ T9156] ? netlink_getsockopt+0x1430/0x1430 [ 647.904481][ T9156] ___sys_sendmsg+0x14ff/0x1590 [ 647.909359][ T9156] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 647.915484][ T9156] ? __fget_light+0x6b1/0x710 [ 647.920184][ T9156] ? kmsan_internal_set_origin+0x6a/0xb0 [ 647.925869][ T9156] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 647.931791][ T9156] __se_sys_sendmsg+0x305/0x460 [ 647.936703][ T9156] __x64_sys_sendmsg+0x4a/0x70 [ 647.941491][ T9156] do_syscall_64+0xb6/0x160 [ 647.946020][ T9156] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 647.951926][ T9156] RIP: 0033:0x459ef9 [ 647.955844][ T9156] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 647.975479][ T9156] RSP: 002b:00007f4d27f38c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 647.983932][ T9156] RAX: ffffffffffffffda RBX: 00007f4d27f38c90 RCX: 0000000000459ef9 [ 647.991925][ T9156] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 647.999919][ T9156] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 648.007917][ T9156] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d27f396d4 [ 648.015917][ T9156] R13: 00000000004c8224 R14: 00000000004de250 R15: 0000000000000004 01:42:13 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.opaque\x00', &(0x7f00000002c0)='y\x00', 0x2, 0x5) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:42:13 executing program 2: r0 = syz_open_dev$video4linux(&(0x7f0000000040)='/dev/v4l-subdev#\x00', 0x10000000000100, 0x0) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000080)={0x4000, "834496601c93b1a7613e924645f6f406ce4d9ae00d38de93d8b2a3071f382c4f", 0x5, 0x2, 0xaa, 0x8, 0x6, 0x0, 0xfffffeff, 0x1ff}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc040564a, &(0x7f0000000100)={0x0, 0x0, 0x3012}) 01:42:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:13 executing program 1 (fault-call:7 fault-nth:6): socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 648.207585][ T9236] device nr0 entered promiscuous mode 01:42:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:13 executing program 2: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$EVIOCGPROP(r2, 0x80404509, &(0x7f00000001c0)=""/4096) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x2, &(0x7f0000000140)=[{0x7, 0x0, 0x2}, {0x6, 0x0, 0x0, 0x50000}]}) 01:42:13 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1007, 0x4aa940) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) ptrace$setopts(0x4200, r1, 0x7, 0x20) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:42:13 executing program 3 (fault-call:1 fault-nth:3): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 648.607936][ T9272] FAULT_INJECTION: forcing a failure. [ 648.607936][ T9272] name failslab, interval 1, probability 0, space 0, times 0 [ 648.621235][ T9272] CPU: 0 PID: 9272 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 648.629097][ T9272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.639193][ T9272] Call Trace: [ 648.642539][ T9272] dump_stack+0x191/0x1f0 [ 648.646920][ T9272] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 648.652850][ T9272] should_fail+0xa3f/0xa50 [ 648.657312][ T9272] __should_failslab+0x264/0x280 [ 648.662288][ T9272] should_failslab+0x29/0x70 [ 648.666905][ T9272] kmem_cache_alloc+0xd6/0xd10 [ 648.671712][ T9272] ? __msan_metadata_ptr_for_load_2+0x10/0x20 [ 648.677815][ T9272] ? xfrm_state_alloc+0x70/0x470 [ 648.682790][ T9272] xfrm_state_alloc+0x70/0x470 [ 648.687584][ T9272] xfrm_add_sa+0x194c/0x5880 [ 648.692216][ T9272] ? __nla_parse+0x137/0x150 [ 648.696843][ T9272] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 648.702764][ T9272] ? xfrm_user_rcv_msg+0xae0/0xae0 [ 648.707904][ T9272] xfrm_user_rcv_msg+0x7ab/0xae0 [ 648.712918][ T9272] netlink_rcv_skb+0x431/0x620 [ 648.717709][ T9272] ? xfrm_netlink_rcv+0xf0/0xf0 [ 648.722597][ T9272] xfrm_netlink_rcv+0xb2/0xf0 [ 648.727307][ T9272] netlink_unicast+0xf3e/0x1020 [ 648.732203][ T9272] netlink_sendmsg+0x110f/0x1330 [ 648.737185][ T9272] ? netlink_getsockopt+0x1430/0x1430 [ 648.742581][ T9272] ___sys_sendmsg+0x14ff/0x1590 [ 648.747464][ T9272] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 648.753623][ T9272] ? __fget_light+0x6b1/0x710 [ 648.758347][ T9272] ? kmsan_internal_set_origin+0x6a/0xb0 [ 648.764027][ T9272] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 648.769955][ T9272] __se_sys_sendmsg+0x305/0x460 [ 648.774856][ T9272] __x64_sys_sendmsg+0x4a/0x70 [ 648.779648][ T9272] do_syscall_64+0xb6/0x160 [ 648.784185][ T9272] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 648.790101][ T9272] RIP: 0033:0x459ef9 [ 648.794033][ T9272] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 648.813834][ T9272] RSP: 002b:00007f4d27f38c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 648.822286][ T9272] RAX: ffffffffffffffda RBX: 00007f4d27f38c90 RCX: 0000000000459ef9 [ 648.830369][ T9272] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 648.838354][ T9272] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 648.846343][ T9272] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d27f396d4 [ 648.854328][ T9272] R13: 00000000004c8224 R14: 00000000004de250 R15: 0000000000000004 [ 648.869567][ T9260] FAULT_INJECTION: forcing a failure. [ 648.869567][ T9260] name failslab, interval 1, probability 0, space 0, times 0 [ 648.882976][ T9260] CPU: 1 PID: 9260 Comm: syz-executor.1 Not tainted 5.4.0-rc3+ #0 [ 648.890824][ T9260] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 648.900921][ T9260] Call Trace: [ 648.904277][ T9260] dump_stack+0x191/0x1f0 [ 648.908665][ T9260] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 648.914631][ T9260] should_fail+0xa3f/0xa50 [ 648.919124][ T9260] __should_failslab+0x264/0x280 [ 648.924112][ T9260] should_failslab+0x29/0x70 [ 648.928745][ T9260] kmem_cache_alloc_trace+0xf7/0xd20 [ 648.934068][ T9260] ? kmsan_internal_set_origin+0x6a/0xb0 [ 648.939728][ T9260] ? ____ip_mc_inc_group+0x3ca/0xf00 [ 648.945051][ T9260] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 648.950990][ T9260] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 648.956915][ T9260] ____ip_mc_inc_group+0x3ca/0xf00 [ 648.962071][ T9260] __ip_mc_join_group+0x5c2/0x800 [ 648.967148][ T9260] ip_mc_join_group+0x70/0x80 [ 648.971871][ T9260] start_sync_thread+0x22a0/0x4310 [ 648.977023][ T9260] ? sync_thread_master+0x1b10/0x1b10 [ 648.982451][ T9260] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 648.988381][ T9260] do_ip_vs_set_ctl+0x52f/0x2cb0 [ 648.993369][ T9260] ? do_ip_setsockopt+0x435a/0x5fa0 [ 648.998606][ T9260] ? kmsan_internal_set_origin+0x6a/0xb0 [ 649.004272][ T9260] ? kmsan_internal_unpoison_shadow+0x42/0x70 [ 649.010370][ T9260] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 649.016302][ T9260] ? local_bh_enable+0x40/0x40 [ 649.021103][ T9260] nf_setsockopt+0x47c/0x4e0 [ 649.025732][ T9260] ip_setsockopt+0x24a/0x2b0 [ 649.030359][ T9260] udp_setsockopt+0x108/0x1b0 [ 649.035071][ T9260] ? udp_lib_setsockopt+0x1140/0x1140 [ 649.040560][ T9260] ipv6_setsockopt+0x310/0x350 [ 649.045347][ T9260] ? ipv6_update_options+0x4f0/0x4f0 [ 649.050661][ T9260] ? ipv6_update_options+0x4f0/0x4f0 [ 649.055969][ T9260] tcp_setsockopt+0x1c0/0x1f0 [ 649.060675][ T9260] ? tcp_disconnect+0x1d40/0x1d40 [ 649.065734][ T9260] sock_common_setsockopt+0x13b/0x170 [ 649.071141][ T9260] __sys_setsockopt+0x7c3/0xa30 [ 649.076031][ T9260] ? sock_common_recvmsg+0x290/0x290 [ 649.081345][ T9260] __se_sys_setsockopt+0xdd/0x100 [ 649.086406][ T9260] __x64_sys_setsockopt+0x62/0x80 [ 649.091459][ T9260] do_syscall_64+0xb6/0x160 [ 649.095990][ T9260] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 649.101898][ T9260] RIP: 0033:0x459ef9 [ 649.105821][ T9260] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 649.125449][ T9260] RSP: 002b:00007fdd30129c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 649.133894][ T9260] RAX: ffffffffffffffda RBX: 00007fdd30129c90 RCX: 0000000000459ef9 [ 649.141883][ T9260] RDX: 000000000000048b RSI: 0000000000000000 RDI: 0000000000000006 [ 649.149879][ T9260] RBP: 000000000075bfc8 R08: 0000000000000018 R09: 0000000000000000 [ 649.157869][ T9260] R10: 0000000020000000 R11: 0000000000000246 R12: 00007fdd3012a6d4 [ 649.165856][ T9260] R13: 00000000004cfa80 R14: 00000000004de790 R15: 0000000000000007 [ 649.209717][ T9275] IPVS: sync thread started: state = BACKUP, mcast_ifn = veth1_to_team, syncid = 0, id = 0 01:42:14 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:14 executing program 3 (fault-call:1 fault-nth:4): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:14 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0x0, &(0x7f0000000480)="149cca3c76019014425c72ba51706e17f3fb27f9998d3696f0734d476fcad314533f005f76021ff51822b252d65133b3787f5be50248ff0d53fe2e95c445771de59362938445feffff"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 649.401233][ T9381] FAULT_INJECTION: forcing a failure. [ 649.401233][ T9381] name failslab, interval 1, probability 0, space 0, times 0 [ 649.414499][ T9381] CPU: 0 PID: 9381 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 649.422348][ T9381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 649.432441][ T9381] Call Trace: [ 649.435785][ T9381] dump_stack+0x191/0x1f0 [ 649.440159][ T9381] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 649.446086][ T9381] should_fail+0xa3f/0xa50 [ 649.450544][ T9381] __should_failslab+0x264/0x280 [ 649.455515][ T9381] should_failslab+0x29/0x70 [ 649.460130][ T9381] __kmalloc_track_caller+0x1ad/0xea0 [ 649.465533][ T9381] ? xfrm_add_sa+0x2eef/0x5880 [ 649.470338][ T9381] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 649.476267][ T9381] kmemdup+0x95/0x140 [ 649.480284][ T9381] xfrm_add_sa+0x2eef/0x5880 [ 649.484924][ T9381] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 649.490847][ T9381] ? xfrm_user_rcv_msg+0xae0/0xae0 [ 649.495987][ T9381] xfrm_user_rcv_msg+0x7ab/0xae0 [ 649.501015][ T9381] netlink_rcv_skb+0x431/0x620 [ 649.505817][ T9381] ? xfrm_netlink_rcv+0xf0/0xf0 [ 649.510707][ T9381] xfrm_netlink_rcv+0xb2/0xf0 [ 649.515419][ T9381] netlink_unicast+0xf3e/0x1020 [ 649.520308][ T9381] netlink_sendmsg+0x110f/0x1330 [ 649.525290][ T9381] ? netlink_getsockopt+0x1430/0x1430 [ 649.530685][ T9381] ___sys_sendmsg+0x14ff/0x1590 [ 649.535564][ T9381] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 649.541712][ T9381] ? __fget_light+0x6b1/0x710 [ 649.546422][ T9381] ? kmsan_internal_set_origin+0x6a/0xb0 [ 649.552095][ T9381] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 649.558025][ T9381] __se_sys_sendmsg+0x305/0x460 [ 649.562919][ T9381] __x64_sys_sendmsg+0x4a/0x70 [ 649.567708][ T9381] do_syscall_64+0xb6/0x160 [ 649.572242][ T9381] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 649.578148][ T9381] RIP: 0033:0x459ef9 [ 649.582068][ T9381] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 01:42:14 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) setsockopt$TIPC_MCAST_BROADCAST(r0, 0x10f, 0x85) 01:42:14 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000000)=0x5, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB='\t\x00\x00\x00G'], 0x90ad) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$IPT_SO_SET_ADD_COUNTERS(r3, 0x0, 0x41, &(0x7f00000002c0)={'nat\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) [ 649.601699][ T9381] RSP: 002b:00007f4d27f38c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 649.610143][ T9381] RAX: ffffffffffffffda RBX: 00007f4d27f38c90 RCX: 0000000000459ef9 [ 649.618134][ T9381] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 649.626135][ T9381] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 649.634123][ T9381] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d27f396d4 [ 649.642122][ T9381] R13: 00000000004c8224 R14: 00000000004de250 R15: 0000000000000004 01:42:14 executing program 2: r0 = memfd_create(&(0x7f00000001c0)='ppp0+,selfppp0vmnet1proc\']\x00', 0x0) r1 = syz_open_dev$sndseq(&(0x7f0000050000)='/dev/snd/seq\x00', 0x0, 0x1) r2 = dup2(r1, r0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, '\x9e\xdez\x8cZ\xe9^\xc8g,\x934\x0fd:fO\x13\xee\xabe\xc02)\x01\xdck\xd3l\xde,Q\xf0\x1b\x7f\v\x01O\x9f\x91\xee\xb7\xc3|r@\xf4v\xc8\xd7S\xd0\x00\xaa\x8f\xaf\x8f\xb5t\xdb\xcf\xa6\xdcM'}) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r2, 0x40bc5311, &(0x7f0000000000)={0x80, 0x1, 'clien\x00\x00\x00\x00\x00\x00\x04\x00\x02\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\b\x00', 0xffffffff90000004, "7fd82d5e02ca3901", "88e7ed00007fff051eae961ef6c6992b7e6e560000f9fff77711be18a3d918e0"}) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(0xffffffffffffffff, 0xc058534f, &(0x7f00000002c0)={{0x0, 0x80}, 0x1, 0x99, 0x2, {0x4b, 0x2}, 0x0, 0x3f}) write$sndseq(r0, &(0x7f0000000100)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @raw32={[0x0, 0x0, 0x4000000]}}, {0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @addr}], 0x60) 01:42:14 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$USBDEVFS_DISCONNECT_CLAIM(r8, 0x8108551b, &(0x7f0000000300)={0x200000, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a00)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = fcntl$dupfd(r12, 0x0, r11) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r16 = fcntl$dupfd(r15, 0x0, r14) ioctl$PERF_EVENT_IOC_ENABLE(r16, 0x8912, 0x400200) perf_event_open$cgroup(&(0x7f00000008c0)={0x0, 0x70, 0x4e, 0xd5, 0x3f, 0xbc, 0x0, 0x7, 0x94c21bf1da8fec65, 0x8, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000880), 0x1}, 0x0, 0x1000, 0x4, 0x8, 0xf0, 0x6, 0xffff}, r13, 0x9, r16, 0x7) setsockopt$IP_VS_SO_SET_STOPDAEMON(r10, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) r17 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000940)='/dev/dlm-control\x00', 0x961a74c32e7cad1, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000009c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_CONFIG(r17, &(0x7f0000000b00)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000b40)=ANY=[]}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) ioctl$KVM_SET_XSAVE(r2, 0x5000aea5, &(0x7f0000000480)={"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"}) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:14 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000940)='comm\x00') exit(0x0) syz_open_procfs(0x0, &(0x7f0000000000)='fd/3\x00W\xf6Je|H\x10\x05\xf1\xab\xc4MJ\xcbP\xed@\xe8\xe39\xd2\xea\xaap\xf9\x1aTM\x1f\x8e\x86c\xb4T\xde\x10\xf6\xa1\x89\xea)6\xca\x00\xa2\x04\xe6}\xaa\xd4\xf6~\xd0\x04bq\xe5\xa2\x99t;zzV\x15\x9a\x1b\xb9\x87@\xe9#\x99\xd6\xb8\xa4\xb1T\xdd\xe0\x93\xd0\xd5\xd8\x0f\x11y\xef\xf1R\v\xd6\x81\x97\xa96,q\xd053\x1a\x11VEG(\x93\x18\xf2\xbc\x17\x1f\xd7\x89F(G\x18S\xda\x99\xdb\xeb\xa0\xc9*\xbd\xb4=Y;\xa8\xed\xd2\xa9\xa2\x87\xa0\xfb\r\xf7I1]:\xd1;h\xc6\xe2M\xf2\x005\x96\x9b\xd1\x92v\xf9\xba\xf4\x12\r\"^\xc2\xb2\x1d\n:mnO8\\\xa1\x7f\x92r\x95\x96\xda7\xea\x85\xc8\x8c\xa8^\xb7\x1f\x80\x05\x03\xbb\xef9C\xcb(\x9bF\vHFW\x04\x1d\xc7LkW\xb2\xe9\xdd\x17\xe8%\x86\xd1H\rR\xafX\x1f\xea\x00'/247) 01:42:15 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TUNSETOFFLOAD(r3, 0x400454d0, 0x33) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) recvmsg$kcm(r4, &(0x7f00000002c0)={0x0, 0xef590978de5197b, &(0x7f0000000a40)=[{&(0x7f0000000300)=""/15, 0xe}], 0x1000000000000070, 0x0, 0x3d}, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r6 = socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-monitor\x00', 0x29c0, 0x0) r11 = socket$alg(0x26, 0x5, 0x0) bind$alg(r11, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'ecb(cipher_null)\x00'}, 0x58) r12 = accept4(r11, 0x0, &(0x7f0000000040)=0xfffffffffffffd48, 0x0) sendmsg$unix(r12, &(0x7f0000000d00)={&(0x7f00000002c0)=@abs, 0x6e, &(0x7f0000000600), 0x0, &(0x7f0000000bc0)}, 0x8000) r13 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r13, 0x1, r12, &(0x7f0000000100)={0x7}) epoll_wait(r13, &(0x7f0000000580)=[{}], 0x1, 0x0) ioctl$TUNSETVNETHDRSZ(r10, 0x400454d8, &(0x7f0000000200)=0x2) openat$vimc1(0xffffffffffffff9c, &(0x7f0000000340)='/dev/video1\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r6, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r5, &(0x7f00000000c0)=ANY=[@ANYBLOB="010800dd07"], 0x90ad) 01:42:15 executing program 3 (fault-call:1 fault-nth:5): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 650.119525][ T9491] device nr0 entered promiscuous mode [ 650.148901][ T9510] FAULT_INJECTION: forcing a failure. [ 650.148901][ T9510] name failslab, interval 1, probability 0, space 0, times 0 [ 650.161969][ T9510] CPU: 0 PID: 9510 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 01:42:15 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socketpair$unix(0x1, 0x5295fb90dc62bcb, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x8, 0x4, 0x1f, 0x0, 0x45, r7, 0x40, [], 0x0, r10, 0x4, 0x5}, 0x3c) r11 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r11, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r13, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) r14 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r14, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$IP_VS_SO_SET_STARTDAEMON(r14, 0x0, 0x48b, &(0x7f00000004c0)={0x48552d7c4b472eae, 'veth0_to_bridge\x00', 0x4}, 0x18) [ 650.169816][ T9510] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.179912][ T9510] Call Trace: [ 650.183263][ T9510] dump_stack+0x191/0x1f0 [ 650.187632][ T9510] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.193582][ T9510] should_fail+0xa3f/0xa50 [ 650.198129][ T9510] __should_failslab+0x264/0x280 [ 650.203099][ T9510] should_failslab+0x29/0x70 [ 650.207711][ T9510] __kmalloc+0xae/0x430 [ 650.211918][ T9510] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.217832][ T9510] ? kzalloc+0x53/0xb0 [ 650.221930][ T9510] kzalloc+0x53/0xb0 [ 650.225860][ T9510] crypto_create_tfm+0xfd/0x640 [ 650.230751][ T9510] crypto_alloc_tfm+0x339/0x630 [ 650.235660][ T9510] crypto_alloc_aead+0x99/0xb0 [ 650.240457][ T9510] esp_init_state+0x74f/0x1a50 [ 650.245270][ T9510] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.251202][ T9510] ? kmsan_get_metadata+0x39/0x350 [ 650.256369][ T9510] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.262373][ T9510] ? esp4_err+0x5b0/0x5b0 [ 650.266725][ T9510] __xfrm_init_state+0x1135/0x1510 [ 650.271889][ T9510] xfrm_add_sa+0x423f/0x5880 [ 650.276547][ T9510] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.282473][ T9510] ? xfrm_user_rcv_msg+0xae0/0xae0 [ 650.287693][ T9510] xfrm_user_rcv_msg+0x7ab/0xae0 [ 650.292701][ T9510] netlink_rcv_skb+0x431/0x620 [ 650.297492][ T9510] ? xfrm_netlink_rcv+0xf0/0xf0 [ 650.302381][ T9510] xfrm_netlink_rcv+0xb2/0xf0 [ 650.307091][ T9510] netlink_unicast+0xf3e/0x1020 [ 650.311980][ T9510] netlink_sendmsg+0x110f/0x1330 [ 650.316965][ T9510] ? netlink_getsockopt+0x1430/0x1430 [ 650.322358][ T9510] ___sys_sendmsg+0x14ff/0x1590 [ 650.327238][ T9510] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 650.333370][ T9510] ? __fget_light+0x6b1/0x710 [ 650.338075][ T9510] ? kmsan_internal_set_origin+0x6a/0xb0 [ 650.343746][ T9510] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.349665][ T9510] __se_sys_sendmsg+0x305/0x460 [ 650.354557][ T9510] __x64_sys_sendmsg+0x4a/0x70 [ 650.359345][ T9510] do_syscall_64+0xb6/0x160 [ 650.363877][ T9510] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 650.369815][ T9510] RIP: 0033:0x459ef9 [ 650.373737][ T9510] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 650.393360][ T9510] RSP: 002b:00007f4d27f38c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 650.401804][ T9510] RAX: ffffffffffffffda RBX: 00007f4d27f38c90 RCX: 0000000000459ef9 [ 650.409787][ T9510] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 01:42:15 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") ppoll(&(0x7f0000000080)=[{0xffffffffffffffff, 0x18}, {r1, 0x4000}, {r0, 0x2}], 0x3, &(0x7f00000000c0)={0x0, 0x989680}, &(0x7f00000001c0)={0x3}, 0x8) r2 = socket$l2tp(0x18, 0x1, 0x1) setsockopt$l2tp_PPPOL2TP_SO_SENDSEQ(r2, 0x111, 0x3, 0x1, 0x4) read(r0, &(0x7f0000000100)=""/71, 0x47) [ 650.417775][ T9510] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 650.425764][ T9510] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d27f396d4 [ 650.433754][ T9510] R13: 00000000004c8224 R14: 00000000004de250 R15: 0000000000000004 01:42:15 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:15 executing program 3 (fault-call:1 fault-nth:6): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 650.747191][ T9587] FAULT_INJECTION: forcing a failure. [ 650.747191][ T9587] name failslab, interval 1, probability 0, space 0, times 0 [ 650.760057][ T9587] CPU: 1 PID: 9587 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 650.767914][ T9587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 650.778012][ T9587] Call Trace: [ 650.781383][ T9587] dump_stack+0x191/0x1f0 [ 650.785792][ T9587] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.791761][ T9587] should_fail+0xa3f/0xa50 [ 650.796279][ T9587] __should_failslab+0x264/0x280 [ 650.801291][ T9587] should_failslab+0x29/0x70 [ 650.805959][ T9587] __kmalloc+0xae/0x430 [ 650.810194][ T9587] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.816163][ T9587] ? kzalloc+0x53/0xb0 [ 650.820305][ T9587] kzalloc+0x53/0xb0 [ 650.824273][ T9587] crypto_create_tfm+0xfd/0x640 [ 650.829202][ T9587] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.835166][ T9587] crypto_spawn_tfm2+0x20c/0x2b0 [ 650.840176][ T9587] crypto_authenc_init_tfm+0x79/0x500 [ 650.845620][ T9587] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.851582][ T9587] ? crypto_authenc_create+0x12b0/0x12b0 [ 650.857277][ T9587] crypto_aead_init_tfm+0x23c/0x2a0 [ 650.862661][ T9587] ? aead_register_instance+0x370/0x370 [ 650.868244][ T9587] crypto_create_tfm+0x1d3/0x640 [ 650.873227][ T9587] crypto_alloc_tfm+0x339/0x630 [ 650.878137][ T9587] crypto_alloc_aead+0x99/0xb0 [ 650.882942][ T9587] esp_init_state+0x74f/0x1a50 [ 650.887760][ T9587] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.893688][ T9587] ? kmsan_get_metadata+0x39/0x350 [ 650.898848][ T9587] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.904779][ T9587] ? esp4_err+0x5b0/0x5b0 [ 650.909144][ T9587] __xfrm_init_state+0x1135/0x1510 [ 650.914427][ T9587] xfrm_add_sa+0x423f/0x5880 [ 650.919085][ T9587] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.925013][ T9587] ? xfrm_user_rcv_msg+0xae0/0xae0 [ 650.930160][ T9587] xfrm_user_rcv_msg+0x7ab/0xae0 [ 650.935176][ T9587] netlink_rcv_skb+0x431/0x620 [ 650.939974][ T9587] ? xfrm_netlink_rcv+0xf0/0xf0 [ 650.944865][ T9587] xfrm_netlink_rcv+0xb2/0xf0 [ 650.949577][ T9587] netlink_unicast+0xf3e/0x1020 [ 650.954490][ T9587] netlink_sendmsg+0x110f/0x1330 [ 650.959473][ T9587] ? netlink_getsockopt+0x1430/0x1430 [ 650.964867][ T9587] ___sys_sendmsg+0x14ff/0x1590 [ 650.969746][ T9587] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 650.975881][ T9587] ? __fget_light+0x6b1/0x710 [ 650.980589][ T9587] ? kmsan_internal_set_origin+0x6a/0xb0 [ 650.986260][ T9587] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 650.992178][ T9587] __se_sys_sendmsg+0x305/0x460 [ 650.997071][ T9587] __x64_sys_sendmsg+0x4a/0x70 [ 651.001858][ T9587] do_syscall_64+0xb6/0x160 [ 651.006389][ T9587] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 651.012296][ T9587] RIP: 0033:0x459ef9 [ 651.016221][ T9587] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 651.035842][ T9587] RSP: 002b:00007f4d27f38c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 01:42:15 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) ioctl$int_in(r1, 0x800060c0045006, &(0x7f0000000180)=0x3) read(r0, &(0x7f0000000100)=""/71, 0x47) [ 651.044278][ T9587] RAX: ffffffffffffffda RBX: 00007f4d27f38c90 RCX: 0000000000459ef9 [ 651.052265][ T9587] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 651.060263][ T9587] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 651.068252][ T9587] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d27f396d4 [ 651.076243][ T9587] R13: 00000000004c8224 R14: 00000000004de250 R15: 0000000000000004 01:42:16 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDGETKEYCODE(r5, 0x4b4c, &(0x7f0000000480)={0x489, 0x7}) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r6 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$EVIOCGMASK(r6, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r7, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r8 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r8, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r7, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket(0xa, 0x1, 0x0) link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') setsockopt$IP_VS_SO_SET_STOPDAEMON(r10, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f00000004c0)=@assoc_value, &(0x7f0000000500)=0x8) [ 651.127671][ T9491] device nr0 entered promiscuous mode 01:42:16 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000040)={0x80}, 0x213) sendmsg$nl_route(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYRES32, @ANYRES32=0x0], 0x2}}, 0x0) 01:42:16 executing program 3 (fault-call:1 fault-nth:7): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 651.366242][ T9712] FAULT_INJECTION: forcing a failure. [ 651.366242][ T9712] name failslab, interval 1, probability 0, space 0, times 0 [ 651.379122][ T9712] CPU: 0 PID: 9712 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 651.387004][ T9712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 651.397093][ T9712] Call Trace: [ 651.400454][ T9712] dump_stack+0x191/0x1f0 [ 651.405808][ T9712] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 651.411775][ T9712] should_fail+0xa3f/0xa50 [ 651.416279][ T9712] __should_failslab+0x264/0x280 [ 651.421285][ T9712] should_failslab+0x29/0x70 [ 651.426106][ T9712] __kmalloc+0xae/0x430 [ 651.430340][ T9712] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 651.436293][ T9712] ? kzalloc+0x53/0xb0 [ 651.440440][ T9712] kzalloc+0x53/0xb0 [ 651.444396][ T9712] crypto_create_tfm+0xfd/0x640 [ 651.449333][ T9712] crypto_init_shash_ops_async+0xce/0x590 [ 651.455120][ T9712] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 651.461070][ T9712] crypto_ahash_init_tfm+0xf5/0x740 [ 651.466327][ T9712] ? crypto_ahash_extsize+0xf0/0xf0 [ 651.471557][ T9712] crypto_create_tfm+0x1d3/0x640 [ 651.476536][ T9712] crypto_spawn_tfm2+0x20c/0x2b0 [ 651.481595][ T9712] crypto_authenc_init_tfm+0x79/0x500 [ 651.487020][ T9712] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 651.492952][ T9712] ? crypto_authenc_create+0x12b0/0x12b0 [ 651.498621][ T9712] crypto_aead_init_tfm+0x23c/0x2a0 [ 651.503851][ T9712] ? aead_register_instance+0x370/0x370 [ 651.509426][ T9712] crypto_create_tfm+0x1d3/0x640 [ 651.514425][ T9712] crypto_alloc_tfm+0x339/0x630 [ 651.519317][ T9712] crypto_alloc_aead+0x99/0xb0 [ 651.524112][ T9712] esp_init_state+0x74f/0x1a50 [ 651.528920][ T9712] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 651.534838][ T9712] ? kmsan_get_metadata+0x39/0x350 [ 651.539990][ T9712] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 651.545904][ T9712] ? esp4_err+0x5b0/0x5b0 [ 651.550271][ T9712] __xfrm_init_state+0x1135/0x1510 [ 651.555427][ T9712] xfrm_add_sa+0x423f/0x5880 [ 651.560068][ T9712] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 651.565990][ T9712] ? xfrm_user_rcv_msg+0xae0/0xae0 [ 651.571122][ T9712] xfrm_user_rcv_msg+0x7ab/0xae0 [ 651.576131][ T9712] netlink_rcv_skb+0x431/0x620 [ 651.580932][ T9712] ? xfrm_netlink_rcv+0xf0/0xf0 [ 651.585825][ T9712] xfrm_netlink_rcv+0xb2/0xf0 [ 651.590534][ T9712] netlink_unicast+0xf3e/0x1020 [ 651.595430][ T9712] netlink_sendmsg+0x110f/0x1330 [ 651.600409][ T9712] ? netlink_getsockopt+0x1430/0x1430 [ 651.605805][ T9712] ___sys_sendmsg+0x14ff/0x1590 [ 651.610686][ T9712] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 651.616817][ T9712] ? __fget_light+0x6b1/0x710 [ 651.621525][ T9712] ? kmsan_internal_set_origin+0x6a/0xb0 [ 651.627196][ T9712] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 651.633208][ T9712] __se_sys_sendmsg+0x305/0x460 [ 651.638104][ T9712] __x64_sys_sendmsg+0x4a/0x70 [ 651.642896][ T9712] do_syscall_64+0xb6/0x160 [ 651.647451][ T9712] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 651.653360][ T9712] RIP: 0033:0x459ef9 [ 651.657279][ T9712] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 651.676900][ T9712] RSP: 002b:00007f4d27f38c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 651.685344][ T9712] RAX: ffffffffffffffda RBX: 00007f4d27f38c90 RCX: 0000000000459ef9 [ 651.693330][ T9712] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 651.701313][ T9712] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 651.709301][ T9712] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d27f396d4 [ 651.717287][ T9712] R13: 00000000004c8224 R14: 00000000004de250 R15: 0000000000000004 01:42:16 executing program 2: r0 = signalfd(0xffffffffffffffff, &(0x7f00007aeff8), 0x8) mkdir(&(0x7f0000000280)='./control\x00', 0x0) read(r0, &(0x7f0000e6d000)=""/384, 0x180) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x3fff) r2 = gettid() fcntl$setown(r1, 0x8, r2) rt_sigprocmask(0x3, &(0x7f000003b000)={0xbffffffffffffffe}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) socketpair$unix(0x1, 0x80001, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r5, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$inet_mreq(r5, 0x0, 0x23, &(0x7f0000000100)={@rand_addr=0x1, @loopback}, 0x8) fcntl$dupfd(r4, 0x0, r3) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x800) ioctl$USBDEVFS_RELEASEINTERFACE(0xffffffffffffffff, 0x80045510, &(0x7f0000000140)=0x8) inotify_add_watch(r1, &(0x7f00007a7000)='./control\x00', 0xa4000960) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) lsetxattr(&(0x7f0000000040)='./control/file0\x00', &(0x7f0000000080)=@known='system.posix_acl_access\x00', &(0x7f00000000c0)='-vboxnet1\x00', 0xa, 0x0) 01:42:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(0xffffffffffffffff, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:17 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="00ed8977bf10a61136c544c8a0eba11f9245813b672882b8cc31aa568c3e05db2df1f06934a79d9b29bb3bf6d22b5e5fee55e81c0987583a1bc7"], 0x90ad) 01:42:17 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) ioctl$TCSETXF(r0, 0x5434, &(0x7f00000000c0)={0xffff, 0x101, [0x100, 0xf98e, 0xffff, 0x4, 0x4485], 0x1ff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bind$vsock_dgram(r3, &(0x7f0000000080), 0x10) read(r0, &(0x7f0000000100)=""/71, 0x47) socket$inet6_sctp(0xa, 0x1, 0x84) 01:42:17 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r6, 0x4d) getsockopt$inet_sctp6_SCTP_MAX_BURST(r6, 0x84, 0x14, &(0x7f0000001f40), &(0x7f0000001f80)=0x4) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r8, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) recvmmsg(r9, &(0x7f0000001e40)=[{{&(0x7f0000000540)=@ipx, 0x80, &(0x7f0000000880)=[{&(0x7f00000005c0)=""/168, 0xa8}, {&(0x7f0000000680)=""/242, 0xf2}, {&(0x7f0000000780)=""/254, 0xfe}], 0x3, &(0x7f00000008c0)=""/254, 0xfe}, 0x2}, {{&(0x7f00000009c0)=@pptp={0x18, 0x2, {0x0, @dev}}, 0x80, &(0x7f0000000c80)=[{&(0x7f0000000a40)=""/122, 0x7a}, {&(0x7f0000000ac0)=""/150, 0x96}, {&(0x7f0000000b80)=""/53, 0x35}, {&(0x7f0000000bc0)=""/162, 0xa2}], 0x4, &(0x7f0000000cc0)=""/68, 0x44}, 0xffffffff}, {{&(0x7f0000000d40)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @ipv4={[], [], @empty}}}, 0x80, &(0x7f0000001440)=[{&(0x7f0000000dc0)=""/148, 0x94}, {&(0x7f0000000e80)=""/223, 0xdf}, {&(0x7f0000000f80)=""/126, 0x7e}, {&(0x7f0000001000)=""/229, 0xe5}, {&(0x7f0000001100)=""/62, 0x3e}, {&(0x7f0000001140)=""/145, 0x91}, {&(0x7f0000001200)=""/94, 0x5e}, {&(0x7f0000001280)=""/147, 0x93}, {&(0x7f0000001340)=""/34, 0x22}, {&(0x7f0000001380)=""/189, 0xbd}], 0xa, &(0x7f0000001500)=""/210, 0xd2}, 0x10000}, {{&(0x7f0000001600)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @remote}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001680)=""/225, 0xe1}, {&(0x7f0000001780)=""/103, 0x67}, {&(0x7f0000001800)=""/246, 0xf6}, {&(0x7f0000001900)=""/148, 0x94}, {&(0x7f00000019c0)=""/185, 0xb9}, {&(0x7f0000001a80)=""/193, 0xc1}, {&(0x7f0000001b80)=""/206, 0xce}, {&(0x7f0000001c80)=""/112, 0x70}, {&(0x7f0000001d00)=""/18, 0x12}, {&(0x7f0000001d40)=""/17, 0x11}], 0xa}, 0x5}], 0x4, 0x9e608db85ba99a5c, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000480)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r12, &(0x7f0000000500)={0x7, 0x8, 0xfa00, {r13, 0x80000001}}, 0x10) 01:42:17 executing program 3 (fault-call:1 fault-nth:8): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 652.030028][ T9757] FAULT_INJECTION: forcing a failure. [ 652.030028][ T9757] name failslab, interval 1, probability 0, space 0, times 0 [ 652.043400][ T9757] CPU: 0 PID: 9757 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 652.051251][ T9757] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.061355][ T9757] Call Trace: [ 652.064730][ T9757] dump_stack+0x191/0x1f0 [ 652.069153][ T9757] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 652.075127][ T9757] should_fail+0xa3f/0xa50 [ 652.079641][ T9757] __should_failslab+0x264/0x280 [ 652.084650][ T9757] should_failslab+0x29/0x70 [ 652.089312][ T9757] __kmalloc+0xae/0x430 [ 652.093541][ T9757] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 652.099675][ T9757] ? kzalloc+0x53/0xb0 [ 652.103809][ T9757] kzalloc+0x53/0xb0 [ 652.107773][ T9757] crypto_create_tfm+0xfd/0x640 [ 652.112699][ T9757] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 652.118662][ T9757] crypto_spawn_tfm2+0x20c/0x2b0 [ 652.123686][ T9757] crypto_authenc_init_tfm+0x11d/0x500 [ 652.129223][ T9757] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 652.135185][ T9757] ? crypto_authenc_create+0x12b0/0x12b0 [ 652.140907][ T9757] crypto_aead_init_tfm+0x23c/0x2a0 [ 652.146174][ T9757] ? aead_register_instance+0x370/0x370 [ 652.151786][ T9757] crypto_create_tfm+0x1d3/0x640 [ 652.156808][ T9757] crypto_alloc_tfm+0x339/0x630 [ 652.161748][ T9757] crypto_alloc_aead+0x99/0xb0 [ 652.166588][ T9757] esp_init_state+0x74f/0x1a50 [ 652.171442][ T9757] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 652.177404][ T9757] ? kmsan_get_metadata+0x39/0x350 [ 652.182605][ T9757] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 652.188569][ T9757] ? esp4_err+0x5b0/0x5b0 [ 652.192956][ T9757] __xfrm_init_state+0x1135/0x1510 [ 652.198150][ T9757] xfrm_add_sa+0x423f/0x5880 [ 652.202837][ T9757] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 652.208798][ T9757] ? xfrm_user_rcv_msg+0xae0/0xae0 [ 652.213971][ T9757] xfrm_user_rcv_msg+0x7ab/0xae0 [ 652.219034][ T9757] netlink_rcv_skb+0x431/0x620 [ 652.223860][ T9757] ? xfrm_netlink_rcv+0xf0/0xf0 [ 652.228787][ T9757] xfrm_netlink_rcv+0xb2/0xf0 [ 652.233543][ T9757] netlink_unicast+0xf3e/0x1020 [ 652.238441][ T9757] netlink_sendmsg+0x110f/0x1330 [ 652.243426][ T9757] ? netlink_getsockopt+0x1430/0x1430 [ 652.248824][ T9757] ___sys_sendmsg+0x14ff/0x1590 [ 652.253723][ T9757] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 652.259861][ T9757] ? __fget_light+0x6b1/0x710 [ 652.264571][ T9757] ? kmsan_internal_set_origin+0x6a/0xb0 [ 652.270241][ T9757] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 652.276185][ T9757] __se_sys_sendmsg+0x305/0x460 [ 652.281079][ T9757] __x64_sys_sendmsg+0x4a/0x70 [ 652.285871][ T9757] do_syscall_64+0xb6/0x160 [ 652.290400][ T9757] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 652.296309][ T9757] RIP: 0033:0x459ef9 [ 652.300231][ T9757] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 652.319855][ T9757] RSP: 002b:00007f4d27f38c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 01:42:17 executing program 1: r0 = syz_open_dev$audion(&(0x7f0000000480)='/dev/audio#\x00', 0xfdf5, 0x12000) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x334b11a68c408fdb) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r6, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r8, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 652.328293][ T9757] RAX: ffffffffffffffda RBX: 00007f4d27f38c90 RCX: 0000000000459ef9 [ 652.336280][ T9757] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 652.344266][ T9757] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 652.352252][ T9757] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d27f396d4 [ 652.360251][ T9757] R13: 00000000004c8224 R14: 00000000004de250 R15: 0000000000000004 [ 652.413071][ T9866] device nr0 entered promiscuous mode 01:42:17 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VT_OPENQRY(r3, 0x5600, &(0x7f0000000300)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r6, 0x84, 0x15, &(0x7f0000000340)={0x1}, 0x1) read(r0, &(0x7f0000000100)=""/71, 0x47) r7 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r8 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x309, r7) keyctl$read(0xb, r8, &(0x7f0000005340)=""/4096, 0xffffffffffffffc2) r9 = request_key(&(0x7f0000000080)='asymmetric\x00', &(0x7f00000000c0)={'syz', 0x1}, &(0x7f00000001c0)='!^em0ppp0\\mime_type\x00', r8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$RNDZAPENTCNT(r12, 0x5204, &(0x7f0000000380)=0x10001) keyctl$KEYCTL_PKEY_QUERY(0x18, r9, 0x0, &(0x7f0000000200)='ppp0\x00', &(0x7f0000000240)) r13 = getpgid(0xffffffffffffffff) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000280)=0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r17 = fcntl$dupfd(r16, 0x0, r15) ioctl$PERF_EVENT_IOC_ENABLE(r17, 0x8912, 0x400200) r18 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r18, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") setsockopt$IP_VS_SO_SET_DELDEST(r18, 0x0, 0x488, &(0x7f00000003c0)={{0x4, @broadcast, 0x4e21, 0x4, 'lc\x00', 0x33, 0x6, 0x3e}, {@rand_addr=0x4, 0x4e20, 0x3, 0x6, 0x0, 0x3}}, 0x44) r19 = socket$bt_rfcomm(0x1f, 0x1, 0x3) kcmp$KCMP_EPOLL_TFD(r13, r14, 0x7, r0, &(0x7f00000002c0)={r17, r19, 0x40b}) 01:42:17 executing program 3 (fault-call:1 fault-nth:9): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 652.692218][ T9907] FAULT_INJECTION: forcing a failure. [ 652.692218][ T9907] name failslab, interval 1, probability 0, space 0, times 0 [ 652.705119][ T9907] CPU: 1 PID: 9907 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 652.712980][ T9907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 652.723079][ T9907] Call Trace: [ 652.726441][ T9907] dump_stack+0x191/0x1f0 [ 652.730851][ T9907] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 652.736831][ T9907] should_fail+0xa3f/0xa50 [ 652.741341][ T9907] __should_failslab+0x264/0x280 [ 652.746344][ T9907] should_failslab+0x29/0x70 [ 652.750990][ T9907] __kmalloc+0xae/0x430 [ 652.755190][ T9907] ? esp_init_state+0x118d/0x1a50 [ 652.760253][ T9907] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 652.766182][ T9907] esp_init_state+0x118d/0x1a50 [ 652.771085][ T9907] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 652.777016][ T9907] ? kmsan_get_metadata+0x39/0x350 [ 652.782171][ T9907] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 652.788089][ T9907] ? esp4_err+0x5b0/0x5b0 [ 652.792452][ T9907] __xfrm_init_state+0x1135/0x1510 [ 652.797608][ T9907] xfrm_add_sa+0x423f/0x5880 [ 652.802250][ T9907] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 652.808169][ T9907] ? xfrm_user_rcv_msg+0xae0/0xae0 [ 652.813391][ T9907] xfrm_user_rcv_msg+0x7ab/0xae0 [ 652.818406][ T9907] netlink_rcv_skb+0x431/0x620 [ 652.823208][ T9907] ? xfrm_netlink_rcv+0xf0/0xf0 [ 652.828108][ T9907] xfrm_netlink_rcv+0xb2/0xf0 [ 652.832817][ T9907] netlink_unicast+0xf3e/0x1020 [ 652.837708][ T9907] netlink_sendmsg+0x110f/0x1330 [ 652.842693][ T9907] ? netlink_getsockopt+0x1430/0x1430 [ 652.848088][ T9907] ___sys_sendmsg+0x14ff/0x1590 [ 652.852975][ T9907] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 652.859106][ T9907] ? __fget_light+0x6b1/0x710 [ 652.863806][ T9907] ? kmsan_internal_set_origin+0x6a/0xb0 [ 652.869477][ T9907] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 652.875397][ T9907] __se_sys_sendmsg+0x305/0x460 [ 652.880290][ T9907] __x64_sys_sendmsg+0x4a/0x70 [ 652.885085][ T9907] do_syscall_64+0xb6/0x160 [ 652.889616][ T9907] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 652.895526][ T9907] RIP: 0033:0x459ef9 [ 652.899458][ T9907] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 652.919094][ T9907] RSP: 002b:00007f4d27f38c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 652.927539][ T9907] RAX: ffffffffffffffda RBX: 00007f4d27f38c90 RCX: 0000000000459ef9 [ 652.935535][ T9907] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 01:42:18 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xb7, &(0x7f0000000480)="6350d421dfa047b121a25964b40861fdd34a34236a5a7f38ac74c5154f0635648ccf6ac14b28e2e4723f84e5e0e10c903bea89a845c033716937ce612b792bffdcf494d4a0662e8a82c8cefe5df201955fd35f1aa6800208ea256bd60e4cb67f6e519d2b000d6e85418270ce9570a8e8e01e09bc02329bec4a04550860ee3d04333e08bb1460fd5907cf029f24680b557a5b76a8a894839b61e3f78e16c12a7157b943287a2b5564c5c77ced48c7d52bffdc7cdd81b253"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 652.943523][ T9907] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 652.951517][ T9907] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d27f396d4 [ 652.959505][ T9907] R13: 00000000004c8224 R14: 00000000004de250 R15: 0000000000000004 [ 653.012109][ T9866] device nr0 entered promiscuous mode 01:42:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:18 executing program 2: r0 = socket$inet6(0xa, 0x40000080806, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x4d) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e20, 0xfffffffd, @mcast2, 0xfffffffe}, 0x1c) listen(r0, 0x9008) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000280)={0xa, 0x4e20, 0x0, @dev, 0x3}, 0x1c) connect$inet6(r3, &(0x7f0000419000)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0xf}}, 0x1b) 01:42:18 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x1005, 0x22000) poll(&(0x7f0000000040)=[{r0, 0x2002}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:42:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @dev}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000134000)={0x2, 0x0, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fa, &(0x7f0000000140)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) socket$inet_dccp(0x2, 0x6, 0x0) r1 = socket$kcm(0xa, 0x1, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x5452, &(0x7f0000000080)) r2 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$IP_VS_SO_GET_TIMEOUT(r2, 0x0, 0x486, &(0x7f0000000200), &(0x7f0000000240)=0xc) setsockopt$sock_attach_bpf(r1, 0x1, 0x7, &(0x7f0000000280), 0x4) close(r1) r3 = syz_open_dev$loop(&(0x7f00000001c0)='/dev/loop#\x00', 0x0, 0x105084) r4 = memfd_create(&(0x7f00000000c0)='\x00\x00\x00\x00\x8c\x00'/15, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) fstat(r5, &(0x7f0000000000)) pwritev(r4, &(0x7f0000f50f90)=[{&(0x7f0000000100)="a3", 0x1}], 0x1, 0x81003) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r7, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r8, 0xc10c5541, &(0x7f0000000300)={0x20, 0x5, 0x40000, 0x0, 0x0, [], [], [], 0x7fff, 0x100}) sendfile(r0, r3, 0x0, 0x102000002) 01:42:18 executing program 3 (fault-call:1 fault-nth:10): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:18 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) prctl$PR_SET_SECCOMP(0x16, 0x6, &(0x7f0000000100)={0x4, &(0x7f0000000000)=[{0x3f, 0x20, 0x8}, {0x6, 0x44, 0xee, 0x800}, {0x0, 0x7, 0x20, 0x2}, {0x36c, 0x9, 0x80, 0x3}]}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r4 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/dlm_plock\x00', 0x6742, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r4, 0x401870cc, &(0x7f0000000300)={0x4, 0x2, 0x7, 0x7}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x3) 01:42:18 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$DRM_IOCTL_SET_CLIENT_CAP(0xffffffffffffffff, 0x4010640d, &(0x7f0000000480)={0x0, 0xb2d}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) pwritev(r1, &(0x7f0000001680)=[{&(0x7f00000004c0)="6cc9fc843adc75cff1ec49d40371038ca99261ccfa19d5c90cc79f01167be0fa490c39e09bfa3a6ccb14d096cfa1387e1999778d5786c25f0ea37bc52c00ccf95304c0658401e47b202c611d422b6552e89bd542d7a85676a691b6765d58be3284b270e774fface9b814b2d4203889368a18f590b2f6970e400d69f31f5fb73f82978f04218787f5bac3", 0x8a}, {&(0x7f0000000580)="a01bda9f808e656945d4d110", 0xc}, {&(0x7f00000005c0)="3c36475e4636185671d2cc97904e1d835c688d412bb57d817c8c8bdf7930b13a6cfd60e37a775e76410014bb427746115204e027f319c6534ae6baeb20862b89d35f32565a63edb6719e01094ea27cd91cf135463b7b7ebfbb959b76fbdfaaf57ee2cab75b46f8c53b38bbc31a60a4acdace9f86161fba282f78549e7d54b44aebacab9107d0e4c6fc61b4", 0x8b}, {&(0x7f0000000680)="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", 0x1000}], 0x4, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 653.561602][T10045] FAULT_INJECTION: forcing a failure. [ 653.561602][T10045] name failslab, interval 1, probability 0, space 0, times 0 [ 653.572323][T10043] device nr0 entered promiscuous mode [ 653.574513][T10045] CPU: 0 PID: 10045 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 653.587740][T10045] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 653.597835][T10045] Call Trace: [ 653.601191][T10045] dump_stack+0x191/0x1f0 [ 653.605589][T10045] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 653.611530][T10045] should_fail+0xa3f/0xa50 [ 653.616003][T10045] __should_failslab+0x264/0x280 [ 653.620988][T10045] should_failslab+0x29/0x70 [ 653.625612][T10045] kmem_cache_alloc_node+0x103/0xe70 [ 653.630934][T10045] ? __alloc_skb+0x215/0xa10 [ 653.635573][T10045] __alloc_skb+0x215/0xa10 [ 653.640039][T10045] xfrm_send_state_notify+0xdec/0x2b50 [ 653.645546][T10045] ? xfrm_count_pfkey_enc_supported+0x350/0x350 [ 653.651819][T10045] km_state_notify+0x125/0x1e0 [ 653.656616][T10045] xfrm_add_sa+0x5716/0x5880 [ 653.661269][T10045] ? xfrm_user_rcv_msg+0xae0/0xae0 [ 653.666407][T10045] xfrm_user_rcv_msg+0x7ab/0xae0 [ 653.671419][T10045] netlink_rcv_skb+0x431/0x620 [ 653.676212][T10045] ? xfrm_netlink_rcv+0xf0/0xf0 [ 653.681099][T10045] xfrm_netlink_rcv+0xb2/0xf0 [ 653.685836][T10045] netlink_unicast+0xf3e/0x1020 [ 653.690726][T10045] netlink_sendmsg+0x110f/0x1330 [ 653.695706][T10045] ? netlink_getsockopt+0x1430/0x1430 [ 653.701096][T10045] ___sys_sendmsg+0x14ff/0x1590 [ 653.705974][T10045] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 653.712102][T10045] ? __fget_light+0x6b1/0x710 [ 653.716810][T10045] ? kmsan_internal_set_origin+0x6a/0xb0 [ 653.722480][T10045] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 653.728400][T10045] __se_sys_sendmsg+0x305/0x460 [ 653.733302][T10045] __x64_sys_sendmsg+0x4a/0x70 [ 653.738095][T10045] do_syscall_64+0xb6/0x160 [ 653.742631][T10045] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 653.748641][T10045] RIP: 0033:0x459ef9 [ 653.752582][T10045] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 653.772218][T10045] RSP: 002b:00007f4d27f38c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 653.780660][T10045] RAX: ffffffffffffffda RBX: 00007f4d27f38c90 RCX: 0000000000459ef9 [ 653.788650][T10045] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 653.796642][T10045] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 653.804631][T10045] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d27f396d4 [ 653.812625][T10045] R13: 00000000004c8224 R14: 00000000004de250 R15: 0000000000000004 01:42:19 executing program 3 (fault-call:1 fault-nth:11): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 654.110499][T10068] device nr0 entered promiscuous mode 01:42:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 654.245726][T10072] FAULT_INJECTION: forcing a failure. [ 654.245726][T10072] name failslab, interval 1, probability 0, space 0, times 0 [ 654.259594][T10072] CPU: 1 PID: 10072 Comm: syz-executor.3 Not tainted 5.4.0-rc3+ #0 [ 654.267549][T10072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 654.277643][T10072] Call Trace: [ 654.280985][T10072] dump_stack+0x191/0x1f0 [ 654.285358][T10072] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 654.291286][T10072] should_fail+0xa3f/0xa50 [ 654.295747][T10072] __should_failslab+0x264/0x280 [ 654.300733][T10072] should_failslab+0x29/0x70 [ 654.305347][T10072] __kmalloc_node_track_caller+0x1c9/0x13d0 [ 654.311268][T10072] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 654.317358][T10072] ? kmem_cache_alloc_node+0x1b6/0xe70 [ 654.322844][T10072] ? xfrm_send_state_notify+0xdec/0x2b50 [ 654.328525][T10072] ? xfrm_send_state_notify+0xdec/0x2b50 [ 654.334188][T10072] __alloc_skb+0x306/0xa10 [ 654.338642][T10072] ? xfrm_send_state_notify+0xdec/0x2b50 [ 654.344315][T10072] xfrm_send_state_notify+0xdec/0x2b50 [ 654.349824][T10072] ? xfrm_count_pfkey_enc_supported+0x350/0x350 [ 654.356524][T10072] km_state_notify+0x125/0x1e0 [ 654.361322][T10072] xfrm_add_sa+0x5716/0x5880 [ 654.365962][T10072] ? xfrm_user_rcv_msg+0xae0/0xae0 [ 654.371097][T10072] xfrm_user_rcv_msg+0x7ab/0xae0 [ 654.376129][T10072] netlink_rcv_skb+0x431/0x620 [ 654.380930][T10072] ? xfrm_netlink_rcv+0xf0/0xf0 [ 654.385821][T10072] xfrm_netlink_rcv+0xb2/0xf0 [ 654.390542][T10072] netlink_unicast+0xf3e/0x1020 [ 654.395435][T10072] netlink_sendmsg+0x110f/0x1330 [ 654.400435][T10072] ? netlink_getsockopt+0x1430/0x1430 [ 654.405831][T10072] ___sys_sendmsg+0x14ff/0x1590 [ 654.410724][T10072] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 654.416849][T10072] ? __fget_light+0x6b1/0x710 [ 654.421550][T10072] ? kmsan_internal_set_origin+0x6a/0xb0 [ 654.427226][T10072] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 654.433145][T10072] __se_sys_sendmsg+0x305/0x460 [ 654.438041][T10072] __x64_sys_sendmsg+0x4a/0x70 [ 654.442831][T10072] do_syscall_64+0xb6/0x160 [ 654.447362][T10072] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 654.453267][T10072] RIP: 0033:0x459ef9 [ 654.457188][T10072] Code: ad b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b6 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 654.476809][T10072] RSP: 002b:00007f4d27f38c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 654.485245][T10072] RAX: ffffffffffffffda RBX: 00007f4d27f38c90 RCX: 0000000000459ef9 [ 654.493235][T10072] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000003 [ 654.501231][T10072] RBP: 000000000075bf20 R08: 0000000000000000 R09: 0000000000000000 [ 654.509217][T10072] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f4d27f396d4 [ 654.517206][T10072] R13: 00000000004c8224 R14: 00000000004de250 R15: 0000000000000004 01:42:19 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$CAPI_NCCI_OPENCOUNT(0xffffffffffffffff, 0x80044326, &(0x7f0000000480)=0x1) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) connect$unix(r5, &(0x7f0000000540)=@abs={0x0, 0x0, 0x4e23}, 0x6e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCLINUX2(0xffffffffffffffff, 0x541c, &(0x7f00000004c0)={0x2, 0x81, 0x7ff, 0x0, 0x40, 0x1ff}) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$KVM_GET_ONE_REG(r10, 0x4010aeab, &(0x7f0000000500)={0x1000, 0x9}) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:20 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x25}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1, 0x0, 0xfffffe9a}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000000002"], 0x90ad) 01:42:20 executing program 3 (fault-call:1 fault-nth:12): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 655.160584][T10131] device nr0 entered promiscuous mode 01:42:20 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x2000050a, 0x3) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:42:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r6, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r3, &(0x7f00000005c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000580)={&(0x7f00000006c0)=ANY=[@ANYBLOB="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"/344, @ANYRES16=r6, @ANYBLOB="000027bd7000fcdbdf250c0000000c0007000800010000040000"], 0x20}, 0x1, 0x0, 0x0, 0x10000}, 0x40000) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) listen(r7, 0x80000000) setsockopt$RDS_FREE_MR(0xffffffffffffffff, 0x114, 0x3, &(0x7f00000004c0)={{0x1, 0x5}, 0x39}, 0x10) r8 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r8, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$sock_proto_private(r2, 0x89e3, &(0x7f0000000640)="6575dafa2ca19506597f66bd16c00f28e9b5ab631be459b40b5517617c0b38795f605b71b704753cdbba730603353f738b57b24b038f4d63eb31825cf6a83a1a7dc9d6e207") ioctl$USBDEVFS_DISCONNECT_CLAIM(r9, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) r10 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r10, 0x119, 0x1, &(0x7f0000000040)=0x8, 0xf9e87ee1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r12, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r8, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) syz_open_dev$vbi(&(0x7f0000000600)='/dev/vbi#\x00', 0x1, 0x2) 01:42:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r1 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="46ac5128da090e4899c34a28efeb85968ead969e21e33725a7edc030260cdb3ca79964a6e93ce51185f005b7dac052cb797af438c32c29b736fb12c63dd0e504445044a1ae9c10fd8171232ed7dcb08e9acaf4c569c4c1805c47994118fc35ff7f03407dc7093fa7d3132d276a10768b2711cd1c6ecd3545692431856b6e0651412ff7b73711097f061a1b67f6c3d7605eab3b675b6c061e6ef32b7ea8847b6f84da1334d35322b94447bfaca74b152eb64cfa54cb63126c2cc662e7898e6459ed40c4566403f303d341c9c34c6049d9f8e1c2a9483f003c20e66886d0e1629f498668c202f183de294d03da07c9f5feb65bc196554a79a2f255828c1f1cf9a09654f9df849443e8d290debcc78efbdca391a348b33f18ef618011273faa1f095298dd71db08a90e177a1e9a0c771deca3b51670a26850b89d4439574328c19d9e91766dd52169e0ad5011e4acc005861b3b3146d67445e6f6c75ce4af9d8db6963887d79113613267c5bc42fb0aca828590fb291ce8836d3cd391d364efdbb7015d8ec643d83b623380c21c6ebbf774498c94e60838a45d4692bfe73aaea2bbcecb6dcec20e5aa48a950428e2372009212f2f6be608cdec5ff84108f3f3d2e42c99a6d4cd4577ec9f39a51533efe71d494ccadb66eddd4cc0e56b33eefb0ada68ae36c905a977d9042a63299d2130f4e85357b0078c31bc45b00f5ccd879a6735d85882bfddbc6f2cff4a2b976b29e5a8adc74893c748b297a660ba0f64ad8a6ac6fcf180b6a4357ad6733cb75035cd58631142bd720cf52bcd1438647cbe1058e32d33c38f1327bef3f6b1c815ab4f2d47366473ae37c65a2d1df88823dd4c326d640c50e5bddfa976f04cd034331b632cd7a8bbc838081f28f6e24ed646721cea36e56501f9085e428a6c94b7ba5431f59651f36c8f715e4547ffed53c03cc58d2d4382193625cf69c197c4eb3c3c86c291d693837ab7eb23d61d2518379f0c61acf67425afa1ff8d1fac196a7ef9f6f9b514a2028ae010d1bf10833940294c400401ec706ce366dc4c62f6c55c6985a31592360cc7e6cc30a90cae1891b4cffb882b0329457503", 0x309, r1) keyctl$read(0xb, r2, &(0x7f0000005340)=""/4096, 0xffffffffffffffc2) r3 = add_key(&(0x7f0000000000)='rxrpc\x00', &(0x7f0000000040)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r4 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r5 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x309, r4) keyctl$read(0xb, r5, &(0x7f0000005340)=""/4096, 0xffffffffffffffc2) keyctl$dh_compute(0x17, &(0x7f0000000080)={r2, r3, r5}, &(0x7f0000000100)=""/94, 0x5e, 0x0) 01:42:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) fcntl$getflags(r3, 0x401) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000480)={{0xc16, 0x2}, 0x2209111a82825195}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x25dfdbfd, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {0x9}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:20 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x220000, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x1f7) syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) ioctl$int_in(r1, 0x800060c0045006, &(0x7f0000000180)=0x100000035) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000001c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r4, &(0x7f0000000280)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x20080002}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x30, r5, 0x8, 0x70bd29, 0x25dfdbfe, {{}, 0x0, 0x5, 0x0, {0x14, 0x19, {0x4, 0x1, 0x5, 0x80}}}, ["", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x2000000}, 0x80) read(r1, &(0x7f0000000100)=""/71, 0x47) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r8, 0x6, 0x14, &(0x7f00000002c0), 0x4) 01:42:20 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) r8 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) ioctl$HIDIOCGVERSION(r8, 0x80044801, &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:21 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SIOCSIFHWADDR(r6, 0x8924, &(0x7f00000000c0)={'bcsh0\x00', @local}) r7 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0xa}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r8}]]}}}]}, 0x40}}, 0x0) bind$can_raw(r2, &(0x7f0000000000)={0x1d, r8}, 0x10) ioctl$PPPIOCATTCHAN(r6, 0x40047438, &(0x7f0000000140)=0x3) r9 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/prncci\x00', 0x3b1912eaace99863, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r9, 0x4c09, 0x9) time(&(0x7f0000000040)) 01:42:21 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)) [ 656.169128][T10365] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 656.217161][T10368] netlink: 'syz-executor.3': attribute type 10 has an invalid length. [ 656.269383][T10135] device nr0 entered promiscuous mode 01:42:21 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) r3 = socket$inet6(0xa, 0x6, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000440)=""/200, 0xb5caebcff694dd1b, 0x0, 0x2}, 0x18) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4d) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f00000002c0)={'mangle\x00', 0x4, [{}, {}, {}, {}]}, 0x68) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) 01:42:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:21 executing program 2: r0 = socket$inet(0x2, 0x4000000805, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup3(r0, r1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r2, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r1, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f00000002c0)=ANY=[@ANYBLOB="6900000176ffc9b8b24253342bce8f8086bfc6518abc27628d6b09d50cebb857a5593f34634fa284645e6eacdceef3cac964757ab7e966766a11bf0fbf662e45efab00466ab9819e4f03f98fa6d9c2f9c94d48614f8e930e63ed876f41b81a642d0fb8139cf44f646b94f7c6260b039bd33c852a396bc7fab3ce1949d5a286d07ac5073f247e2ebe5a81f005a43146702b0c3f1f90e827f7a42acf5382230d36176a2a52a9f22c275b68d8dbb3b17676001bbb0d7db2696d65", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f000059aff8)={r3}, &(0x7f000034f000)=0x8) setsockopt$inet_sctp_SCTP_DELAYED_SACK(0xffffffffffffffff, 0x84, 0x10, &(0x7f00000000c0)=@assoc_value={r3, 0x5}, 0x8) r4 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x0, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = syz_open_dev$cec(&(0x7f0000000180)='/dev/cec#\x00', 0x3, 0x2) r9 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0xffffffffffffffff, 0x2) close(r9) ioctl$USBDEVFS_CONTROL(r9, 0xc0185500, &(0x7f0000000080)={0x20, 0xc, 0x0, 0x1, 0x0, 0x0, 0x0}) r10 = ioctl$LOOP_CTL_GET_FREE(r9, 0x4c82) ioctl$LOOP_CTL_REMOVE(r8, 0x4c81, r10) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r10) ioctl$DRM_IOCTL_AUTH_MAGIC(r4, 0x40046411, &(0x7f0000000000)=0x7fffffff) ioctl$VIDIOC_QUERYMENU(r4, 0xc02c5625, &(0x7f0000000080)={0x98f907, 0x4, @name="e63a7e3aad123e01fbe03bbf506b49192949184fbb3d3e054b3a6dceee9ddce6"}) 01:42:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) syz_open_dev$sndmidi(&(0x7f0000000000)='/dev/snd/midiC#D#\x00', 0x2, 0x860000) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) r2 = syz_open_dev$video4linux(&(0x7f0000000480)='/dev/v4l-subdev#\x00', 0x101, 0x8000) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f00000004c0)={0xed7b79cc6cb2ddc8, 'veth1_to_team\x00'}, 0xfffffffffffffe25) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:21 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000380)=ANY=[@ANYBLOB="38010000100013070000000000000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000082b2ba1474a9abc06a9ad2a4e71ca2f9d037325bf02096b60ac38675f4b1bf33d68bdc4149", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0006000000000000000ffffffffffff000000003200090000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c2900"/240], 0x4}}, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000040)={0x0, 0x1, 0x6, @random="b3d7cbd83e71"}, 0x10) 01:42:21 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp\x13\xf6', 0x400, 0x0) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(0xffffffffffffffff, 0x84, 0x6d, 0xfffffffffffffffe, &(0x7f0000000080)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0xa}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r3}]]}}}]}, 0x40}}, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r3, 0x1, 0x6, @remote}, 0x10) poll(&(0x7f00000000c0), 0x0, 0x1) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x30) ioctl$EVIOCGREP(r4, 0x80084503, &(0x7f0000000280)=""/184) fgetxattr(r0, &(0x7f0000000340)=@random={'security.', '\xe2cpuset\x00'}, &(0x7f0000000400)=""/133, 0x85) [ 656.589152][T10487] netlink: 'syz-executor.5': attribute type 10 has an invalid length. [ 656.670512][T10491] device nr0 entered promiscuous mode 01:42:21 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="38010000100013070000000000000000e000000200"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0006000000000000000ffffff5effff000000003200000000000000000000000000ff3642ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000000000000000000000000000000000048000200656362286369706865725f6e756c6c2900"/224], 0x138}}, 0x0) arch_prctl$ARCH_MAP_VDSO_32(0x2002, 0x4a0) 01:42:21 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) r5 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x3, 'veth1_to_team\x00', 0x3}, 0xfffffffffffffded) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r6, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r8, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) r10 = fcntl$dupfd(0xffffffffffffffff, 0x0, r9) r11 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) sendmsg$kcm(r11, &(0x7f0000000880)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000005c0)="418a7ee6ef836094b55b11c64519aefe8513", 0x12}, {&(0x7f0000000600)="56eaa6459d433f1749295daa57ec867479e1dd1a3e3a595a348cd79ae57afcf50d563d74dfe8e60c74999f4d4399b08df87331af59f40edeeb641632192154eae694c84a7f631f536af53c18cae6b6f390c5712b62ff4770195018eebd9a57c7d2eb518025bab50a931ef8b95fdbb412885d90d7f3e7d62c6ce01d26a2f64a4bb6c9a1478b488c5ebb43a3544a8323b1b5e0aedd942272b7b72d60899c739db37ee7665a6c7ff8db5f4431c90ff78c", 0xffffffe7}], 0x2, &(0x7f0000000700), 0x168}, 0x4840) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r12 = socket(0x10, 0x3, 0x0) r13 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r12, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2c, r13, 0x401, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_GET_DEST(r10, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x1000080}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x60, r13, 0x2, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0xff}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x28b2}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x1}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}]}, 0x60}, 0x1, 0x0, 0x0, 0x20000000}, 0xc0d4) 01:42:22 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f00000001c0)=[{r0, 0x40}, {r0, 0x2}, {r1, 0x1402}, {r2, 0x1200}], 0x0, 0x2) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:42:22 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000040)) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="38010000100013070000000000000000e000000200"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}}, 0x0) 01:42:22 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x4) r1 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x8, 0x240) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000200)='SEG6\x00') sendmsg$SEG6_CMD_SETHMAC(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x14, r2, 0x408, 0x70bd2c, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) syslog(0x0, &(0x7f0000000300), 0x0) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2220008}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x8}, @SEG6_ATTR_SECRETLEN={0x8, 0x5, 0x2}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000080)=0xc) sendmsg$nl_generic(r0, &(0x7f0000005000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x108, 0x94, 0x7, 0x0, 0x0, {0x12, 0xf0ffff, 0x600}, [@generic="d3e9c52cb18b37b79c0d4ae7fd293700e509a17c3108fd3f86d152ed90deeb215707bd8a3f63e62d51ac77d41fbc469c35fbae97e1ae6e11b894e2721fe8fda4879974c8a79d2f967be12d99d18b77d60294076736731988c9b73605c280f1da9cf331b6b627f8b5b7fc349d30342e982046bf29c13b6969ed4265c1b2f915dae2e0e5d5ecf6de09291d179f40b9dab2350aaf7efa5e714571a0182b7d940fb5d04294ff4cb801285f87043d9ac64a252575889e8af344dced9a03b75de2ba75e4a65a6ff37a4373017a23aa8e5a40effa40f46389d3851888e910286d6ac81e5758da52fed52521305018b99816cfecd50105d8"]}, 0x108}}, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r3}, &(0x7f0000044000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000480)={r3, r1, 0x0, 0x12, &(0x7f0000000300)='/dev/snd/pcmC#D#c\x00'}, 0x30) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) lsetxattr$security_smack_entry(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='security.SMACK64IPIN\x00', &(0x7f0000000540)='/dev/snd/pcmC#D#c\x00', 0x12, 0x1) ioctl$BLKFRASET(r6, 0x1264, &(0x7f00000000c0)=0x50d) 01:42:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x7, 0x211440) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000100)={{0x1, 0xa9}, 'port1\x00', 0x1, 0x10000, 0x55b, 0x8, 0x1, 0x4, 0x101, 0x0, 0xa, 0x6}) r3 = epoll_create(0x100004) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000040)={0x8000000d}) ioctl$TIOCSBRK(r1, 0x40044591) epoll_wait(r3, &(0x7f0000000000)=[{}], 0x1, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=@flushsa={0x150, 0x1c, 0x8, 0x70bd2a, 0x25dfdbfe, {0xff}, [@algo_auth={0xdc, 0x1, {{'sha1-avx2\x00'}, 0x498, "eee5350a4caa2b91a9cb58669d2c3159e625f795e06b2bdccaf9f77c6ec8669eb178003176308750e610c5d2e653fd45e2388818d5c5d0f4b47cc6470fecdd82c96ea8cebda3617645eb376799ce407b4c0057ece350175a6ae9bb66ab7d3a1fde2998163a612d8690eac03b54954f8f65838e042c632f7eb8b91c23540e10f1faab9ba8a3e1babe9b136a0878d2d6787b3a05"}}, @lifetime_val={0x0, 0x9, {0x8001, 0x80000, 0x1, 0x9}}, @replay_esn_val={0x323, 0x17, {0x6, 0x70bd2d, 0x70bd29, 0x70bd28, 0x70bd26, 0x2, [0x4, 0xfffffffa, 0x6, 0x200, 0x5, 0x80]}}]}, 0x150}}, 0x10004800) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") sync_file_range(r4, 0x8, 0x4, 0x1) [ 657.166858][T10491] device nr0 entered promiscuous mode 01:42:22 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) times(&(0x7f0000000000)) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB="04f886dd07"], 0x90ad) 01:42:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = syz_open_dev$mouse(&(0x7f0000000480)='/dev/input/mouse#\x00', 0x6, 0x200000) ioctl$VIDIOC_S_OUTPUT(r7, 0xc004562f, &(0x7f00000004c0)=0x4) r8 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r8, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) getsockopt$inet_sctp_SCTP_MAX_BURST(r11, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x33d) 01:42:22 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) pwritev(r0, &(0x7f0000000900)=[{&(0x7f00000001c0)="d4883c4d3330bce5731b77b5e6804d0884c5015aab0712d5e4c93db3a181d262ad57e6d49122a971532939aa9b3d34adb474860d22e154dd8e3da80c708c69f440c56e8242404a2058848c187b208a2052f47b5eae9dec886eaed61b5a029beb3cedaccdcb8e333fcb587bfae6f09f2229e7cac8a0633fe746472b98d90f5411cd262e592d6d7da8643a0f7cf88838af3ac3f656e96da4f37dc814dba0f97636957d2a20db71ee77b93c93a49548fa25d9ce7a1434", 0xb5}, {&(0x7f00000002c0)="bcd8a5a1d0f8590b0c878453af1d26d3ea68a6080aa5f1245bf66824b2b779fe2affa2a3f88e8eccddf84a7b4f42c832b4211b4e223b6cdcb3b33f5cb88b942c51ff2a681a90e5803584e3324f7830adabd027a06a8944fca501edf1a9db3deeeaafd8972ad6dc4c3cd9a693a2d994e95e3dea05e06520f9a95f053d38c602f0af74e7edcc92b6fddd460204a9ff96e3cf5543b70d3b6d285974b8f9fe0f679811980f1f798ee4844beed01f84878a09ec4ee25b23b4e4567ab88c146a4a6a", 0xbf}, {&(0x7f0000000380)="0ed8704caceb8bbb3ab47ae8a566104d35fd9f93de19f9ee3441cbec17fe331adbe71507b440c5a9ea4ad68b0109fe9af56ded64afcdf3dacb5d99ec4c7fb79c8991dd686ae7c24cc637139d9d5459ae0088ef3b37e7066191f4674259dbb0091893b6f6acc8072e670a5149666dfdce2341ee073f9e913491515d66aace680dd4ed", 0x82}, {&(0x7f0000000440)="f38f3ff9d6f9b3a5fdf3847c85d0de8de977bcd48f226582d8fec222eaafd7332225ccf8acb737656f247f75bdcc806e271eba29b6e1d957d0ba06ace19b725e2c15b48d086c26de36b76eeb35a1f46fabc870e75401f62a4e5a87c0e91554f041b096c1ec2abbf4dab3894df59fc796694a4d497b27975c6ed2290183ddf61691ae618d1e3713bbbdad622caa16a5f9615f12c85c95cfc533a3b959a68908871ede67717781160c7083c03357079f280635410798e7c2146fb7d4b65070884febba9fa797ebcc2b17d733966f827c8b93cf8d1566", 0xd5}, {&(0x7f0000000540)="e39c8546d998434d040e34babe61e4ebbe16c085101ceea5e78bfd845178f53de33612aac43a653dd51cbc546cc24cdd630bfcb169352cc9aec20a532e00187261d698264c7d2aea9971fb1084ad49386d41a4ca2d8fa1fc8f188ef1ab6331368f6ec6226e4b5b4d4b20683578f8aa0b0bf1d654cf1d084f11e05510459401522f36e2d606", 0x85}, {&(0x7f0000000600)="a530aba236cd31a4d51e81282b72595196429d886bc768a9df8a8c2078cc7b14d242f0e0eb55bb80baacbd2fe1e8fdefc0f0b39ec6e53a036b32944ff83dcca2d7a76216715c2bb29589e77166e1f731e19296616f86e8af1e0892dfade5ec2473f505608b2072cb00bd9a30d90554dfc9a447b411", 0x75}, {&(0x7f0000000680)="539ae60b07bc2e68164e0941904f40b89531d183e66d765c46f3427686ab79e31ed8f1a79b18d12f6b9076485adc79fe3b7e2b7f9828e93230afe719ed580ecb9500958d8ed29f138cfb894167cc9d6c", 0x50}, {&(0x7f0000000700)="211588b511f0fa02ef77c60624e976593880233b6904bd809842f4c99f345e910711758af9de7fb1b992dfa2787419c6c38673f2fbde50da2c09f839ff46b4b268a7e45270ec62043bc59b4f0aa297416bd702a67c76623b4a3fa32dd7cd5fff49edf83aa3328c6ca6c1c5ac8b3bc0599fca54462905747dbc0becc370bbda1dcaf0edad786a478eb6186886790d1c49d086bbd138e27854838b2a7bc363a755887e747c556ec03f8187227ce19e29bf1d0dd01be58d2a3165eb259d13feb5c69021acb690c7291765d65f15745c4f8a770deff5953bae", 0xd7}, {&(0x7f0000000800)="9db7e966df0c49af3a40d764ac970f301cf0e8b610347cf02077d5edcf567e04ba8426a3c89704100b5d32e21910efdcb95181095256b0b959d5b91f25b5c1515cb2c43aaafc6a546fc822f50241d2103832add54608554277b25f169ad41d7bdebc068470ca30f8b23da0bee9a4082c226b9bd5dedafee6d1cfece2e87388e80ed4bc4b46626efa78ff35950553e6ad71d9bc4594826d94484685c39ac2e59f6bd0b87d111529bcd2a3580a5a85c3500c3ff2a69eb0248f776252a816eac584490c5b988e457443e00d687b7f00c04bf3d45b4eefc8cd54fa884f985fa12ad643a3368d5c58a1060bbfdbd641c9f84a252808469304bfcd", 0xf8}], 0x9, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x406, r1) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x60, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$NBD_SET_SOCK(r0, 0xab00, r3) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:42:22 executing program 2: r0 = socket$inet6(0xa, 0x8000008000080003, 0x5) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c00000013003586000000000000000007fffff0", @ANYRES32=r2, @ANYBLOB="0061d60775000005008100000c001a0031c793e245a83aaa"], 0x3}}, 0xda362145e4f9607a) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1f, 0x1) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22, 0xfffffff7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xf3}, 0x1c) 01:42:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 657.695560][T10732] device nr0 entered promiscuous mode 01:42:22 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/qat_adf_ctl\x00', 0x410001, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r4, 0x2287, &(0x7f00000004c0)=0x8001) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r6, 0x8108551b, &(0x7f0000000300)={0x353f, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r8, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'nr0\x00', 0x0}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) fstat(r8, &(0x7f0000000600)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) ioctl$sock_inet_SIOCGIFDSTADDR(r9, 0x8917, &(0x7f0000000080)={'ip_vti0\x00', {0x2, 0x4e21, @multicast1}}) ioctl$VHOST_SET_VRING_CALL(0xffffffffffffffff, 0x4008af21, &(0x7f0000000040)={0x3, r7}) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r11 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt$inet6_IPV6_XFRM_POLICY(r11, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r10, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in6=@mcast2, 0x4e23, 0x0, 0x4e23, 0x0, 0xa, 0xa0, 0x0, 0xc, 0x0, r12}, {0x80000000, 0x51, 0x9, 0x5, 0x8, 0x7ff, 0x0, 0x8}, {0xffffffffffffff81, 0x7, 0xfffffffffffffff8, 0xfffffffffffffffb}, 0x3f, 0x0, 0x4, 0x0, 0x1}, {{@in=@multicast2, 0x4d2, 0x51}, 0x2, @in6=@empty, 0x34ff, 0x2, 0x1, 0x0, 0x1, 0x7fff, 0xb1}}, 0xe8) sendmsg$nl_xfrm(r3, &(0x7f00000005c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10004e000}, 0xc, &(0x7f0000000180)={&(0x7f0000000340)=@getae={0x268, 0x1f, 0x100, 0x70bd27, 0x25dfdbfe, {{@in6=@empty, 0x4d2, 0xa, 0x6c}, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0xffffff80}, [@address_filter={0x28, 0x1a, {@in=@multicast1, @in6=@loopback, 0x2, 0x5, 0xfb}}, @ipv6_hthresh={0x8, 0x4, {0x1a, 0x10}}, @algo_comp={0x90, 0x3, {{'lzjh\x00'}, 0x228, "ad110be15a0198d0f302d2283c6be7888cfaa13857be9f35c18fb3cf5f3000bf0de15055023d7d1cb60367e200b1bb71d10a795ca4ea6dfd605e622ab898ad4d5854c62a9e"}}, @etimer_thresh={0x8, 0xc, 0x8}, @policy={0xac, 0x7, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@mcast1, 0x4e23, 0x4, 0x4e22, 0x1, 0xa, 0x110, 0x20, 0x33, r4, r12}, {0x8, 0x0, 0x3, 0x80000001, 0xd4, 0x4, 0x4, 0x101}, {0x6, 0x401, 0x5, 0x5}, 0x7f, 0x6e6bb2, 0x7, 0x0, 0x1}}, @address_filter={0x28, 0x1a, {@in6=@remote, @in6=@remote, 0x2, 0x3f, 0x4}}, @algo_auth_trunc={0x84, 0x14, {{'sha512-avx\x00'}, 0x1a8, 0x60, "ea602706b9cd43f86db79abb3b273f444fe25724ceec80a9fd900877133dbad003a03a4306d4fc10e23f3c0ada2faf9319df68285b"}}, @extra_flags={0x8, 0x18, 0x8}]}, 0x268}, 0x1, 0x0, 0x0, 0x44891}, 0x20000000) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:22 executing program 2: r0 = socket$inet6(0xa, 0x8000008000080003, 0x5) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="2c00000013003586000000000000000007fffff0", @ANYRES32=r2, @ANYBLOB="0061d60775000005008100000c001a0031c793e245a83aaa"], 0x3}}, 0xda362145e4f9607a) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1f, 0x1) bind$inet6(r3, &(0x7f0000000100)={0xa, 0x4e22, 0xfffffff7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xf3}, 0x1c) 01:42:23 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000940)={0x53, 0xfffffffffffffffc, 0x74, 0x81, @scatter={0x10000000000000ba, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000a40)=""/106, 0x6a}, {&(0x7f00000001c0)=""/47, 0x2f}, {&(0x7f0000000200)=""/241, 0xf1}, {&(0x7f0000000300)=""/87, 0x4c}, {&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/121, 0x79}, {&(0x7f0000000480)=""/104, 0x68}, {&(0x7f0000000500)=""/11, 0xb}, {&(0x7f0000000540)=""/137, 0x89}, {&(0x7f0000000600)=""/184, 0xc0}]}, &(0x7f0000000780)="81ec5aa03f1d72e7b2dad53d1e30b61cac629c3b6cca3fd19d2c529782269e34b36c4a9bae89376d2b01c6a07d2baae20ffdb3c1768aaa520619fe590297c6c99c472a0bd5ca8f38abac00f0879be2bfe7e5d8eb4fef32be33a57ee39236e203f2169d96db77110e1ad79c94e31f422505755455", &(0x7f0000000800)=""/228, 0x0, 0x9, 0xffffffffffffffff, &(0x7f0000000900)}) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) r1 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0x1, 0x440400) ioctl$DRM_IOCTL_FREE_BUFS(r1, 0x4010641a, &(0x7f00000009c0)={0x5, &(0x7f00000000c0)=[0x7, 0x0, 0x200, 0x9, 0x7fff]}) [ 658.109093][T10732] device nr0 entered promiscuous mode 01:42:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x30101, 0x0) r2 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r2, 0x4d) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}}}, &(0x7f0000000040)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@mcast2, @in=@broadcast, 0x4e20, 0x7, 0x4e22, 0xff, 0x2, 0x50, 0x80, 0x32, 0x0, r3}, {0x1, 0x3, 0x7, 0xbacb, 0x7, 0x80000000, 0x4, 0x1000}, {0xdc3d, 0x1, 0x0, 0x1f}, 0xff, 0x6e6bb3, 0x6, 0x1, 0x3}, {{@in6=@local, 0x4d2, 0x33}, 0xa, @in=@rand_addr=0x9, 0x3502, 0x0, 0x0, 0x2, 0x0, 0x10000, 0x2}}, 0xe8) r4 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r4, 0x4d) getsockopt$EBT_SO_GET_INFO(r1, 0x0, 0x80, &(0x7f0000002bc0)={'broute\x00'}, &(0x7f0000002c40)=0x78) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000540)={{{@in6=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast2}}, &(0x7f0000000100)=0xe8) r6 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r6, 0x4d) sendmsg$inet6(r6, &(0x7f00000033c0)={&(0x7f0000002c80)={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x3}, 0x1c, &(0x7f0000003140)=[{&(0x7f0000002cc0)="57b2ba867f275486ecc5f3780f4eb644ad71651e1f201c038ffa77e96dfde5a1ecac27ed0bf941060efd2f6c29bf79759b3e5da756d2668f02ff1e883c53f9dc8f0f3984fdc36e66adc3896c300990379fd354058730a93dbd6b38035cdd11a1699cdc1cd9e3cf639334862446fd14f07510b6435fdfad332f61d2d9ece7158e82e4385bd8e60f45c949fbab5d274a80116ba9d5d61bebd8c499aa3eba4efd207d8eab349651d05b3c520073d21f27ce8a3e39c8e1c3718e6c80ed3280bf53ce50c55cda906e415b", 0xc8}, {&(0x7f0000002dc0)="875a65a7f7e027d03281bce24d5aad5066133e0680b7d1d21d8f3bc0f7ed7c7349818dd3cae08dd2e5f41b61db4c206d89544907df6c94dd2b20728f3f8a9436b192d2b86e43498863bdfe89db94a96d7085067c61b55461a929e9d3b8f8aa737d276a4acf1d125dbc80a3828bacd0c62a1112c0", 0x74}, {&(0x7f0000002e40)="db3516bcfefd5beac34c0ccb0a83c8a63c9fe6de41c06dba9ff33978e749e818d9bf952c", 0x24}, {&(0x7f0000002e80)="cc6c293f6d6874675f66ecf10f4aae10", 0x10}, {&(0x7f0000002ec0)="6502979778d17f1a08e263595d642af094a97e6522d9d2bf49fb39b71caa778e5427e696e83c604c465eb3a25ff1b38bf6eb41e60ab10f525f0633a3c79d0d4b5bf9b68b143f6a52bb155e9de531da5a5fb48187b93dad7588d65609c0b0a4bf3c368b1d955cc55006bc18d33aa67affc6a83389b323f51ef93efd546b4cc57f992fb291009aecf3772994567dbf055c4d4550db0eb53b52b51c5b6d8066fef026d5efad6df3cb90a4f87487a7f50910f555df020d", 0xb5}, {&(0x7f0000002f80)="917f4c10dba1cd260939e36920d3fc33ae57c6ad5bf3d962f195d88b96737ed5000e8c423c780ee31f8a946236832cbbc63b642e866132af42f0bd95bb4e37f9dfb13068e588b6d927240e55208e4d72e5331658ac3f1ba774de7832d6d578d5ed6e7166597bec67438d860d755c5dd083b761e77ba517a897e55e85693d41e77cf09b700e98f50f69088cab83e7cee9362f69c7d74ec254496fea2c9bca83c93269488dfeb80bc7417442036bf299855c981c1f52bc5b02e687b79c893f329b6bf195dd6de4e4344ec4c9b1185e588c6fc99a39a76cbf979ec0fe3ccf3a", 0xde}, {&(0x7f0000003080)="e8b701d76af2861ca013a0a06a8fcbc1f778967ff4ed5955cecccfd53e254d4d8645cf35f85b1d4efbd697d4e0ddb6195177398c4fea4fb4dc04c3f6f3b8f14f103313cdc97d2eacf975441f739f9e478f4e16d67329a0b5d8f9d7abbee6e9b95016f9d7f3d1b8b6be5272e91df761e3b26a28125905de4371f32c677e4bcd1667bfc22873692dba3535f056b10b8e92eb6ccd511dc7f9324e114fb3b1fb43aec577cfa21b9850217f2f479d43fcd61455dcac3d7ac235", 0xb7}], 0x7, &(0x7f00000031c0)=[@dstopts={{0x90, 0x29, 0x37, {0x88, 0xe, [], [@calipso={0x7, 0x58, {0x32, 0x14, 0x7f, 0x220d, [0x6, 0x10001, 0x4, 0x3, 0x8001, 0x6, 0x2, 0x8, 0x17, 0x9]}}, @calipso={0x7, 0x10, {0x80000000, 0x2, 0x2d, 0x20, [0xffffffffffff0001]}}, @ra, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}]}}}, @dstopts_2292={{0x148, 0x29, 0x4, {0x1, 0x25, [], [@generic={0x1, 0xbb, "c9fed7f517a6e38551ce847e666e055de2e7301ae366b0d2d325ca73fcd583f95ac654bba2fcce7cd4635076a58666cb764f8ae12ed8beeee003c60e95c15f3210fb88e02fc245cadf800e1726db14ff63b1fa25dc141bb602d65bc292c1cc63d4870b9d1e2da8455f00e783c6b048d2df6cc27f13f3fe30d4cada41de15ea95d53cdc8844bdc134f354e9598b279d82575cb9f40fd98ab992fd7806ce13dd3875f0d2fa1dfc1c21df90ec2df7cd4fc13a0e3599e37dcbdee172e3"}, @calipso={0x7, 0x30, {0x0, 0xa, 0x1, 0x2, [0x100, 0x1f, 0xfff, 0x1f, 0x7]}}, @calipso={0x7, 0x38, {0x2, 0xc, 0x6, 0x4, [0x0, 0x5, 0x3, 0x4, 0x4, 0x1]}}]}}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x2b, 0x2, 0x1, 0xf8, 0x0, [@dev={0xfe, 0x80, [], 0x13}]}}}], 0x200}, 0x24040040) ioctl$UI_ABS_SETUP(0xffffffffffffffff, 0x401c5504, &(0x7f0000000200)={0xfe31, {0x9, 0x7, 0x80000001, 0x10, 0x9, 0x800}}) sendmsg$nl_netfilter(r1, &(0x7f0000000180)={&(0x7f0000000080), 0xc, &(0x7f0000000140)={&(0x7f0000000640)={0x2560, 0x3, 0x7, 0x800, 0x70bd2d, 0x25dfdbfb, {0x0, 0x0, 0xa}, [@typed={0x14, 0x7e, @ipv6=@mcast1}, @typed={0x4, 0x56}, @generic="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", @generic="4b4d36b484daa453d329f406bf9e2d2f01d678d247fcf0fc954fab417a98bea000d7edfad5034ac43fc3e54f7e4e1d7ed1c0e3fb23284bb4c09281ffa288020732c76e734606f77321b50540d48ef914613f266a5d1272872dede5545c563f5e5f70b47374f603a1f60626e599b01d57ecf32ded6dee8a0a1f1af346a375ae27539f8d63cabd06eb0b76bb72353e56799830c7b15e706850aa9e4d519875d35e42ec8c9f9dd5a18fc0dd54c56ed6187797ba4073a0c22586e6ad8b079a85fc3def32f0df0ec3ebcbc5822c", @nested={0x74, 0x77, [@generic="f30071f2ca6ed7162c34d4f37b9ebeca54fc4d043cd107ab2cbbb3098f68ea84f48a38f108a30264aa7b29c63375980fc2c7d4bec257742564b77c056bbf2ecb0bef22549c21d43009", @typed={0x10, 0x77, @str='/dev/full\x00'}, @typed={0x14, 0x18, @ipv6=@ipv4={[], [], @rand_addr=0x1c}}]}, @generic="536914d63de6e6b2d3d89f181cb4483a663f7ac01a6f6abcfca00f6fc5d068f22c812475b4b510a1d4341cd179ab7223ae195b1a00b6144b43685bea248dcc88475b239fd52ef8be31a920a4f9bb9e104654ff10b3219112933d9df917c1394e0621d095b3e2cdcb75293a41f4", @nested={0x12d0, 0x6b, [@generic="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", @typed={0xc, 0x3f, @u64=0x10000}, @typed={0x8, 0x1a, @uid=r5}, @generic="548c8e4e799c885923854468d37ee192fd7d1afd2d7eb59b71d8a6178c844064f775da7f6f39104dbca79c9106832df5d4eca22dae9bb77c75b17c9b6bef560a08b9675b121bd65e5cf535cf798bb3abdb5e38d27684e556a32e6ff01ecd24b1faac9c6bada179c0ad82c3db09a52e5bbe24ec56255972606556f2b2c11b6a67d3d85147deb5f35507ac5d2622cf5524a86f57b3e4453b481b265d25376cbac4d4618df2407e424120e1c31af4f0397a16", @generic="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", @typed={0x10, 0x28, @str='{{&GPL][\x00'}, @typed={0xe4, 0x3a, @binary="24c4b5b7bf50a67c1697fad8546771e5837ba81f7c95a4039fbe2bdb064b1bc744a892964fa65017f36dded5d99d0d25906f31af9e17d23d01ac09e629838c2583478c4470d455bdc0e4a0432426ddd6b49a621ad1210c22957dc12f7025211a3b4078b50ae3833a68c90ffa3dec50658c4292d1667632e287032540b9108b03189d73de9293990945f2beb0b72e7367092433bb805dc2661ababf309acf0f94d927f8379129cb1b47dd8ac2b30eae829b89ccc47f7c0344bd0f33189387be50a418a3565f7365477e96c4a964638717d7da63e337d86105b24de0322f"}, @typed={0x14, 0x80, @ipv6=@loopback}]}, @nested={0x4, 0x7}, @nested={0xb4, 0x5f, [@generic="7ffae5eb0781d5b621bb06c8577932e00296c169fffed3e6adccb38351bfacb6f5642501beea3f5d58bff790f7a5f1ff3119dadbd3bade987e47988bce11cae1ca37b0e35844683856dc73c048769afb148299a8f4416c554a2ed3185c64", @typed={0x4, 0x13}, @typed={0x8, 0x68, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="93573ee5d3ba1ccc19688dfb4cb97ec0fce1a3684833453ba4c4c39ed4859ea12f6cad9764dd758431b78a0e5963395c10719ac36c2b614be348e5e9a262745afe069a0f57"]}]}, 0x2560}, 0x1, 0x0, 0x0, 0x4040}, 0x8886) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000003400)=ANY=[@ANYBLOB="38010000100013070000000000000000e0000002000000000043a4d9d5ee73fc419500"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}}, 0x0) 01:42:23 executing program 2: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$evdev(&(0x7f0000000500)='/dev/input/event#\x00', 0x0, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x7, 0x211440) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r2, 0x40a85321, &(0x7f0000000100)={{0x1, 0xa9}, 'port1\x00', 0x1, 0x10000, 0x55b, 0x8, 0x1, 0x4, 0x101, 0x0, 0xa, 0x6}) r3 = epoll_create(0x100004) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f0000000040)={0x8000000d}) ioctl$TIOCSBRK(r1, 0x40044591) epoll_wait(r3, &(0x7f0000000000)=[{}], 0x1, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000540)=@flushsa={0x150, 0x1c, 0x8, 0x70bd2a, 0x25dfdbfe, {0xff}, [@algo_auth={0xdc, 0x1, {{'sha1-avx2\x00'}, 0x498, "eee5350a4caa2b91a9cb58669d2c3159e625f795e06b2bdccaf9f77c6ec8669eb178003176308750e610c5d2e653fd45e2388818d5c5d0f4b47cc6470fecdd82c96ea8cebda3617645eb376799ce407b4c0057ece350175a6ae9bb66ab7d3a1fde2998163a612d8690eac03b54954f8f65838e042c632f7eb8b91c23540e10f1faab9ba8a3e1babe9b136a0878d2d6787b3a05"}}, @lifetime_val={0x0, 0x9, {0x8001, 0x80000, 0x1, 0x9}}, @replay_esn_val={0x323, 0x17, {0x6, 0x70bd2d, 0x70bd29, 0x70bd28, 0x70bd26, 0x2, [0x4, 0xfffffffa, 0x6, 0x200, 0x5, 0x80]}}]}, 0x150}}, 0x10004800) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") sync_file_range(r4, 0x8, 0x4, 0x1) 01:42:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xfffffffffffffffe, 0x400) bind$pptp(r1, &(0x7f0000000040)={0x18, 0x2, {0x2, @dev={0xac, 0x14, 0x14, 0x1c}}}, 0x1e) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:23 executing program 5: syz_usb_connect(0x3, 0x4a2, &(0x7f00000001c0)={{0x12, 0x1, 0x110, 0x7, 0x82, 0xb3, 0x10, 0x12d1, 0x7a0e, 0x1753, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x490, 0x3, 0x20, 0xfc, 0x60, 0x4, [{{0x9, 0x4, 0x34, 0x1, 0x0, 0xff, 0x4, 0x4a, 0x1, [@hid_hid={0x9, 0x21, 0x2, 0x80, 0x1, {0x22, 0x584}}, @cdc_ncm={{0x5}, {0x5, 0x24, 0x0, 0x7}, {0xd, 0x24, 0xf, 0x1, 0x5, 0x101, 0xfff, 0x2f}, {0x6, 0x24, 0x1a, 0x6}, [@mbim={0xc, 0x24, 0x1b, 0x1, 0xffff, 0x5, 0x8, 0xffff}, @mdlm={0x15, 0x24, 0x12, 0x1e9}, @dmm={0x7, 0x24, 0x14, 0x1, 0x8}, @dmm={0x7, 0x24, 0x14, 0x8, 0xffff}]}]}}, {{0x9, 0x4, 0x50, 0x9, 0xd, 0x61, 0xa5, 0xc9, 0xf9, [], [{{0x9, 0x5, 0x5, 0x10, 0x2d3, 0x3, 0x4c, 0x5, [@generic={0xa0, 0xa, "4515d637b7fb8a2d1637c2d7e9e211e2730775599e7900cf35a3e594b605b49c9246e7e59a030765dd22133411008f12f72fabe74eeaedc3dae45e7525faa69f6e63a59d3176cb6ded6eaa1da091183ebe6dfffac1367acd35cfdb1387d270d7ef3cde4ed7d44c953d4c7624380eff72603f7beb0079016481d712f486d25099bbc891f9f18f0c4450d09737057b50e81bc3aa0ab5788e56749b095aded3"}]}}, {{0x9, 0x5, 0x6, 0x0, 0x37, 0x4, 0x1, 0x62, [@generic={0x7a, 0x23, "7b120826b578efc24b50e7d3d19eec41321ad7aaf3afe6b3050c90c4a8ad67c31b4f23a764d4d7ecaaa79689eb90cf555f83bb226fed39f6ae96efa82a3440843e5d6e4d8f9f195875d240d7fbdc64d572d78f33792745a6c8daf9de96fdc28f62c955cc0988f32b9ae818f987f4624c54d9ce4635145bb0"}]}}, {{0x9, 0x5, 0x8, 0x10, 0x2d1, 0x50, 0x2, 0x9a, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x80, 0xff}, @uac_iso={0x7, 0x25, 0x1, 0x6, 0xef, 0x9}]}}, {{0x9, 0x5, 0x0, 0x4, 0x377, 0x80, 0x4, 0xff, [@generic={0xbf, 0x21, "86980a9e1fe9cad8ebd2ec1fbb3cdd0e7d52563a5b85dd5e5df455488a3685508046f0d4838514a99f7314b1dd346c99f2f4697b27302e1dbaa80591f687b74f869d105b16fcfbce0f28ef7715689e2097acf05d2d23c996a3eb389dc0ab5f76c77c0ac541dc4e68ac10fca5f9e97937c8757ad948e881f3b8e609968b9667ce829f6d1aeaadf3681d7ca0e6f404305b24995aacd713ffc5ddd5937c659669dcd488a6ba02b6320c73bd03f7e2484c192d010f1b589e39b2091e852267"}]}}, {{0x9, 0x5, 0x4, 0x10, 0x274, 0x1, 0xff, 0x6}}, {{0x9, 0x5, 0x5, 0xc, 0x51, 0x80, 0x81, 0x6, [@generic={0x7e, 0x2, "53c3e581c358f8ca4b4c12680abbb6df73fe2a692fe1572ef818bce6417bc59294d117870c89006491ba37bfbb93acfaef669072d606047ca06d9d7cf60b2ba2231df7d2d9575ccc5c749aceff210054d0a8c074861e188edc182313c93826727eee3183b503279e4f7fe29b913a1c930e736929c0fbed8d837d8fb7"}, @uac_iso={0x7, 0x25, 0x1, 0x101, 0x20, 0x9}]}}, {{0x9, 0x5, 0x82, 0x4, 0x21f, 0x9, 0x1f, 0x20}}, {{0x9, 0x5, 0x1, 0xd, 0x2d3, 0x3f, 0x0, 0x6}}, {{0x9, 0x5, 0xd81e2a6a6479f12f, 0x0, 0x393, 0x8, 0x2, 0x80}}, {{0x9, 0x5, 0x6c7d7f908e322d64, 0x10, 0x37, 0x0, 0xd8, 0x5}}, {{0x9, 0x5, 0x80, 0x7f6eb4c1903745e2, 0x400, 0x20, 0x8, 0x4, [@generic={0x7f, 0x10, "a727e31cfa647c76823160ae4a4f89a7b86ec3b508c9adc7126430bfcffed40e8778ee915aee19a835890f853fb49f395402851a3deda667c3ee1e7d99546afb6007a4366baf646581ec23c0731c609c4455e7592221c3d71549f0b2c9d5ef839a233ac21fe2f220fab57e40194cc5d07ee806cb0033cecb43f00e6f36"}, @uac_iso={0x7, 0x25, 0x1, 0x2, 0x9a, 0xc8e9}]}}, {{0x9, 0x5, 0x13, 0x0, 0x302, 0x20, 0x0, 0x7, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x80, 0x200}]}}, {{0x9, 0x5, 0x8, 0xc, 0x3f, 0x3f, 0x4, 0x3f}}]}}, {{0x9, 0x4, 0x59, 0xba, 0x1, 0xff, 0xff, 0xff, 0x6, [@uac_control={{0xa, 0x24, 0x1, 0x168, 0x1}, [@mixer_unit={0x7, 0x24, 0x4, 0x3, 0x2, "a420"}, @output_terminal={0x9, 0x24, 0x3, 0x3, 0x306, 0x3, 0x1, 0x2}, @input_terminal={0xc, 0x24, 0x2, 0x1, 0x202, 0x2, 0x2, 0xf35, 0x7, 0x4}]}, @generic={0x7b, 0x11, "770253f35cf1bb33fe691e204236f277ac5b31e23736810de942474ae623a2f892a330ca0fa5e12b4a85a2e308a84b61467df0878d291eaddab7f6bbc90c46246232adc3d0455b7a65c96775c41af0ba978b6f2c7f111afabb8f779d604a9baef97e3dd4f5977682d02a9542986e6c1c0456a852fcf7cef276"}], [{{0x9, 0x5, 0x6, 0xc, 0x122, 0x4, 0x3f}}]}}]}}]}}, &(0x7f0000001800)={0xa, &(0x7f0000000040)={0xa, 0x6, 0x200, 0x6, 0xff, 0x7, 0xff, 0x1}, 0x7e, &(0x7f0000000080)={0x5, 0xf, 0x7e, 0x6, [@ss_container_id={0x14, 0x10, 0x4, 0xb3, "650a11d27887b7b480c2f4f076e595a7"}, @generic={0x12, 0x10, 0xb, "ac2f2e0557b97f9d67e549bf92bd92"}, @ss_container_id={0x14, 0x10, 0x4, 0x0, "0a00018d576db8162aea952a50bdcce9"}, @ss_container_id={0x14, 0x10, 0x4, 0x3, "d1ea18257511d095f3021a28a1079ec1"}, @ssp_cap={0x24, 0x10, 0xa, 0x6, 0x6, 0x298, 0xff00, 0xfe, [0xfe98, 0xfe7f0f, 0x3f60, 0xffd7, 0x2fba6502b79547d5, 0x0]}, @ext_cap={0x7, 0x10, 0x2, 0x1a, 0x8, 0x1, 0xfffa}]}, 0x6, [{0x4, &(0x7f0000000680)=@lang_id={0x4, 0x3, 0x845a}}, {0x4, &(0x7f00000006c0)=@lang_id={0x4, 0x3, 0xf8ff}}, {0x1002, &(0x7f0000000700)=@string={0x1002, 0x3, "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"}}, {0x4, &(0x7f0000001740)=@lang_id={0x4, 0x3, 0x814}}, {0x2a, &(0x7f0000001780)=@string={0x2a, 0x3, "3c5c0b2f0b6094dcbbd626671644bc27d54871321472043b3f342fe735688c81a9dd9460a9fb57be"}}, {0x4, &(0x7f00000017c0)=@lang_id={0x4, 0x3, 0x44b}}]}) r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x59, 0xdf, 0x84, 0x40, 0xc45, 0x613e, 0x7c88, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x47, 0x89}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_ep_write(r0, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040), 0x0, 0x0) ioctl$int_in(r1, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r1, &(0x7f0000000100)=""/71, 0x47) 01:42:23 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket$inet6(0xa, 0x5, 0x8) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r8, 0x29, 0x20, &(0x7f0000000300)={@mcast2, 0x10000, 0x0, 0x102, 0x8000003}, 0x20) r9 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r8, r9, &(0x7f0000000240)=0x202, 0x4000000000dc) r10 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r9, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x180}, 0xfffffffffffffca3, &(0x7f00000001c0)={&(0x7f0000000180)={0x14, r10, 0xc05, 0x70bd27, 0x25dfdbff}, 0x68ae17c10aa6d770}, 0x1, 0x0, 0x0, 0x4}, 0x8040) sendmsg$NBD_CMD_DISCONNECT(r7, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x20, r10, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0xfbe4}]}, 0x20}, 0x1, 0x0, 0x0, 0x24048031}, 0x24004000) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r11 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r11, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r13, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000040)={&(0x7f0000000340)=@newae={0x11a4, 0x1e, 0x8, 0x70bd29, 0x25dfdbfd, {{@in6=@empty, 0x4d3, 0x0, 0x3c}, @in=@multicast1, 0x7fffffff, 0x3501}, [@algo_auth={0x1048, 0x1, {{'sha512_mb\x00'}, 0x8000, "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"}}, @algo_aead={0x11c, 0x12, {{'aegis256\x00'}, 0x670, 0x200, "401de41644c905163f69eb7d2586443e14678c6a2f79419d2864597e73d47440b92ce51db8f2bb9f4dbe5505c442146d461a9f92b4447388f392b139d041be2ca1763455174c37c5ce15e943ef2db79e449cf723efa65000ae4dd87ff8a44b2756ba2ea2f41f638efcd88d3a9981c2ebb223c2e84ccb56832a6b0e2dfc254ff6c237e0b9904d6a70aa5e9d71746bac0eb22b9afc9a9d466ce4a843ab3ec502bc6672e115e84046299a1944edf02a75fe9b7f7a459f27e101a4fcb51f54e10dad1f076aa3c43f6a52ddc70859045e"}}]}, 0x11a4}, 0x1, 0x0, 0x0, 0x40}, 0x20020026) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000100)='/dev/input/mice\x00', 0x0, 0x1cc18079dfefe818) ioctl$KVM_SET_CPUID(r1, 0x4008ae8a, &(0x7f0000000140)={0x1, 0x0, [{0x6000000f, 0x18, 0x1d, 0x0, 0x1ff}]}) 01:42:23 executing program 4: lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.capability\x00', &(0x7f00000002c0)=@v1={0x1000000, [{0x240, 0x65bb}]}, 0xc, 0x1) r0 = perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r1 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r1, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) io_setup(0x5, &(0x7f0000000440)=0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = fcntl$dupfd(r11, 0x0, r10) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) r13 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r13, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) io_submit(r2, 0x4, &(0x7f0000000940)=[&(0x7f00000005c0)={0x0, 0x0, 0x0, 0x2, 0x5, 0xffffffffffffffff, &(0x7f0000000480)="df6f82c433dcc6bf55961f72f1be5d5b1630392dca7427d7c8fd746134d1016e0d13fb29d195d46c240c421231d918004875fd2c5d638031dfa3b3fc69b24ee759e70ac35be93906e74dd3d465103e5908d4b947dee15c1a186a9e11519606561615fde64ec979a30deddf983e418ea59f003829af43e27860ac53568a4d0080870951de0d8c8be5baa7f1d23aee707ad798f1362c0e34d7fe728601d6d3c96ea818b19b2597e900e85852d5f1beeebddd2866123fcb81e36b206b7e6fec17668273314380c7f360", 0xc8, 0xdf, 0x0, 0x0, r5}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x8, 0x3, r6, &(0x7f0000000600)="a770cc2bf5b513551958bb0e24375e588f80d4cf5750a4d1e8d89ef5d46c265fa18f72ee117d9a82aeea0a8cedf93d0f1b3d3e9b63544208e3a5371883d9178bbc9f", 0x42, 0x7a63, 0x0, 0x1, r9}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x6, 0x7c, r0, &(0x7f00000006c0)="7dbd64891b357664a54b5602bdf61f231151a05c55e22a970da92a1c55187c80da56e4ee97ab7b042dc0af5c88b75f0118284ed0993ad10e536bcb294b2711a066d2a130e11b9cb6dbd876a38e340df229e53f3d067b23a0f2d72fa815ed1cafd6351fb737fedb824ed0211addd273516b6a113b2f7670ae838d321532bf30fd09cf696c50f20be5be127a690a3d4a6a12bf792bf325cf23d4cc661404f2dcd4c32ca0e252614bed9d576a545887c53ec312360774b2a1e9eb6868f9e7d098e041bc7d5214a65c761a2bfdc8ffca7885bf3e4f491d6808f8cdaf6b748eeae1562d806104d87de7e051fd3779de1f08adf9eff656b796ac", 0xf7, 0xfffffffffffffffe, 0x0, 0x2, r12}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x1, r13, &(0x7f0000000800)="1a352cc7e7a72ad8dae7fbaeac9516b3f33a72e156784849d6a75a115db1b15f21bf334ff04c0a3a49673deef6ff1becedd4a3eeb4ea804fb0acd7aa2c6f3c00f1981b497424d60ae10fa275a5415cd3208bf5838bf3acb6a390d4a00f7da1087c7854eafc146b4b436048b3208512cba87c3fb986f8e27f5f9f972d00b8ec6000614f4364687e3178c5fc5e8b81313d9e144f6251df7bed2eb4aabf46fbb1275268e2b56263a9616191aab23c53a26576109b45551921c556a47d198582cb1fb588e24ab7b2e2ef4a9255509d005407687922eb45a9fe19108385137ee29c5e98dceb5d851b4eef964b68d38b8427ee99e04468abb4dd8a83", 0xf9, 0x0, 0x0, 0x8b71dbbf944d59e1}]) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r15 = socket$kcm(0x29, 0x2, 0x0) r16 = openat$audio(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/audio\x00', 0x98a00, 0x0) ioctl$TUNSETVNETHDRSZ(r16, 0x400454d8, &(0x7f0000000380)=0xa3) ioctl$PERF_EVENT_IOC_SET_FILTER(r15, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x219}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r17 = socket$key(0xf, 0x3, 0x2) getsockopt$sock_cred(r17, 0x1, 0x11, &(0x7f0000000300), &(0x7f0000000340)=0xc) write$cgroup_subtree(r14, &(0x7f00000000c0)=ANY=[@ANYBLOB="e7c7da2687"], 0x90ad) 01:42:23 executing program 2: syz_usb_connect(0x0, 0x2d, &(0x7f0000000180)=ANY=[@ANYBLOB="230100003b21b808600404009047bcf89a0109021b00010000000009045c00017f63070007058bff000c07000000000000000bf90d2930f9636e02873672763277e67c2eddb665a2156e39d6e38026847ee0374222779410329cf0d8a3d4ec13482d685d380a5c8a193c3011460438cd338254394efbcae96ba06fb14ddc44f7c5142e163fca7186f0"], 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000240)=""/4096) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r0, 0xc0305602, &(0x7f0000000040)={0x0, 0x8, 0x3015, 0x1}) 01:42:23 executing program 3: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {0x1}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 658.860970][T10982] device nr0 entered promiscuous mode [ 659.022034][ T3378] usb 6-1: new high-speed USB device number 2 using dummy_hcd 01:42:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0006000000000000000ffffffffffff000000003200000000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c2900"/240], 0x138}}, 0x0) 01:42:24 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) getsockopt$inet_tcp_buf(r2, 0x6, 0xb, &(0x7f0000000580)=""/10, &(0x7f00000005c0)=0xa) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r6, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r8, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) ioctl$VHOST_GET_VRING_ENDIAN(r2, 0x4008af14, &(0x7f0000000480)={0x0, 0xffffffff}) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = fcntl$dupfd(r10, 0x0, r9) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(r11, &(0x7f0000000500)={0x0, 0x18, 0xfa00, {0x3, &(0x7f00000004c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r6, &(0x7f0000000540)={0x4, 0x8, 0xfa00, {r12, 0xc5}}, 0x10) [ 659.121952][T12230] usb 3-1: new high-speed USB device number 30 using dummy_hcd [ 659.154074][T11001] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. 01:42:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) io_setup(0x53de, &(0x7f0000000100)) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0xf0, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @loopback}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {0x4}, 0x0, 0x0, 0x2}}, 0xf0}}, 0x0) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000080)=0x13, 0x4) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x20000, 0x0) ioctl$USBDEVFS_DROP_PRIVILEGES(r1, 0x4004551e, &(0x7f0000000040)=0x800) 01:42:24 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00', 0xfffffffe}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) setxattr$security_evm(&(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='security.evm\x00', &(0x7f0000000500)=@md5={0x1, "5190c0071650e1f29323d69683c203fa"}, 0x11, 0x0) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 659.285135][ T3378] usb 6-1: Using ep0 maxpacket: 16 01:42:24 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = dup3(0xffffffffffffffff, r3, 0x40000) ioctl$KVM_GET_IRQCHIP(r4, 0xc208ae62, &(0x7f00000002c0)) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 659.362293][T12230] usb 3-1: Using ep0 maxpacket: 8 [ 659.416694][T11014] device nr0 entered promiscuous mode [ 659.452414][ T3378] usb 6-1: config index 0 descriptor too short (expected 9, got 0) [ 659.460540][ T3378] usb 6-1: can't read configurations, error -22 [ 659.512539][T12230] usb 3-1: config 0 has an invalid interface number: 92 but max is 0 [ 659.520808][T12230] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 659.531065][T12230] usb 3-1: config 0 has no interface number 0 01:42:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 659.642412][ T3378] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 659.698231][T11014] device nr0 entered promiscuous mode [ 659.732457][T12230] usb 3-1: New USB device found, idVendor=0460, idProduct=0004, bcdDevice=47.90 [ 659.741692][T12230] usb 3-1: New USB device strings: Mfr=188, Product=248, SerialNumber=154 [ 659.750423][T12230] usb 3-1: Product: syz [ 659.754734][T12230] usb 3-1: Manufacturer: syz [ 659.759402][T12230] usb 3-1: SerialNumber: syz [ 659.770625][T12230] usb 3-1: config 0 descriptor?? [ 659.816105][T12230] input: syz syz as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.92/input/input12 [ 659.882359][ T3378] usb 6-1: Using ep0 maxpacket: 16 [ 660.015779][T12179] usb 3-1: USB disconnect, device number 30 [ 660.052040][ T3378] usb 6-1: config index 0 descriptor too short (expected 9, got 0) [ 660.060030][ T3378] usb 6-1: can't read configurations, error -22 [ 660.067561][ T3378] usb usb6-port1: attempt power cycle [ 660.781800][ T3378] usb 6-1: new high-speed USB device number 4 using dummy_hcd [ 660.792186][T12230] usb 3-1: new high-speed USB device number 31 using dummy_hcd 01:42:25 executing program 3: setsockopt$inet6_MRT6_DEL_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd3, &(0x7f0000000040)={{0xa, 0x4e20, 0x6d, @remote, 0x5}, {0xa, 0x4e22, 0x8, @local, 0x400}, 0x0, [0x7fff, 0xc6, 0xfad, 0x7, 0x2, 0x2, 0x1, 0x9]}, 0x5c) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in=@dev={0xac, 0x14, 0x14, 0x1a}, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$SG_SET_KEEP_ORPHAN(r6, 0x2287, &(0x7f0000000000)=0x8) 01:42:25 executing program 1: r0 = syz_open_dev$vcsn(&(0x7f0000000140)='/dev/vcs#\x00', 0x34b, 0x2) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000004c0)=""/112) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r5 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$LOOP_CTL_GET_FREE(r8, 0x4c82) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/net/ey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r9, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) r11 = socket(0xa, 0x6, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = fcntl$dupfd(r13, 0x0, r12) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) ioctl$EVIOCSABS20(r14, 0x401845e0, &(0x7f0000000580)={0xffff, 0x2, 0x5, 0x1, 0x6}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r11, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:25 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(r3, 0xc080661a, &(0x7f00000002c0)={{0x1, 0x0, @identifier="a11b8dd556c150df0f4f6c2d9cd4384e"}}) 01:42:25 executing program 5: syz_usb_connect$cdc_ecm(0xc, 0x80, &(0x7f0000000300)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x40, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x6e, 0x1, 0x1, 0x80, 0x20, 0x4, [{{0x9, 0x4, 0x0, 0x7, 0x2, 0x2, 0x6, 0x0, 0x7, {{0x5}, {0x5, 0x24, 0x0, 0x6}, {0xd, 0x24, 0xf, 0x1, 0x7ff, 0x8, 0x60, 0x6}, [@network_terminal={0x7, 0x24, 0xa, 0x20, 0x4e, 0x5, 0x97}, @mbim={0xc, 0x24, 0x1b, 0x6, 0x7, 0x59, 0x19, 0x7, 0x1f}, @mbim={0xc, 0x24, 0x1b, 0x200, 0x14, 0xff, 0x1f, 0x6, 0x7}, @country_functional={0xa, 0x24, 0x7, 0xff, 0x1f, [0x1, 0x6]}, @obex={0x5, 0x24, 0x15, 0xa000}, @call_mgmt={0x5, 0x24, 0x1, 0x1}]}, {[], {{0x9, 0x5, 0x82, 0x2, 0xfc, 0x1f, 0x8, 0x2}}, {{0x9, 0x5, 0x3, 0x2, 0x246, 0x69, 0x3, 0x2}}}}}]}}]}}, &(0x7f0000000380)={0xa, &(0x7f0000000080)={0xa, 0x6, 0x200, 0x3c, 0x3, 0x8, 0xff, 0x4}, 0x2a, &(0x7f00000001c0)={0x5, 0xf, 0x2a, 0x4, [@ss_cap={0xa, 0x10, 0x3, 0x4, 0x5d39cb2c5c5d64db, 0x0, 0x19, 0x8}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x5d29bd8f423eb212, 0x68, 0x6, 0x5}, @ss_cap={0xa, 0x10, 0x3, 0x0, 0x2, 0x82, 0x3f, 0xfa}, @ext_cap={0x7, 0x10, 0x2, 0x0, 0xb, 0x0, 0x1}]}}) r0 = syz_usb_connect(0x0, 0x24, &(0x7f0000000040)={{0x12, 0x1, 0x0, 0x59, 0xdf, 0x84, 0x40, 0xc45, 0x613e, 0x7c88, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x1, 0x47, 0x89}}]}}]}}, 0x0) syz_usb_control_io$hid(r0, 0x0, 0x0) syz_usb_ep_write(r0, 0x1000, 0xfffffe63, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x6, r2, 0x300, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", "", ""]}, 0x10}, 0x1, 0x0, 0x0, 0xc9}, 0x0) poll(&(0x7f0000000040)=[{r1}], 0x1, 0x0) ioctl$int_in(r1, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r1, &(0x7f0000000100)=""/71, 0x47) [ 660.913209][T11130] device nr0 entered promiscuous mode [ 661.042251][T12230] usb 3-1: Using ep0 maxpacket: 8 [ 661.119265][T11130] device nr0 entered promiscuous mode [ 661.162566][T12230] usb 3-1: config 0 has an invalid interface number: 92 but max is 0 [ 661.170809][T12230] usb 3-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 661.181106][T12230] usb 3-1: config 0 has no interface number 0 [ 661.322388][ T3378] usb 6-1: Using ep0 maxpacket: 16 [ 661.342259][T12230] usb 3-1: New USB device found, idVendor=0460, idProduct=0004, bcdDevice=47.90 [ 661.351379][T12230] usb 3-1: New USB device strings: Mfr=188, Product=248, SerialNumber=154 [ 661.360123][T12230] usb 3-1: Product: syz [ 661.364520][T12230] usb 3-1: Manufacturer: syz [ 661.369168][T12230] usb 3-1: SerialNumber: syz [ 661.375578][T12230] usb 3-1: config 0 descriptor?? [ 661.416039][T12230] input: syz syz as /devices/platform/dummy_hcd.2/usb3/3-1/3-1:0.92/input/input13 [ 661.452197][ T3378] usb 6-1: config 1 interface 0 altsetting 7 bulk endpoint 0x82 has invalid maxpacket 252 [ 661.462486][ T3378] usb 6-1: config 1 interface 0 altsetting 7 bulk endpoint 0x3 has invalid maxpacket 582 [ 661.472544][ T3378] usb 6-1: config 1 interface 0 has no altsetting 0 [ 661.614898][T12179] usb 3-1: USB disconnect, device number 31 [ 661.642155][ T3378] usb 6-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 661.651359][ T3378] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 661.659776][ T3378] usb 6-1: Product: syz [ 661.664169][ T3378] usb 6-1: Manufacturer: syz [ 661.668825][ T3378] usb 6-1: SerialNumber: syz 01:42:26 executing program 2: syz_usb_connect(0x0, 0x36, &(0x7f0000000000)={{0x12, 0x1, 0x0, 0x47, 0x46, 0x22, 0x8, 0x10cf, 0x5500, 0xc4b2, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x2e, 0x0, 0x2, 0xde, 0xd9, 0xa8, 0x0, [], [{{0x9, 0x5, 0x8f, 0x2}}, {{0x9, 0x5, 0x84, 0x9b5a1c4223be0c76}}]}}]}}]}}, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0xc274093cb59fe96, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000080)={0x2}) 01:42:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:26 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) ioctl$sock_TIOCOUTQ(r4, 0x5411, &(0x7f0000000480)) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r6, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r8, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) socket(0x0, 0x3, 0x4) 01:42:26 executing program 4: ioctl$IMGETDEVINFO(0xffffffffffffffff, 0x80044944, &(0x7f00000002c0)={0x100}) perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='./file0\x00') perf_event_open(&(0x7f0000000180)={0x5, 0xfffffffffffffc2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 661.968798][T11150] device nr0 entered promiscuous mode 01:42:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="38010000100013070000000000000000e000000200"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x138}}, 0x0) 01:42:27 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.advise\x00') r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") ioctl$int_in(r1, 0x0, &(0x7f0000000180)=0x4000402) read(r0, &(0x7f0000000240)=""/84, 0xfffffffffffffe9e) 01:42:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x286, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast1}, {@in6=@remote, 0x0, 0x32}, @in6=@ipv4, {}, {0x0, 0x0, 0x9}, {}, 0x0, 0x0, 0xa, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 662.292692][ T3378] cdc_ether: probe of 6-1:1.0 failed with error -71 [ 662.329637][ T3378] usb 6-1: USB disconnect, device number 4 [ 662.343284][T12179] usb 3-1: new high-speed USB device number 32 using dummy_hcd [ 662.451081][T11150] device nr0 entered promiscuous mode [ 662.592350][T12179] usb 3-1: Using ep0 maxpacket: 8 01:42:27 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x200400, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000100), &(0x7f0000000140)=0x4) ioctl$VIDIOC_ENUMOUTPUT(r0, 0xc0485630, &(0x7f0000000040)={0x47, "ae9160c8f872767e5b1225dbb8ce566bad20e43db553b535b9c0747fd244923b", 0x2, 0xff, 0x1, 0xb000, 0x2}) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = accept4$packet(r0, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14, 0x80000) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4d) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0xcd, &(0x7f00000002c0)={{0xa, 0x4e22, 0xc89, @rand_addr="0b158b7dbbcb1a8b2fc2010d7919b47e", 0x14}, {0xa, 0x4e20, 0x1, @rand_addr="26a1cdfcf384e0273742690ad4a11bda", 0x13}, 0x3, [0x4, 0x200, 0xfffff3c3, 0x8, 0x1, 0x6, 0x1, 0x8]}, 0x5c) r4 = socket$kcm(0x10, 0x2, 0x0) r5 = syz_open_dev$swradio(&(0x7f0000000280)='/dev/swradio#\x00', 0x1, 0x2) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000240)="1b0000001c008105e00f80ecdb4cb9f207c88ea067000000880305", 0x15}], 0x1}, 0x0) sendfile(r2, r4, &(0x7f0000000200), 0x401) [ 662.712331][T12179] usb 3-1: config 0 has an invalid interface number: 46 but max is 0 [ 662.720603][T12179] usb 3-1: config 0 has no interface number 0 [ 662.727641][T12179] usb 3-1: config 0 interface 46 altsetting 0 bulk endpoint 0x8F has invalid maxpacket 0 [ 662.737619][T12179] usb 3-1: config 0 interface 46 altsetting 0 bulk endpoint 0x84 has invalid maxpacket 0 [ 662.747728][T12179] usb 3-1: New USB device found, idVendor=10cf, idProduct=5500, bcdDevice=c4.b2 [ 662.756911][T12179] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 662.768996][T12179] usb 3-1: config 0 descriptor?? [ 662.852986][T12179] vmk80xx 3-1:0.46: driver 'vmk80xx' failed to auto-configure device. 01:42:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:27 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/det/\x05\x00p#\x00', 0x1004, 0x1) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$RXRPC_UPGRADEABLE_SERVICE(r3, 0x110, 0x5, &(0x7f0000000080)=[0x3, 0x2], 0x2) 01:42:28 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r1}, &(0x7f0000044000)) r2 = syz_open_dev$dmmidi(&(0x7f0000000380)='/dev/dmmidi#\x00', 0x1f9, 0x102) perf_event_open(&(0x7f00000000c0)={0x4, 0x70, 0xc0, 0x1, 0x7, 0x9, 0x0, 0x0, 0x800, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7fffffff, 0x1, @perf_bp={&(0x7f0000000000), 0x6}, 0x5080, 0x3, 0x80000000, 0x3, 0xb2, 0x3, 0xf2}, r1, 0xf, r2, 0x8) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r4 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r3, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r3, &(0x7f00000002c0)=ANY=[@ANYBLOB="006386dd41d0bfcb53ca98cd9e0ab2457100d1c80b12ea7e7dc8786a237a664b29aa628e815ad27fcd09b0d6fab4f7da5cf6a3a85441cee5f76c09a21c5f2cbe4aa41fefa8d3ccb0791153df6d5b85f09d3cdd64128d7613f7cebaa7656fb8950bc0a7b60793d671ca07453d35cd2f75babaded6968f519a53abacf7375ee8fdbd06ee95fe17d5ecea5627da3d042d40b4f99dc2f858"], 0x90ad) [ 663.018030][T12179] usb 3-1: USB disconnect, device number 32 [ 663.103539][T11385] device nr0 entered promiscuous mode [ 663.290051][T11385] device nr0 entered promiscuous mode [ 663.843915][ T31] usb 3-1: new high-speed USB device number 33 using dummy_hcd [ 664.101902][ T31] usb 3-1: Using ep0 maxpacket: 8 [ 664.254000][ T31] usb 3-1: config 0 has an invalid interface number: 46 but max is 0 [ 664.262303][ T31] usb 3-1: config 0 has no interface number 0 [ 664.268485][ T31] usb 3-1: config 0 interface 46 altsetting 0 bulk endpoint 0x8F has invalid maxpacket 0 [ 664.278519][ T31] usb 3-1: config 0 interface 46 altsetting 0 bulk endpoint 0x84 has invalid maxpacket 0 [ 664.288492][ T31] usb 3-1: New USB device found, idVendor=10cf, idProduct=5500, bcdDevice=c4.b2 [ 664.297681][ T31] usb 3-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 664.367739][ T31] usb 3-1: config 0 descriptor?? [ 664.431906][ T31] vmk80xx 3-1:0.46: driver 'vmk80xx' failed to auto-configure device. [ 664.618459][ T31] usb 3-1: USB disconnect, device number 33 01:42:30 executing program 2: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f00005f5000)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f0000000000)={0x2, 0x400000000000003, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_x_nat_t_type={0x1}, @sadb_address={0x5, 0x6, 0x0, 0x0, 0x0, @in6}, @sadb_x_nat_t_port={0x1, 0x16}, @sadb_sa={0x2}, @sadb_address={0x5, 0x5, 0x0, 0x0, 0x0, @in6={0xa, 0x0, 0x0, @local={0xfe, 0x80, [], 0xffffffffffffffff}}}]}, 0x80}}, 0x0) r1 = syz_open_dev$mouse(&(0x7f0000000080)='/dev/input/mouse#\x00', 0xffffffff, 0x100) ioctl$EVIOCSCLOCKID(r1, 0x400445a0, &(0x7f00000000c0)=0xffff) 01:42:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="38010000100013070000000000000000e000000200"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0006000000000000000ffffffffffff000000003200000000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e75686c290000000000000000000000000000000000000000000000000000000000000000f1ffffff00"/240], 0x138}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) clock_gettime(0x0, &(0x7f0000000580)={0x0, 0x0}) write$sndseq(r6, &(0x7f00000005c0)=[{0x3f, 0x80, 0x4, 0x0, @tick=0x6, {0x20, 0xcb}, {0xe, 0x5}, @ext={0xf4, &(0x7f0000000480)="6114e46f82fca50b976eeee5998e45ae0715a57408ad8d06c268a2e4d6bb1e255d63d83b9b9b556a720c674ba5d0589417993c254385c5435526adfb99ada53c282cfa3fd7388febfcad76fed45cf29918e374dfe2d1069bf92e34d71807e47f5cbeab6bd9dcb1d477b87bb695e66f692082f2f1a1d4339da650b82dc5003f1f6db24030cd380f7a5f08d334ceb97cd61b7a01528ed6c0ead186dd2af8baf04a35aa7a0db0cf6414c8baac43023e1658a803d7b97194545378d5d66b748e8c617ffc41bd89c9b2b595eb124c95196dcc40d8093b36ac86fa0dcfbe66d85694a659cae2f12b8763c42ae66791eae8f08547f3cd46"}}, {0x9, 0xc7, 0xa3, 0x93, @tick, {0x8, 0x1e}, {0xff}, @raw32={[0x7, 0x5b4, 0xa0]}}, {0x7, 0x81, 0x2c, 0xc1, @time={r7, r8+30000000}, {0x20, 0xe}, {0x9, 0x2}, @raw32={[0x4, 0x511, 0x1ff]}}, {0x3f, 0x5, 0x6, 0xfe, @time={0x0, 0x1c9c380}, {0x80, 0x3}, {0x8, 0x4}, @raw32={[0x7fff, 0x1ff, 0x3]}}, {0x0, 0x6, 0x80, 0x3f, @time={0x77359400}, {0x9, 0x9}, {0xfa, 0x9}, @time=@time={0x77359400}}], 0xf0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$VIDIOC_LOG_STATUS(r3, 0x5646, 0x0) r9 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r9, 0xae01, 0x0) ioctl$KVM_GET_VCPU_MMAP_SIZE(r9, 0xae04) r10 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/p\x01\x04\x00\xf7{\x86Zi/capi20ncci\x00', 0x1e3103, 0x0) ioctl$sock_inet_SIOCDELRT(0xffffffffffffffff, 0x890c, &(0x7f0000000140)={0x0, {0x2, 0x4e21, @remote}, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x2, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000100)='veth0_to_bond\x00', 0xffffffff00000000, 0x6, 0x100}) epoll_pwait(r10, &(0x7f0000000040)=[{}, {}, {}, {}], 0x4, 0x6, &(0x7f0000000080)={0x1}, 0x8) r11 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20\x00', 0xf203bc82740a926b, 0x0) fsetxattr$security_evm(r11, &(0x7f0000000380)='security.evm\x00', &(0x7f00000003c0)=@v2={0x5, 0x3, 0xd, 0x80000000, 0xa6, "e0bc03bfee6847ec0d88ff79e379270db1570ad62d9e01392f0febf6675da7d36ac4ce36da0affe82f84084e82c96aada78f69cd74ab9e77bcc52f72128014c472c5a4a78c1e5ff6bc1051fe59c6cfeca675597819a64fa3812ccb57277c36d33b6ab436d7b8e9ab582663c6cd92101e17f5881e8cf4694e0b077d9999a8800ac6cbba253d7f32b8c8c9ef4470f1b1261eba4fcb3e0c1f28250d7c68444294d647d56a16da73"}, 0xb0, 0x3) 01:42:30 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x0, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r0) getuid() ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:42:30 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000000), 0x8}, 0x6cc82, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7ed0661270a0616f6749241a43c3ab6c0ff4e8cd542cbcc1e1fe365e805b8b198151eb46583fd094ace8c9a0218b8aa40e0feb39ce04452ffeef97f02336fc01235e275db0086428a2ca75e896ddd47e6bfdd6f66a1a817ac3d770e07accab1e470d723b03efafe27912ac65e8"], 0x90ad) 01:42:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 665.053279][T11397] device nr0 entered promiscuous mode 01:42:30 executing program 2: write$sndseq(0xffffffffffffffff, &(0x7f0000000640)=[{0x81, 0x100000001, 0x0, 0x0, @tick, {}, {}, @control}], 0x30) write(0xffffffffffffffff, &(0x7f0000000740)="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", 0x2b4) 01:42:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0x7f, 0x82240) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000100)={0xc1e2, 0x0, 'client1\x00', 0xffffffff80000000, "a341917a51d71a10", "dff65a8d631793c33d5be973261499d94cdfe645da93a1dc6a37ea686e4a29fe", 0xa3f, 0x8}) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="38010000100013070000000000000000e00000020000000000000000000000000000000000000000000000000004df038d481a15a70900"/72, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0006000000000000000ffffffffffff000000003200000000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c2900"/240], 0x138}}, 0x0) [ 665.440688][T11397] device nr0 entered promiscuous mode 01:42:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_emit_ethernet(0x66, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffff0180c289030086dd6076605100303afffe8000000000000000000000000000aaff0200000000000000af04a77400000000000001860090780007080060c5961e000000000304000000000000180300000500000100000000000000000000000000000001"], 0x0) [ 665.581485][T11518] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. 01:42:30 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x1eb, &(0x7f0000000000)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:30 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = syz_open_dev$adsp(&(0x7f0000000000)='i\x8ee\x02\x00\x00\x00X\x00', 0x7ff, 0x4880) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f00000000c0)=ANY=[@ANYBLOB="0700000800000000000000001395395f000000002100"/36]) ioctl$USBDEVFS_SETCONFIGURATION(r2, 0x80045505, &(0x7f0000000040)=0x3f) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c0000001600010000000000000000000a000000", @ANYRES32=0x0, @ANYBLOB="14000200fe800000000000000000000000000000c6209f12ce48aac7e1e1d107b06d8ebf390ad409d12f6ad3dcbe078362bfd3272340d96e929ea9b4e0e144000777c21c3371b1edaf39ac045ee4aecdf3db07d75371f1eaaf786e8dd09c4a4d70e6a0b9be987f19897de3"], 0x2c}}, 0x0) 01:42:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000)='/dev/net/tun\x00', 0x4000, 0x0) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @local}, &(0x7f0000000080)=0x10) dup2(r1, r2) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:31 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x8, 0x10000) ioctl$RNDADDENTROPY(r1, 0x40085203, &(0x7f0000000100)={0xed, 0x2b, "9ba51c450a20db749d7c38c42b07ffde6afeaa7f7638f8b169b28babcfdc7cfc370d01c876eb630abd38b1"}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2}, 0x0, 0x0, r5, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="0063dfab7dfd5c6e00"], 0x90ad) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) read$char_usb(r8, &(0x7f00000002c0)=""/126, 0x7e) 01:42:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)={0x20, 0x1e, 0x2000000000000301, 0x0, 0x0, {0x15}, [@typed={0xc, 0x10e, @u64}]}, 0x20}}, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x2, 0x400040) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f00000000c0)={0x66, 0x18, 0x1d, 0x400, 0x1e, 0x400, &(0x7f0000000080)="2a6d578e2149fbf2187229cb9240313525953cfbbf73da36e456897ec723"}) 01:42:31 executing program 3: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000540)=0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f0000000580)={0x9}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = accept4(r1, &(0x7f0000000000)=@ll, &(0x7f0000000080)=0x80, 0x80000) lstat(&(0x7f0000000140)='.\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r2, &(0x7f0000000500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000002}, 0xc, &(0x7f0000000180)={&(0x7f00000003c0)=@report={0x140, 0x20, 0x200, 0x70bd25, 0x25dfdbfb, {0x33, {@in=@multicast2, @in=@loopback, 0x4e20, 0xfff9, 0x4e21, 0x1, 0xa, 0xa0, 0x0, 0xbdddb81f1a5a8044, 0x0, r3}}, [@sec_ctx={0xf4, 0x8, {0xef, 0x8, 0x1, 0x1, 0xe7, "eb4534c94698bbf1e7c65dec784b07180b3028307a5aab4b2aa5d7ec258d602dbc4f12201400f24dda2f88bf413d2e7022d91ead3c354e54cb1f3bbb32462379235fc6a71c0a567e072346d2403529be76c59ee4d9eddb780e0df5a091fd4e64f39d3264d59a99314c0600a1a5d0803822361fe78edf1cf69b2859339c2ee0b20813c2da671bb76b8e45400c6cdaa4eeefd3d45f3c2eb318584262df3dc4090b73f81465d7e2f0b2df7c26b7a26faf95d0c2ae1d4b854947aa51944de846941e7e3993ff176434bf15791a1989422c1b1774da4f4aafea9c980afa38cf05cfb2ace39b227492f6"}}]}, 0x140}, 0x1, 0x0, 0x0, 0x8886}, 0x60000000) prctl$PR_SET_SECUREBITS(0x1c, 0x0) sendmsg$nl_xfrm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 666.139694][T11542] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. [ 666.175193][T11542] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.2'. 01:42:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$l2tp_PPPOL2TP_SO_RECVSEQ(r3, 0x111, 0x2, 0x1, 0x4) 01:42:31 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x4, &(0x7f0000000140)=ANY=[@ANYBLOB="b4780000000000000000000000000000000000000000000000000000000000001c13eb3f5bd466e868ae5ae6cfdee25c4206f3c10dffc598d527dd2fc55f2f438ccbd37117244d37b01da79780e09001119dfd7435d6f3fbcb0e8da801ebc68237f624172df1dfc5460a2ff3bac18bf646daa638e0ac8e41d615f7d604c4d0ce0bc27e94108400a12210461e95dbbdf55647b8a74c410ac354baca6a2a20cd0f1c0efbaa25ab0a6bec30adce8e5b58eff63bf40487abf67942e1b4ad2175f86f5ca8774660bbf6c4648dfe36d8201e30fe6dcb41fcb17d08bd8c6d3808e36976c4ab1b1406aea53551807cab733640936c26a5212d7306d6fed61b80ce"], &(0x7f0000003ff6)='G\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2000, 0x0) r1 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r1, 0x4d) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000080)={r5, 0x0, 0x20}, &(0x7f00000000c0)=0xc) setsockopt$inet_sctp6_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r6, 0x3ff}, 0x8) 01:42:31 executing program 5: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) accept(r0, 0x0, &(0x7f0000000480)) syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x50c41) ioctl$int_in(r1, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r1, &(0x7f0000000100)=""/71, 0x47) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) sendmsg$key(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x2, 0x4, 0x7, 0x8, 0x1d, 0x0, 0x70bd2d, 0x25dfdbfd, [@sadb_x_sa2={0x2, 0x13, 0x1, 0x0, 0x0, 0x70bd28, 0x3503}, @sadb_x_sec_ctx={0x19, 0x18, 0x0, 0x1f, 0xbd, "87bba9fabc6d730270a65ce5b4834bef8c4d6dab5ebf77e4fd23bc89c8429f8908d439a06cef8de8ed880703842fb59df28567e18751e3a75f84624f5eb1bd5fddca700563c81d21bae05332b49aba35153f193014e8591ced0cdd65403726b5370eeb4619f846a2f199188fc9074d32e6ac7262a8ee321c0005a21199b15478a03e4d5661213e81c08445d8bfe90f6989a833c2f0acd983af10f5b1335f35951bbb49c1c1bbfea69e7c396555147ce2e07b04115a1546f2fca064221d"}]}, 0xe8}}, 0x4000000) r5 = socket(0x10, 0x3, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') r7 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r7}, &(0x7f0000044000)) sched_setscheduler(r7, 0x5, &(0x7f0000000440)=0x8c0e) sendmsg$IPVS_CMD_GET_INFO(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x2c, r6, 0x401, 0x0, 0x0, {}, [@IPVS_CMD_ATTR_SERVICE={0x4}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}]}]}, 0x2c}}, 0x0) sendmsg$IPVS_CMD_NEW_SERVICE(r4, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8001}, 0xc, &(0x7f0000000080)={&(0x7f00000001c0)={0xc4, r6, 0x4, 0x70bd27, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x20, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0xfff9}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x2}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}]}, @IPVS_CMD_ATTR_SERVICE={0x24, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0xe}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x4}, @IPVS_DEST_ATTR_TUN_PORT={0x8, 0xe, 0x4e22}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x4}, @IPVS_DEST_ATTR_TUN_TYPE={0x8, 0xd, 0x1}, @IPVS_DEST_ATTR_TUN_TYPE={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x14, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x4}]}]}, 0xc4}, 0x1, 0x0, 0x0, 0x5800}, 0x50) 01:42:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x49000, 0x0) r2 = socket$inet(0x2, 0x4000000805, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = dup3(r2, r3, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r4, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r3, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x1d, &(0x7f000025e000)={0x2, [0x0, 0x0]}, &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r4, 0x84, 0x66, &(0x7f000059aff8)={r5}, &(0x7f000034f000)=0x8) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r1, 0x84, 0x6d, &(0x7f0000000540)={r5, 0x1000, "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"}, &(0x7f0000000080)=0x1008) r6 = socket$inet6(0xa, 0x6, 0x0) ioctl$BLKREPORTZONE(r0, 0xc0101282, &(0x7f0000000340)={0x9, 0x7, 0x0, [{0x2, 0x5, 0x7, 0x84, 0xc4, 0xff, 0x9f}, {0x8001, 0x9, 0x7b57, 0x3f, 0x0, 0x4, 0xff}, {0x8, 0xabb, 0x4, 0x5, 0x3f, 0x6, 0xa2}, {0xffff, 0x7a63, 0x6, 0x5, 0x57, 0x80, 0x40}, {0xfff, 0x1000, 0x401, 0x80, 0xff, 0x0, 0x1}, {0x3, 0xffffffff, 0x6, 0x6c, 0x0, 0x4}, {0x6b800000, 0x0, 0xc8bf, 0x0, 0x7e, 0x80, 0x40}]}) bind$inet6(r6, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r6, 0x4d) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x7, 0x2, 0xff, 0x1, 0x2, 0x1}, 0x20) 01:42:31 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r5 = socket(0x9, 0x6930714ff762dd50, 0x3) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(0xffffffffffffffff, 0x84, 0x4, &(0x7f00000004c0), &(0x7f0000000500)=0x4) ioctl$USBDEVFS_DISCONNECT_CLAIM(r6, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) ioctl$PPPIOCGNPMODE(0xffffffffffffffff, 0xc008744c, &(0x7f0000000480)={0xc021, 0x3}) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0x206) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000580)={0x0, 0x40000, r2}) fcntl$F_GET_FILE_RW_HINT(r8, 0x40d, &(0x7f00000005c0)) 01:42:31 executing program 2: gettid() r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x82) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000580)={"6cdd4237dd245c8404721efdc9c8dc1964125fa96fa42b761c6ec25b2bec0ba4c81036c93a40c8a4d4412a763b00040000000000003c5ca206c047ecee377abaece6b88378e3d63a98fc191f361d264ffa8b46485f02baee1ab6b8154252066178868d1ef4b5365c5dc26ca097ddda7c21a984c2b9ca4bbb7a87165c0c1dbc75d7ea4df10000174a3ac8694525952f44500a1f0db509c32cc7ace842c28f37f06e4ea9f1e5f0c6c379f9cc58bf69fcde318ead4825aa1b6a832d4e48cc41bb5a6baa41d614f6c8941bee805954a62d196a4e8d41f6b21224b57f530d0000c1ff53bf79a1f5c5dc34b2262d66ae793b6304a30b97077f1c131045cbc11c4562d22db88d0edc5daee171cc04d96d9ec2db07478f347edbd6404923ad4a5672b1b285c7988c4ec0922c655ff600000000c00dc290d936d93236051fadfb4b95d02c0bda7ce38dabb7cd103fe4d0c9c963cd717a77f8df8d46099b1f58e068af6afbbc19db161c6df3e7c9c71bc08a282fc2c142856b5e4caff4c0a4f72445ef10dcd2c569319d6e9bb2058d023f669a64fc7d9684b45b00000000364673dcfa9235ea5a2ff23c4bb5c5acb290e8976dcac779ff000000000000003d4e185afe28b774b99d3890bd37428617de4cdd6f53c419ce31054182fd098af7b7f1b1152c691611f897558d4b755cb783978d9859b0537b05b623dcb5c4ca9317471a40fa4998cca80e961efffb4e1aa25d8a17deef0c8694c4395fc99be3c3fe7aeb8af4929ce7d346ca62b25d48fda5d10146702f78b233b5208752726ed9f0c340d494b92d19cc930bb8a5f8b4da8f4603ac0c3b698384e17a570dc8524823ed15af4ecfabb4b2541d3c114b7bba1c21a845c9cf0d1cc24aba47e30f558b2246ad95ccf7d2f80cc0ab26f08336ea1a33b79cf35b898837016eb211a1734c7af076e15451e33519fc978f66df7df4557c91024a8dc130a28ef5f63ad07b39c8d23b85cf434e065e8a29a800655d127de6f6347b4951f97b5703dc78b1ca9d74ea6a9ae12ab367c0de2659cc38d2f33ddd86e0597d33361eada119b5132145fa4525c488c7fffd6ceda6e9a02ebd97ced6b0161f2cc84615ceb8b18883299c636e9e46724a9a0600a8bb02f3e489631d522019a35fe12a33caf9dd8768ddbc02a484c345c3eff254297b1dbb04989c3f9f3c7b3c985c39b1d313018068d3809bac8c657e39f4f692613e28387e955722908dd88b56163be8312ff47c5b6f280472935af74e97a5a8110a4d74496f4c8ec82ddb56d9b962d2fc43fa01a047526865c84f7cff36056cc4ac258021e1581d43badaaec6cc5a2ef989de9801fed6d4be2bfcfe07a69c46bffbe9dd03970800000000000000d372bdd6d89dc1ecf63c23d506114d0fba2bd1c69e8f7e3fccdcda85ce975ec1381b1cec6ddaa76e186719d8191643"}) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = dup3(r0, r1, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4004ae8b, &(0x7f0000000140)={{0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfe, 0x1}, {0x0, 0x0, 0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x44ca825bad0e516b, 0x0, 0xfe}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, {}, {0x8000}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000, [0x0, 0x0, 0xfffffffffffffffc]}) dup2(r5, r2) 01:42:31 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) getsockopt(r2, 0x20004, 0x2, &(0x7f0000000480)=""/192, &(0x7f0000000540)=0xc0) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r5 = socket(0xa, 0xa, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r6, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r8, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(0xffffffffffffffff, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:31 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x25dfdbfc, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x1, 0x800000) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") r4 = syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x80) ppoll(&(0x7f0000000380)=[{r1, 0x20}, {r2, 0x8080}, {r3, 0x862c}, {r4, 0x1}], 0x4, &(0x7f0000000400), &(0x7f0000000440)={0x2}, 0x8) r5 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0xa}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r6}]]}}}]}, 0x40}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)=@gettclass={0x24, 0x2a, 0x100, 0x70bd2a, 0x25dfdbfe, {0x0, r6, {0x7}, {0x1}, {0xfff1, 0xf}}, ["", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x24040000}, 0x8001) 01:42:32 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x82c40, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x73, 0x0, 0x0, 0x3ff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x6, @perf_config_ext}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x90ad) getsockopt$inet_tcp_int(r3, 0x6, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) [ 667.029822][T11582] netlink: 'syz-executor.3': attribute type 10 has an invalid length. 01:42:32 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) socket(0x5, 0x36e330d30b357f3, 0x1) 01:42:32 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0xeffd, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:42:32 executing program 2: syz_emit_ethernet(0x46, &(0x7f0000000000)={@random="493c0126d212", @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp={0x44, 0x4, 0x5, 0x3}]}}, @tipc=@payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 01:42:32 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') openat$udambuf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/udmabuf\x00', 0x2) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) prctl$PR_SET_FP_MODE(0x2d, 0x1) 01:42:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000000)) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x4, {{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 667.498418][T11622] device nr0 entered promiscuous mode 01:42:32 executing program 2: r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, 0x0, 0x0, r3) getgroups(0x4, &(0x7f0000000140)=[0x0, r2, r3, 0x0]) ioctl$TUNSETGROUP(0xffffffffffffffff, 0x400454ce, r2) setsockopt$netlink_NETLINK_TX_RING(r1, 0x10e, 0xc, &(0x7f0000000200)={0x7ff}, 0x111) write(r0, &(0x7f00000004c0)="1c0000001a009b8a14e5f46b000000ff00000000fd02000000020000", 0x1c) 01:42:32 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) setsockopt$TIPC_GROUP_JOIN(r10, 0x10f, 0x87, &(0x7f0000000480)={0x43, 0x4}, 0x10) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:32 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {0x0, 0x0, 0x0, 0x4}, {}, 0x0, 0x3507, 0x2, 0x3}, [@algo_crypt={0xfffffffffffffcaa, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:32 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000080)=0x100000000) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) pipe(&(0x7f00000000c0)) [ 667.755653][T11721] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. 01:42:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:32 executing program 3: r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$TIOCSSERIAL(r0, 0x541f, &(0x7f0000000000)={0x3, 0x977, 0x800, 0x1, 0x8, 0x1, 0x7fff, 0x65eb, 0x80000001, 0x2, 0x8, 0x400, 0x3, 0x400, &(0x7f0000000200)=""/247, 0x3, 0x1, 0x1}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="3801000010001307000000001c03428db63efe8700000000e00700020000000000000080000000000000000000000700000000000000000000e3ffffff00a1ccce93ff0000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0006000000000000000ffffffffffff000000003200000000000000000000000000ffff00000000000000000000000000000000000000000300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c2900"/240], 0x138}}, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0xfffffffffffffff8, 0x200) r3 = socket$inet(0x2, 0x4000000805, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = dup3(r3, r4, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r5, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r4, &(0x7f00003cef9f)='7', 0x1, 0x0, &(0x7f0000618000)={0x2, 0x4e20, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f000025e000)=ANY=[@ANYBLOB=']\x00\x00\x00', @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r5, 0x84, 0x66, &(0x7f000059aff8)={r6}, &(0x7f000034f000)=0x8) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000300)={0x0, 0x0, 0x100000000, 0x2}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000100)={r6, 0x2, 0x4, 0x8, 0x6, 0x3}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r2, 0x84, 0x71, &(0x7f0000000180)={r7, 0x788}, 0x8) [ 667.879129][T11622] device nr0 entered promiscuous mode 01:42:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$caif_stream(0x25, 0x1, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00', 0x4000}, 0xfffffe97) ioctl$VIDIOC_ENUMAUDOUT(0xffffffffffffffff, 0xc0345642, &(0x7f0000000480)={0x1, "bdb84808c6ee7e0aaa93580a141f7d1ad7b42ff528a5fd8e6cc150db2dc9211c", 0x5, 0x1}) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:33 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x9fc, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0x8}}, 0x20) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000d80), 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x129200, 0x0) fstat(r0, &(0x7f0000000200)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x7fff, 0x401, 0x4, 0x0, 0x5}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net\x00') fstat(r1, &(0x7f00000022c0)) r2 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x0, 0x2) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000000)=""/1) mmap$usbfs(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x100010, r0, 0x0) unshare(0x40000000) [ 668.030979][T11756] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. [ 668.128382][T11756] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. 01:42:33 executing program 3: sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:33 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$P9_RLOCK(r3, &(0x7f0000000080)={0x8, 0x35, 0x2, 0x3}, 0x8) read(r0, &(0x7f0000000100)=""/71, 0x47) [ 668.303700][T11842] IPVS: ftp: loaded support on port[0] = 21 01:42:33 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="63867a8ecb94fca4a6e7cf47ce070000c52683"], 0x90ad) 01:42:33 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000480)={0x0}, &(0x7f00000004c0)=0xc) clone3(&(0x7f00000006c0)={0x30800000, &(0x7f0000000500)=0xffffffffffffffff, &(0x7f0000000540)=0x0, &(0x7f0000000580), 0x7, 0x0, &(0x7f00000005c0)=""/43, 0x2b, &(0x7f0000000600)=""/172}, 0x40) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) kcmp(r4, r6, 0x2, r5, r5) r9 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r9, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r10 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r10, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r9, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) r12 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r12, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r9, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:33 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000024c0)=ANY=[@ANYBLOB="38010000100013070000000000000000e000000200"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0006000000000000000ffffffffffff000000003200000000000000000000000000ffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000030000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c2900"/241], 0x138}}, 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x3ff, 0x101201) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0xe6ae, 0x8, 0x0, 0x4}, &(0x7f0000000100)=0x10) ioctl$KVM_CREATE_DEVICE(r1, 0xc00caee0, &(0x7f0000000140)={0x6, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KVM_SET_NESTED_STATE(r5, 0x4080aebf, &(0x7f0000000340)={0x1984e4574e032969, 0x0, 0x2080, {0xd000, 0x0, 0x2}, [], "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", "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"}) ioctl$int_in(r2, 0x5452, &(0x7f0000000180)=0x400) r6 = syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x101, 0x100) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f00000023c0)=ANY=[], 0x0) 01:42:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:34 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r3, 0x84, 0x6e, &(0x7f00000001c0)=[@in={0x2, 0x4e20, @empty}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x1a}, 0x3ff}, @in={0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e23, 0x3aad, @mcast2}, @in={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6={0xa, 0x4e21, 0x1000, @local, 0xedf}, @in={0x2, 0x4e24, @local}, @in6={0xa, 0x4e23, 0x1, @loopback, 0x200}, @in6={0xa, 0x4, 0x4, @mcast1, 0x5}], 0xdc) read(r0, &(0x7f0000000100)=""/71, 0x47) [ 669.020156][T11963] netlink: 72 bytes leftover after parsing attributes in process `syz-executor.3'. [ 669.104664][T11966] device nr0 entered promiscuous mode 01:42:34 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x9fc, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0x8}}, 0x20) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000d80), 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x129200, 0x0) fstat(r0, &(0x7f0000000200)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x7fff, 0x401, 0x4, 0x0, 0x5}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net\x00') fstat(r1, &(0x7f00000022c0)) r2 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x0, 0x2) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000000)=""/1) mmap$usbfs(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x100010, r0, 0x0) unshare(0x40000000) 01:42:34 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-control\x00', 0x20100, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") dup2(r5, r8) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:34 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) rt_sigsuspend(&(0x7f0000000000)={0x100000000}, 0x8) [ 669.387404][T11981] IPVS: ftp: loaded support on port[0] = 21 01:42:34 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x1005, 0x0) ioctl$MON_IOCT_RING_SIZE(r0, 0x9204, 0x1ba33) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:42:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:34 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) setsockopt$sock_int(r3, 0x1, 0x0, &(0x7f0000000480)=0x9, 0x4) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) ioctl$VIDIOC_LOG_STATUS(r8, 0x5646, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r10, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 669.839272][T11972] device nr0 entered promiscuous mode 01:42:35 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x9fc, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0x8}}, 0x20) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000d80), 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x129200, 0x0) fstat(r0, &(0x7f0000000200)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x7fff, 0x401, 0x4, 0x0, 0x5}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net\x00') fstat(r1, &(0x7f00000022c0)) r2 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x0, 0x2) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000000)=""/1) mmap$usbfs(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x100010, r0, 0x0) unshare(0x40000000) 01:42:35 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r2, 0x80104592, &(0x7f0000000480)={0x1, 0xf1ad164945b8c2bb, &(0x7f00000004c0)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:35 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/infiniband/rdma_cm\x00', 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r5, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND(r5, &(0x7f00000000c0)={0x14, 0x88, 0xfa00, {r6, 0x30, 0x0, @ib={0x1b, 0x0, 0x0, {"00000000000000000000000000000001"}}}}, 0x90) write$RDMA_USER_CM_CMD_QUERY_ROUTE(r4, &(0x7f00000000c0)={0x5, 0x10, 0xfa00, {&(0x7f00000005c0), r6}}, 0x18) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = fcntl$dupfd(r8, 0x0, r7) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x1000}) r10 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="004f5b4af0e3"], 0x90ad) [ 670.364911][T12111] IPVS: ftp: loaded support on port[0] = 21 01:42:35 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946d507daea1c09fc1fe6c", 0xf}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) r3 = add_key$keyring(&(0x7f0000000980)='keyring\x00', &(0x7f0000000140)={'syz'}, 0x0, 0x0, 0xfffffffffffffffc) r4 = add_key(&(0x7f0000000940)='big_key\x00', &(0x7f00000000c0)={'\xff\xff\xff'}, &(0x7f0000000a00)="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", 0x309, r3) keyctl$read(0xb, r4, &(0x7f0000005340)=""/4096, 0xffffffffffffffc2) keyctl$KEYCTL_PKEY_SIGN(0x1b, &(0x7f0000000000)={r4, 0x96, 0x1e}, &(0x7f00000002c0)={'enc=', 'oaep', ' hash=', {'rmd160-generic\x00'}}, &(0x7f0000000340)="4ca96324ff97e188c51e376c114886451fc2680a3b07c606bedaa0760784e726f00c9ca4efbdc6b6fcb69af4456ddb15b23460a0eb3c3f0eb3302c75a5992fb5b137694ff2fcbf7aaea9d4c017386c8e05ada09055cb5938382f8f70488aec420d7e43ab8676b20668b9c3cf4b99e6a967a31a1f128ca82e2f76b58a34f0ebb65eddcf13246c20e9061b497ffae70033fafae71375b0", &(0x7f0000000100)=""/30) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00'], 0x90ad) 01:42:35 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r4 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$EVIOCGMASK(r4, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r5 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r5, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r6, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r5, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) getsockopt$inet_opts(r2, 0x0, 0xd, &(0x7f00000006c0)=""/167, &(0x7f00000001c0)=0xa7) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_GET_EVENT(r10, &(0x7f0000000600)={0xc, 0x8, 0xfa00, {&(0x7f0000000480)}}, 0x10) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r11 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r11, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r3, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r5, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f0000000680)=0x8) 01:42:35 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4d) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000600)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000640)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000680)={r4, 0x3}, &(0x7f00000006c0)=0x8) ioctl(r2, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") fcntl$getown(r2, 0x9) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f00000000c0)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x20, r5, 0x813, 0x0, 0x0, {0xb}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x10'}]}]}, 0x20}}, 0x0) sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000040)={&(0x7f0000000700)={0x134, r5, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_ADDR={0x5, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x400}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xf31a}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x6}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x24, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3b637987}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_NET={0x24, 0x7, [@TIPC_NLA_NET_ID={0xfffffffffffffdc9, 0x1, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x83}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}]}, @TIPC_NLA_BEARER={0xa4, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0xdf8, @rand_addr="c0e4eaf3f356f7baf2f23005297e737f", 0x4}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xd31, @loopback, 0x8d33}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3310}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x238, 0x1, @in={0x2, 0x4e20, @empty}}, {0x14, 0x2, @in6={0xa, 0x4e20, 0xffffffff, @empty, 0x10001}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x40}, 0x4000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000480)='TIPCv2\x00') sendmsg$TIPC_NL_MEDIA_SET(r8, &(0x7f00000005c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x20002000}, 0xc, &(0x7f0000000580)={&(0x7f00000004c0)={0x8c, r9, 0x4, 0x70bd26, 0x25dfdbfd, {}, [@TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0xbc}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xffff7fff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x762}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7fff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x101}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x2}]}, @TIPC_NLA_MON={0x1c, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x5e}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xc10}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7b}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40}, 0x4000040) 01:42:35 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 01:42:36 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) [ 671.097611][T12262] device nr0 entered promiscuous mode 01:42:36 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x9fc, 0x0) r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0), 0x106, 0x8}}, 0x20) write$UHID_DESTROY(0xffffffffffffffff, &(0x7f0000000d80), 0x4) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net\x00') openat$userio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/userio\x00', 0x129200, 0x0) fstat(r0, &(0x7f0000000200)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000080)={0x7fff, 0x401, 0x4, 0x0, 0x5}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net\x00') fstat(r1, &(0x7f00000022c0)) r2 = syz_open_dev$radio(&(0x7f0000000180)='/dev/radio#\x00', 0x0, 0x2) ioctl$EVIOCGMTSLOTS(r2, 0x8040450a, &(0x7f0000000000)=""/1) mmap$usbfs(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x100010, r0, 0x0) unshare(0x40000000) 01:42:36 executing program 3: syslog(0x9, &(0x7f0000000340)=""/222, 0xde) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 01:42:36 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 671.436103][T12320] IPVS: ftp: loaded support on port[0] = 21 01:42:36 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000000)) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}}, {@in6=@initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x0, 0x32}, @in6=@ipv4, {0x0, 0x0, 0x0, 0x0, 0x100000000000}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:36 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 01:42:36 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) r6 = syz_open_dev$swradio(&(0x7f0000000480)='/dev/swradio#\x00', 0x0, 0x2) ioctl$VIDIOC_S_CTRL(r6, 0xc008561c, &(0x7f00000004c0)={0x6, 0x7}) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) syz_open_dev$cec(&(0x7f0000000640)='/dev/cec#\x00', 0x1, 0x2) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r8, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) getsockopt$IP6T_SO_GET_ENTRIES(r3, 0x29, 0x41, &(0x7f0000000500)=ANY=[@ANYBLOB="6e617400000000000000000000007f9e00000000000000000000000000000000d9000000179f63508dcde270dd0f6b72bec245967580f28cdeed910503a810fe3028925b5f3adda13912b351061964d002cac9cfe4ac90d1bf6e47220077a909360e9076cca166184dcf5fe467dd77619e49f145c5d98662ac4f2086a39cd924f98ca60a34715b6020e20997ed47d89ed51dec2f4794223418d5190d2a032558ff420f3340bbb743ac7403242088ce2898549fbe931220189d35a85c9de98fe66bdd098bc7ebb100e54068698886a6e09b7a442dd47d119f82d868e2ea1c603e58e39aede6ae8042230246ff6c8c8779bcff5423894a6ec0d883a7a743"], &(0x7f0000000600)=0xfd) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 672.171384][T12262] device nr0 entered promiscuous mode 01:42:37 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}, 0x86c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f0000000200)=0xfffffffffffffe31) 01:42:37 executing program 0: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2c482534dfcfe540abbc0a5eae44505f90c42f403f039889572de22f9c124ba306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7143cb6e23e71580f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de7bc9122c708e7d42b21e9506253245f5ec18acd62abfbc80926ccb"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000480)='/dev/dlm-control\x00', 0x20100, 0x0) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) r8 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r8, 0x1000008912, &(0x7f0000000000)="0800b5055e0bcfe87b0071") dup2(r5, r8) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) 01:42:37 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:42:37 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000040)=0x6, 0x4) socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="38010000100013070000000000000000e000000200"/64, @ANYRES32=0x0, @ANYRESOCT=0x0, @ANYBLOB="f0006000000000000000ffffffffffff000000003200000000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c29000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e8"], 0x4}}, 0x0) 01:42:37 executing program 2 (fault-call:6 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:37 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="006386dd074ac630831329c49bfa0a6e92673f517a54d7a056a6ed9bc90a5f4c216238ef9dcbf11a5f7797819b5174cf7c947883b22310926aac408f72d0da0d1a55a6f9d7d0a10bee71549d1f"], 0x90ad) r3 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r3, 0x4d) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@ipv4={[], [], @dev}, @in=@local}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) [ 672.601881][T12442] device nr0 entered promiscuous mode 01:42:37 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r3, &(0x7f0000000080)={0x7, 0x8, 0xfa00, {r4, 0x7fffffff}}, 0x10) 01:42:37 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x4e20, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xa, 0x3, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000f3ff95000000000000001739f486a0ef063f58e57c4f3c167972fc5489a4ef75c6020d447d9d0070d52bafd9c4365dde393bbfcb8129a6ef0ba516b4f002e9e67ef97a9029fd336949c2aba9c74e66b880084c49dc9d0654d6538094d26a9eac4bee05438afb2c0c710cdaee6d1639c8a46f7f20161953d412002048bf8f117b054e35b249bdca000c81d6ddd903a3083406d3746b10dd8184a31d"], &(0x7f00002bf000)='syzkaller\x00', 0x4, 0x436, &(0x7f0000000040)=""/183, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff2d}, 0x48) r2 = socket$kcm(0x29, 0x1000000000002, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f000031aff8)={r0, r1}) sendmmsg$inet(r2, &(0x7f0000000e80)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000040)="b7", 0x1}], 0x1, 0x0, 0x0, 0x3}}, {{0x0, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000540)='Z', 0x100000}], 0x1}}], 0x184, 0x0) 01:42:37 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_G_DV_TIMINGS(r2, 0xc0845658, &(0x7f0000000380)={0x0, @bt={0x40, 0x7, 0x2, 0x1, 0x8, 0xfffffc01, 0x1ff, 0x10000, 0x3, 0x4436, 0xeb8, 0x7fffffff, 0x200, 0x3ff, 0x1b, 0x2}}) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) syz_genetlink_get_family_id$net_dm(&(0x7f0000000080)='NET_DM\x00') socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCSETS(r6, 0x5402, &(0x7f0000000040)={0xc23, 0x1, 0xfffffffd, 0x3, 0xa, 0x7, 0x1, 0x1, 0x7ff, 0x9, 0x3, 0x20}) ioctl$KVM_SET_REGS(r3, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r3, 0xae80, 0x0) 01:42:37 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket$inet(0x2, 0x4000000805, 0x0) r6 = socket$inet_sctp(0x2, 0x5, 0x84) r7 = dup3(r5, r6, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r6, 0x84, 0x64, &(0x7f0000d6cff0)=[@in={0x2, 0x4e20, @loopback}], 0x10) sendto$inet(r7, &(0x7f0000fa3fff)='\t', 0x1, 0x0, &(0x7f00006f7000)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) sendto$inet(r6, &(0x7f0000000380)='7', 0xffffffffffffff98, 0x50526faeaa078f1a, &(0x7f0000618000)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x1d, &(0x7f00000003c0)=ANY=[@ANYBLOB="00000000000000090200000046a6efef7288607566e7dc", @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000a8a000)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r7, 0x84, 0x66, &(0x7f000059aff8)={r8}, &(0x7f000034f000)=0x236) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000240)={r8, 0x5, 0x10, 0x6, 0x3}, &(0x7f0000000300)=0x18) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000340)={r9, 0x3, 0x30}, 0xc) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r10, 0x6, 0x1f, &(0x7f0000000480)='tls\x00', 0x4) r12 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) ioctl$EVIOCGMASK(r12, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r13 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r13, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(0xffffffffffffffff, 0x8108551b, &(0x7f0000000600)={0x2, 0x2, "65e5e9a27084e59c08c6b7c53cae931e35305a19df2d482534dfcfe540abbc0a5eae44505f90c42f403f03a306e0ec104e637c30b8ad3d69a4a4f11d50ba7f623fd9d2281d94c04d25b2b4439c195c642d4cdfcb9be39a9fcc88099ddb181bb02c60de9f896ce5da4ac298e33b18aacba71c7180f9aa493befcb43a87513b1b6e8cfec0133881793bd4b51c4d578a533f58e793d79697fe89ef3f890fc24e1bcf2e4e8af60ebfdb66e4484e5543731afb0e58cc512360467ae7688f054af1d51a78462890115ae3cec8840220574fca54bed442005de55eb1f445d7f7fe8b21e9506253245f5ec18acd6aabfbc80926ccb00"}) setsockopt$kcm_KCM_RECV_DISABLE(r13, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) r15 = socket(0xa, 0x9f8f7d9b83c1926f, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r15, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r11, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r13, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) [ 672.810490][T12508] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. 01:42:38 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1005, 0x0) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) r5 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000200)="1b0000001c008105e00f80ecdb4cb9f207c804a067000000880305", 0x1b}], 0x1}, 0x0) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000080)=[r4, r0, 0xffffffffffffffff, 0xffffffffffffffff, r5], 0x5) ioctl$int_in(r0, 0x800060c0045006, &(0x7f0000000180)=0x100000035) read(r0, &(0x7f0000000100)=""/71, 0x47) 01:42:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {0x4}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0xfd7ccc1bc2747090) [ 673.092888][T12442] device nr0 entered promiscuous mode 01:42:38 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400)='/dev/net/tun\x00', 0x2, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f0000000200)=0xa7) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="e27a306dc7451ff3af3a07"], 0x90ad) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000000)={0x0, 0x20}, 0x8) 01:42:38 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000200)=ANY=[@ANYBLOB="120100007cd3030847050102d54f00010001090212000100000000090444000062a70500960c00c507193224a478f0254203b7e86c9a4da05a4b8f1e7a4e059e66cb160124467524fe6b0f3703b62cf23b1688854c47c64f8ef71fc300beab1b75492eaf52ed09a66d7cb9d2210dec29446b7a8d187493ffdbdb67d4a50e61b150668c3bc2ce58030122e0516b3ff3299fd19ff1140bc5e04627057650d15873cea22c33d091f16f7815db37e9a8ef3a968d22fc56f260c607b15eb395a5d04cb326b745a4c576218a51753327a7200a7008b9295e70a069fadb631974d1fb124bccbca017d7bfc1a533b8af28c9e561605d3a926670634c3774decb7ecb40e1b16607051a1ac2de79b13f7f52bbcba0bed5481bb08ee2a32ee2f32c81f0d7c8172d0e"], 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) setsockopt$inet_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0x4) r3 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMASK(r3, 0x80104592, &(0x7f0000000100)={0x1, 0xfffffffffffffcdf, &(0x7f0000000080)="6350d421"}) r4 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r4, 0x0, 0x48b, &(0x7f0000000000)={0x2, 'veth1_to_team\x00'}, 0x18) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x200000, 0x0) ioctl$USBDEVFS_DISCONNECT_CLAIM(r5, 0x8108551b, &(0x7f0000000300)={0x0, 0x2, "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"}) setsockopt$kcm_KCM_RECV_DISABLE(r4, 0x119, 0x1, &(0x7f0000000040)=0x40, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$KVM_KVMCLOCK_CTRL(0xffffffffffffffff, 0xaead) r7 = socket(0xa, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STOPDAEMON(r7, 0x0, 0x48c, &(0x7f00000000c0)={0x100000000002, '\x00\x00\x00\x00\x00\x00\xfd\xff\xff\x00\x00\x00\x00\xff\b\x00'}, 0xfffffdab) setsockopt$RDS_FREE_MR(r2, 0x114, 0x3, &(0x7f0000000440)={{0xc16, 0x2}, 0x9}, 0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r4, 0x84, 0x14, &(0x7f0000000180)=@assoc_value, &(0x7f00000001c0)=0x8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) recvfrom$rxrpc(r10, &(0x7f0000000480)=""/200, 0xc8, 0x10020, &(0x7f0000000580)=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e24, 0xf01b, @empty, 0x1000}}, 0x24) 01:42:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x4001, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x80800, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x8000000000000, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x12000, 0x40306}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vga_arbiter\x00', 0x400, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r5, &(0x7f0000000380)="d5902dc2ee8ad399891f62defece7df8b7025cc2a4234a22caa953cec227965f31ed46e2bd13d0e81f257db82cb4a3cb5efdfe3ba330b6aea3a38fade93e1795c813cec1e77c223495be44837ffef422a83653500323825cb98f0bf7ae25eb18f6404b484a5e2bd787d72f4f9d68f79bf2068999619e9eab564470eade1abb485bc3ca79fcf0b2b83766", &(0x7f0000000440)=""/243, 0x2}, 0x20) r6 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$tun(r6, &(0x7f0000000040)={@void, @val={0x1, 0x1, 0x2, 0x9, 0x40, 0x5}, @llc={@snap={0xaa, 0xaa, 'X', "6fee79", 0x1, "ecc0d2dc11da27070c0417e4c2061a849019147d6dd32fd18350027bf4538635589b8b73b8d1faad1a559c24260d60dd0e43a5a05041446c49"}}}, 0x4b) ioctl$KVM_RUN(r2, 0xae80, 0x0) 01:42:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$vsock_dgram(0x28, 0x2, 0x0) getsockopt$sock_timeval(r3, 0x1, 0x15, &(0x7f0000000040), &(0x7f0000000080)=0x10) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$HIDIOCAPPLICATION(r7, 0x4802, 0x6) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = fcntl$dupfd(r9, 0x0, r8) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) getsockname$packet(r10, &(0x7f0000000480)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) r12 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r13 = socket$inet6(0xa, 0x6, 0x0) bind$inet6(r13, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) listen(r13, 0x4d) r14 = socket$inet6_dccp(0xa, 0x6, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r14, 0x29, 0x23, &(0x7f0000000740)={{{@in6=@mcast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r12, 0x29, 0x22, &(0x7f0000000440)={{{@in6=@loopback, @in6=@mcast2, 0x4e23, 0x0, 0x4e23, 0x0, 0xa, 0xa0, 0x0, 0xc, 0x0, r15}, {0x80000000, 0x51, 0x9, 0x5, 0x8, 0x7ff, 0x0, 0x8}, {0xffffffffffffff81, 0x7, 0xfffffffffffffff8, 0xfffffffffffffffb}, 0x3f, 0x0, 0x4, 0x0, 0x1}, {{@in=@multicast2, 0x4d2, 0x51}, 0x2, @in6=@empty, 0x34ff, 0x2, 0x1, 0x0, 0x1, 0x7fff, 0xb1}}, 0xe8) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r18 = fcntl$dupfd(r17, 0x0, r16) ioctl$PERF_EVENT_IOC_ENABLE(r18, 0x8912, 0x400200) connect$netlink(r18, &(0x7f0000000100)=@kern={0x10, 0x0, 0x0, 0x1000}, 0xc) sendmsg$nl_xfrm(r4, &(0x7f0000000700)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4050800}, 0xc, &(0x7f00000006c0)={&(0x7f0000000500)=@getae={0x1ac, 0x1f, 0x100, 0x70bd2d, 0x25dfdbff, {{@in=@empty, 0x4d6, 0xa, 0x2b}, @in=@local, 0x1}, [@user_kmaddress={0x2c, 0x13, {@in6=@empty, @in6=@loopback, 0x0, 0x2}}, @output_mark={0x8, 0x1d, 0x1a5c}, @srcaddr={0x14, 0xd, @in6=@mcast2}, @user_kmaddress={0x2c, 0x13, {@in6=@rand_addr="b3fba421dbcb6e24f3fcdeb45e95e527", @in=@broadcast, 0x0, 0xa}}, @ipv6_hthresh={0x8, 0x4, {0xf, 0x9}}, @policy_type={0xc, 0x10, {0x1}}, @sa={0xe4, 0x6, {{@in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@rand_addr="9599f7d538e216939fc7d999cbebc5ee", 0x4e21, 0xfffb, 0x4e23, 0x8000, 0x3, 0xb0, 0x0, 0x2b, r11, r15}, {@in=@loopback, 0x4d5}, @in=@multicast1, {0x6, 0x6, 0x8, 0x8, 0x101, 0x253, 0x3, 0x4}, {0x8000, 0x6, 0x2, 0x8}, {0x8, 0x9, 0x2}, 0x70bd28, 0x3504, 0xa, 0x6, 0x5, 0x40}}]}, 0x1ac}, 0x1, 0x0, 0x0, 0x80045}, 0x24004004) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="38010000100013070000000000000000e000000200000000000000000000000800003fd92114000021f724e8000000000000ba51044400"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="f0006000000000000000ffffffffffff000000003200000000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000000000000000000048000200656362286369706865725f6e756c6c2900"/240], 0x138}}, 0x0) 01:42:38 executing program 5: syz_usb_ep_write(0xffffffffffffffff, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$DRM_IOCTL_WAIT_VBLANK(r2, 0xc018643a, &(0x7f00000002c0)={0x1, 0xff, 0x15}) r3 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x14, 0x4, @tid=r3}, &(0x7f0000044000)) ptrace$getregset(0x4204, r3, 0x1, &(0x7f0000000000)={&(0x7f00000001c0)=""/84, 0x54}) poll(&(0x7f0000000040)=[{}], 0x1, 0x0) r4 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x422800, 0x0) tee(0xffffffffffffffff, r4, 0x2e, 0x4) read$alg(r4, &(0x7f0000000240)=""/81, 0x51) r5 = openat$vimc2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/video2\x00', 0x2, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = fcntl$dupfd(r7, 0x0, r6) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RAUTH(r8, &(0x7f0000000300)={0x14, 0x67, 0x2, {0x2a, 0x2, 0x4}}, 0x14) ioctl$int_in(r5, 0x2a29, &(0x7f0000000180)=0x2) read(0xffffffffffffffff, &(0x7f0000000100)=""/71, 0x47) prctl$PR_GET_CHILD_SUBREAPER(0x25) 01:42:38 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f00000001c0)={0x79}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x0, 0x0, 0x1e, 0x0, 0xfffefffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1ffffffffffffffe], 0x2000, 0x206}) r3 = socket$rxrpc(0x21, 0x2, 0x2) fsetxattr$trusted_overlay_nlink(r3, &(0x7f0000000040)='trusted.overlay.nlink\x00', &(0x7f0000000080)={'U+', 0xfffffffffffffc00}, 0x28, 0x1) ioctl$KVM_GET_XCRS(r2, 0x8188aea6, &(0x7f0000000100)=ANY=[@ANYBLOB="06000000000800006eb30000000000000600000000000000010400400000000000100000000000000900000000000000f9ffffffffffffffffff00000000000000000080000000000001000000001f0002000000000000000200000000000004000000177b000000"]) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$ASHMEM_GET_NAME(0xffffffffffffffff, 0x81007702, &(0x7f0000000240)=""/104) ioctl$KVM_RUN(r2, 0xae80, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TIOCGPGRP(r6, 0x540f, &(0x7f0000000180)) 01:42:38 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000040)='/dev/nullb0\x00', 0x100c0, 0x0) ioctl$IOC_PR_REGISTER(r3, 0x401870c8, &(0x7f0000000080)={0x1f, 0xa16, 0x1}) r4 = fcntl$dupfd(r2, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$ASHMEM_GET_PROT_MASK(r4, 0x7706, &(0x7f0000000000)) [ 673.595208][T12680] device nr0 entered promiscuous mode 01:42:38 executing program 0: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x802, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x181200, 0x0) ioctl$USBDEVFS_RESETEP(r0, 0x80045503, &(0x7f0000000040)={0x1}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x8, 0x4, &(0x7f00000012c0)=ANY=[@ANYBLOB="1860e533ace0379db25b784a00000000000000000000000000000061116000001fffff0000000000009d55408f2a0a06aa3ea4e1347ce4013e78c3e88b5eaef5b8d92d9fc36b357647a6ad6aa7200950394aaf62b208e2f5d311108ee64f99c2253c84ab3cf566403782fbbe0efa5ccdb3af2e3b454617f99650359346aac6b87c7a0399e035337e421048b8482a23f35842c122d5f079953b5fd1ae75b98ed5fc1e13"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x622, &(0x7f0000000200)=""/4096, 0x0, 0x0, [], 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x70) [ 673.777402][T12230] usb 2-1: new high-speed USB device number 29 using dummy_hcd 01:42:38 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/snapshot\x00', 0x103003, 0x0) membarrier(0x17, 0x0) [ 673.930549][T12680] device nr0 entered promiscuous mode 01:42:39 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6=@loopback}}, &(0x7f0000000000)=0xe8) sendmsg$nl_xfrm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x800, 0x0, 0x0, {{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @local}, 0x0, 0x32}, @in6=@ipv4, {0x0, 0x0, 0x20000}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) [ 674.023460][T12230] usb 2-1: Using ep0 maxpacket: 8 01:42:39 executing program 3: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$DRM_IOCTL_RES_CTX(r5, 0xc0106426, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0x0}, {}]}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r2, 0xc010641d, &(0x7f0000000100)={r6, &(0x7f0000000340)=""/4096}) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/current\x00', 0x2, 0x0) sendmsg$nl_xfrm(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=@newsa={0x138, 0x10, 0x713, 0x0, 0x0, {{@in=@multicast2}, {@in6=@ipv4={[0xfffffff0, 0x0, 0x60], [], @broadcast}, 0x0, 0x32}, @in6=@ipv4, {}, {}, {}, 0x0, 0x0, 0x2}, [@algo_crypt={0x48, 0x2, {{'ecb(cipher_null)\x00'}}}]}, 0x138}}, 0x0) 01:42:39 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_ENABLE_CAP(r1, 0x4068aea3, &(0x7f0000000240)={0x0, 0x0, [0x0, 0x0, 0xaeb8]}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) r3 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) accept$packet(r6, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000140)=0x14) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r9, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000003c0)=@newlink={0x40, 0x10, 0x705, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x20, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0x14, 0x2, [@IFLA_IPTUN_FLAGS={0x8, 0xa}, @tunl_policy=[@IFLA_IPTUN_LINK={0x8, 0x2, r10}]]}}}]}, 0x40}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@can_newroute={0x3c, 0x18, 0x10, 0x70bd27, 0x25dfdbfe, {0x1d, 0x1, 0x4}, [@CGW_DST_IF={0x8, 0xa, r7}, @CGW_MOD_XOR={0x18, 0x3, {{{0x3, 0x1, 0x0, 0x1}, 0x3, 0x5, 0x0, 0x0, "4de599a1fd098dc9"}}}, @CGW_DST_IF={0x8, 0xa, r10}]}, 0x3c}}, 0x40010) ioctl$KVM_SET_REGS(r2, 0x4090ae82, &(0x7f00000002c0)={[0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff], 0x0, 0x206}) ioctl$KVM_GET_VCPU_EVENTS(r2, 0x4400ae8f, &(0x7f00000000c0)) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 674.142894][T12230] usb 2-1: config 0 has an invalid interface number: 68 but max is 0 [ 674.151162][T12230] usb 2-1: config 0 has no interface number 0 [ 674.232190][T12230] usb 2-1: New USB device found, idVendor=0547, idProduct=0201, bcdDevice=4f.d5 [ 674.241548][T12230] usb 2-1: New USB device strings: Mfr=0, Product=1, SerialNumber=0 [ 674.249691][T12230] usb 2-1: Product: syz [ 674.314006][T12230] usb 2-1: config 0 descriptor?? [ 674.356485][T12230] dvb-usb: found a 'Nebula Electronics uDigiTV DVB-T USB2.0)' in warm state. [ 674.406984][T12230] dvb-usb: will pass the complete MPEG2 transport stream to the software demuxer. [ 674.418441][T12816] netlink: 'syz-executor.2': attribute type 10 has an invalid length. [ 674.432698][T12230] dvbdev: DVB: registering new adapter (Nebula Electronics uDigiTV DVB-T USB2.0)) [ 674.442617][T12230] usb 2-1: media controller created 01:42:39 executing program 4: perf_event_open(&(0x7f0000000200)={0x0, 0x70, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000140)="40c74adc7724e27d876f441d952bf111375896d876c4ed0f2e703cd5f8b64ff3cd946b507daea1c09fc1fe6c"}, 0x20) r0 = socket$kcm(0x10, 0x4000000002, 0x10) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000400)="2e0000001900d927e65de0875f188dfa1ce154dfeaa06ec4a86e8f32e00586f900"/46, 0x2e}], 0x1}, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x4000, 0x0) recvmsg$kcm(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000580)=""/14, 0xe}], 0x1}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000280)={'nr0\x01\x00', 0x4009}) r1 = socket$kcm(0x29, 0x2, 0x0) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000200)=0xa7) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000100)=0xc) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f00000018c0)='nr0\x01\x00`\xa1\x9e\xf9\xd2\xc6s\xd9\xa1W\x1c\xb9\xe16\x9b\xcda\xef~Iy:\xe1\x87\x12\xec\xeb\x1d\xaav\x94\x97\x80\v\x7f\xbb\xd3[\x17\f\x10u\x1d9\xae\xb6`\xd8c\xe4\x9b\x8cO;=\xadH\x90+[-l\xfd\n\xbd7,c\xbc\xf5\xd7\a\xf3\xfdM.\x8dD<\x88\xbc\x0eV7\xdd\x82\xfc45\xbe\xd4\xde]i<\x9ax\x1c\x86>\x05\xd8\xa6\xf8h\x9a[\xe2\x92\x16\x06\x1f?\xf5?\x8bk9fx\xe7\xba\x15^\xf9\x15-~C\xb1\xec\xcb#1\xeb\x8e\xb1\xedU\x86\xdc\xf8\xb3\xb0\xb9\x996\x1aD\xff,\"\xc2\xab\xbe\xf4-\xd2N\xab\xe6r3F\xa6\xe4l\x04\x99\xa2\x14B\xd8\xd0\r\xcbW\xf0\x13\xffu\x95\xed\xd0\xff\ai0\xde6u\xd3A\x17\xa4N\xb0\xe4\xf82\x93m\xa4NW\xe4:>6\xbdH\xd2\xa8[\xf4\xfdJ\x80N\x83CZ\xf5\xe2\x87\xd4\xe2s7\xb4\xad\xa1\x1b&!\x98\x86\"R\x06\x00\x00\x00\x00\x00\x00\x00\x95\xfe7q\xe9\xf4,\xa3\x0f\xb2\x1e\x12\xf0\xa3\xd8\xbc-\x85EJ\xf9\xfc\xc0#-\x8f\xd9\tD\x8b\x01\xf4lY=1\xea\x1c\x92de\xe3ZA\x99\a\x9c<\xa4\x11(\xb1|\xb0\x1f\xbf[R+\xe0\xfd\x02\x02*\xda7\xfe\xcc\x0e\xb6\xc8\xc8\x83\x18\x83\xb8Z\x11\x06\xf2\xf8g\x02\rR\x9f\x17\xa3P\xf2\r\xd3\xbfQ\xa9\x8c\xfd\xa7\f.68\xa4\x83\xfd?\x87\x94\v\xb4x\xb0|L\x11\x03\x94\xc0\t=\x17\x95P\x89\xf2\xca\x97\xbb\xfeu\x12L\x9b\x85\x96\xe0\b\xbf\n\x02\x8bS\x9c\xecyl\xec\x9b\xf5\x85\xeb\x80\xfe>\r&\x014\x01\xf4\xb7\x83\x9a\xfa*\xa6\x06\xb7Pk7N\xc2\xd9\xee\xd0\xb0M\x00\xab\xc3\t\fc\xd8dx\xd5\x1dU*s)\x12[\x14\xb1\xc0\xd7\x1a\xa0\x16\xa2z\x9e\x93 \xddeF>29\v\x02\xa2b\x13R\xef\xffA,\xb9.$\xfa\x9f\xde[\x80\xd1=\xce\x1b\xeb\xf6\xf4\xe3z\x1f\x9dz\xa3\xc0\xe2\xa2\xb1\xeeq\xf5\xec0\x8e\xf4\xfb\xd9\x87\xf03\xdb\xae|\x10&V5c\xa6\xce\xcd\x8a\xdf\xe1\x89\"\xea\xde\xe7\xa3\xbe\xe7\xff\xf9 \x11\xfdY\xc6\xa1\xe8\xda\v\\?\xcb\x87\bn\x9b\x01\x1f\xf8\xe8\x1eV\xfaC\xdf\xc3Vv\x9b\x1a\xfc\x14.c\x94\xc9=\xb0\x0f!d\b\x18*@m\x7f\xaal\x17G\xd6?\x81\x16P\x03\x10e\xc3\xcd\xb1B\xeb\x01B\\\x91A\xa1\x8an\xb4#\xadr\x1e\x81v\xa2\x0e6x\xca\x8b\xa6\xd8\x81\x10:\x0e(\xdd\xfc\xc9\xc6\xb4\xf0\'f:\xbd\xfe\x11\xf8\xc8W\x81s^\xd9W\xf1\x94\xaf\xc5\x8a\xb4f\x1b\x17E\xb23\x12\xb0\xeb\xef\x8c\xb24h\xd7}\x7f\x92Hgej\x957\xe2A') perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0)={[{0x0, 'c\x86\xdd', 0x7}]}, 0x90ad) [ 674.586904][T12230] dvbdev: dvb_create_media_entity: media entity 'dvb-demux' registered. [ 674.676059][T12230] dvb-usb: bulk message failed: -22 (7/0) [ 674.682389][T12230] mt352_read_register: readreg error (reg=127, ret==0) [ 674.689430][T12230] dvb-usb: bulk message failed: -22 (7/0) [ 674.695358][T12230] dvb-usb: no frontend was attached by 'Nebula Electronics uDigiTV DVB-T USB2.0)' [ 674.746693][T12230] input: IR-receiver inside an USB DVB receiver as /devices/platform/dummy_hcd.1/usb2/2-1/input/input14 [ 674.763289][T12230] dvb-usb: schedule remote query interval to 1000 msecs. [ 674.770391][T12230] dvb-usb: Nebula Electronics uDigiTV DVB-T USB2.0) successfully initialized and connected. [ 674.781004][T12230] dvb-usb: bulk message failed: -22 (7/0) [ 674.786855][T12230] dvb-usb: bulk message failed: -22 (7/0) [ 675.771847][T12234] dvb-usb: bulk message failed: -22 (7/-30591) [ 675.778106][T12234] dvb-usb: bulk message failed: -22 (7/0) [ 675.783968][T12234] ===================================================== [ 675.790935][T12234] BUG: KMSAN: uninit-value in digitv_rc_query+0x76a/0x890 [ 675.798026][T12234] CPU: 0 PID: 12234 Comm: kworker/0:3 Not tainted 5.4.0-rc3+ #0 [ 675.805626][T12234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.815672][T12234] Workqueue: events legacy_dvb_usb_read_remote_control [ 675.822854][T12234] Call Trace: [ 675.826143][T12234] dump_stack+0x191/0x1f0 [ 675.830499][T12234] kmsan_report+0x14a/0x2f0 [ 675.834986][T12234] __msan_warning+0x73/0xf0 [ 675.839483][T12234] digitv_rc_query+0x76a/0x890 [ 675.844253][T12234] ? digitv_identify_state+0x150/0x150 [ 675.849692][T12234] legacy_dvb_usb_read_remote_control+0x106/0x790 [ 675.856088][T12234] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 675.861975][T12234] ? legacy_dvb_usb_setkeycode+0x7c0/0x7c0 [ 675.867783][T12234] process_one_work+0x1572/0x1ef0 [ 675.872807][T12234] worker_thread+0x111b/0x2460 [ 675.877564][T12234] kthread+0x4b5/0x4f0 [ 675.881616][T12234] ? process_one_work+0x1ef0/0x1ef0 [ 675.886817][T12234] ? kthread_blkcg+0xf0/0xf0 [ 675.891410][T12234] ret_from_fork+0x35/0x40 [ 675.895821][T12234] [ 675.898132][T12234] Local variable description: ----key@digitv_rc_query [ 675.904864][T12234] Variable was created at: [ 675.909268][T12234] digitv_rc_query+0x78/0x890 [ 675.913940][T12234] digitv_rc_query+0x78/0x890 [ 675.918603][T12234] ===================================================== [ 675.925510][T12234] Disabling lock debugging due to kernel taint [ 675.931649][T12234] Kernel panic - not syncing: panic_on_warn set ... [ 675.938242][T12234] CPU: 0 PID: 12234 Comm: kworker/0:3 Tainted: G B 5.4.0-rc3+ #0 [ 675.947248][T12234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 675.957304][T12234] Workqueue: events legacy_dvb_usb_read_remote_control [ 675.964133][T12234] Call Trace: [ 675.967409][T12234] dump_stack+0x191/0x1f0 [ 675.971738][T12234] panic+0x3c9/0xc1e [ 675.975643][T12234] kmsan_report+0x2e8/0x2f0 [ 675.980132][T12234] __msan_warning+0x73/0xf0 [ 675.984625][T12234] digitv_rc_query+0x76a/0x890 [ 675.989378][T12234] ? digitv_identify_state+0x150/0x150 [ 675.994862][T12234] legacy_dvb_usb_read_remote_control+0x106/0x790 [ 676.001261][T12234] ? kmsan_get_shadow_origin_ptr+0x91/0x4b0 [ 676.007137][T12234] ? legacy_dvb_usb_setkeycode+0x7c0/0x7c0 [ 676.012930][T12234] process_one_work+0x1572/0x1ef0 [ 676.017976][T12234] worker_thread+0x111b/0x2460 [ 676.022800][T12234] kthread+0x4b5/0x4f0 [ 676.026853][T12234] ? process_one_work+0x1ef0/0x1ef0 [ 676.032039][T12234] ? kthread_blkcg+0xf0/0xf0 [ 676.036607][T12234] ret_from_fork+0x35/0x40 [ 676.042381][T12234] Kernel Offset: disabled [ 676.046708][T12234] Rebooting in 86400 seconds..