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") 21:18:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0xffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000100)=0x10000, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r3, 0x29, 0x41, &(0x7f0000000140)=ANY=[@ANYBLOB="6e6174000000000000000000000000000000000000000000000900000000000003000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076fb77e100"], 0x58) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r2) 21:18:07 executing program 7: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x40000, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='status\x00') r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@local, @in6=@mcast2}}, {{@in6=@local}, 0x0, @in6=@remote}}, &(0x7f0000000280)=0xe8) accept4$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000300)=0x14, 0x800) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000380)={0x0, @dev, @multicast2}, &(0x7f00000003c0)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000400)={'bcsh0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000440)={{{@in, @in=@remote}}, {{@in6=@mcast2}, 0x0, @in6}}, &(0x7f0000000540)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000b00)={{{@in=@multicast2, @in6=@remote}}, {{@in=@loopback}, 0x0, @in=@multicast1}}, &(0x7f0000000c00)=0xe8) accept4$packet(r1, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000c80)=0x14, 0x800) getsockname$packet(r0, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000d00)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000d40)={{{@in=@rand_addr, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in6}}, &(0x7f0000000e40)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000e80)={{{@in6=@local, @in6=@dev}}, {{@in=@rand_addr}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000000f80)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000fc0)={{{@in=@broadcast, @in=@remote}}, {{@in=@local}, 0x0, @in6=@mcast2}}, &(0x7f00000010c0)=0xe8) getsockname$packet(r1, &(0x7f00000011c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001200)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000001240), &(0x7f0000001280)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000004380)={{{@in6=@mcast1, @in6=@loopback}}, {{@in=@multicast1}, 0x0, @in=@dev}}, &(0x7f00000012c0)=0xe8) accept$packet(r0, &(0x7f00000047c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000004800)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000004880)={{{@in6=@mcast2, @in6=@local}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @dev}}}, &(0x7f0000004980)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000049c0)={{{@in=@broadcast}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000004ac0)=0xfffffffffffffe3d) accept$packet(0xffffffffffffffff, &(0x7f0000004b80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000004bc0)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004c00)={{{@in=@remote, @in6=@mcast1}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000004d00)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000004d40)={{{@in=@remote, @in6=@dev}}, {{@in6=@ipv4={[], [], @remote}}, 0x0, @in6=@mcast1}}, &(0x7f0000004e40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000004e80)={{{@in=@dev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f0000004f80)=0xe8) accept4$packet(r0, &(0x7f0000006b40), &(0x7f0000006b80)=0x14, 0x0) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000007340)={&(0x7f0000000100), 0xc, &(0x7f0000007300)={&(0x7f0000006bc0)={0xec, r2, 0x20, 0x0, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x44, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xf645}}, {0x8}}}]}}, {{0x8, 0x1, r5}, {0x4}}]}, 0xec}, 0x1, 0x0, 0x0, 0x20000800}, 0x8010) readv(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000001300)=""/4096, 0x1000}], 0x1) readv(r1, &(0x7f0000000580), 0x3c1) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x7000000000000, 0x19}, {0x2, 0x9}, {0x8, 0x100000001}]}) readv(r1, &(0x7f0000000000), 0x0) [ 339.424459] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x2, 0x4880) write$FUSE_BMAP(r2, &(0x7f0000000100)={0x18, 0x0, 0x4, {0x6}}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 339.631610] device team0 entered promiscuous mode [ 339.636695] device team_slave_0 entered promiscuous mode [ 339.642491] device team_slave_1 entered promiscuous mode [ 339.678734] 8021q: adding VLAN 0 to HW filter on device team0 [ 339.697589] device team0 left promiscuous mode [ 339.702386] device team_slave_0 left promiscuous mode [ 339.707943] device team_slave_1 left promiscuous mode [ 339.764076] device team0 left promiscuous mode [ 339.768843] device team_slave_0 left promiscuous mode [ 339.774401] device team_slave_1 left promiscuous mode [ 339.781919] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000200)=0x8f) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:07 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x84) ioctl(r0, 0x8912, &(0x7f0000000000)="025cc80700145f8f764070") connect$inet6(r0, &(0x7f0000000180)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) sendmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="ba0200000000000000e99f7b05ad", 0xe}], 0x1, &(0x7f0000000100)}, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4000000000004e23, 0x7, @dev={0xfe, 0x80, [], 0x1e}, 0x8}, 0x1c) r1 = syz_open_dev$vcsa(&(0x7f0000000400)='/dev/vcsa#\x00', 0x1, 0x414000) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000440)={0x2, 0x200, 0x8200, 0x7fff, 0x3, 0x2, 0xff, 0x4, 0x0}, &(0x7f0000000480)=0x20) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000004c0)={r2, 0x80000000, 0x0, 0xa561, 0x1}, &(0x7f0000000500)=0x18) getpid() [ 339.831133] device team0 entered promiscuous mode [ 339.836220] device team_slave_0 entered promiscuous mode [ 339.842072] device team_slave_1 entered promiscuous mode [ 339.921928] 8021q: adding VLAN 0 to HW filter on device team0 [ 339.957614] device veth0_to_bridge entered promiscuous mode [ 339.965251] device team0 left promiscuous mode 21:18:07 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x400000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x88600001}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)={0x4c, r3, 0x420, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x38, 0x2, [@IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@remote}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xba}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x80}, 0x8000) listen(r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 339.970071] device team_slave_0 left promiscuous mode [ 339.975577] device team_slave_1 left promiscuous mode 21:18:08 executing program 2: socket$inet6(0xa, 0x1000003, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x0, 0x0) ioctl(r0, 0xbf5, &(0x7f00000000c0)="0a5cc80700315f85715070") flistxattr(r0, &(0x7f0000000080), 0x0) [ 340.086478] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:08 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000480), &(0x7f0000000280), &(0x7f00000005c0)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/userio\x00', 0x80000, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000540)={'vcan0\x00', 0x0}) recvfrom$packet(r0, &(0x7f0000000340)=""/109, 0x6d, 0x40000000, &(0x7f0000000580)={0x11, 0x10, r1, 0x1, 0x1, 0x6, @broadcast}, 0x14) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="005cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/userio\x00', 0x111000, 0x0) write$FUSE_BMAP(r3, &(0x7f0000000200)={0x18, 0xffffffffffffffda, 0x7, {0x1}}, 0x18) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x1000, 0x40000) write$P9_RWSTAT(r2, &(0x7f0000000100)={0x7, 0x7f, 0x1}, 0x7) ioctl$SCSI_IOCTL_GET_PCI(r2, 0x5387, &(0x7f0000000140)) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$usbmon(&(0x7f00000002c0)='/dev/usbmon#\x00', 0x0, 0x8000) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) getpeername(r3, &(0x7f0000000180)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f0000000200)=0x80) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000280)=0x2, 0x4) close(r1) 21:18:08 executing program 1: r0 = gettid() sched_setattr(r0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r1 = syz_open_dev$vcsa(&(0x7f0000000380)='/dev/vcsa#\x00', 0x2, 0x400000) ioctl$KDGKBLED(r1, 0x4b64, &(0x7f00000003c0)) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x100, 0x0) readahead(r2, 0x800, 0x7) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r3 = socket(0xd, 0xa, 0x3) syz_open_dev$sndtimer(&(0x7f0000000340)='/dev/snd/timer\x00', 0x0, 0x40) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000440)={"7465616d300000ffffffc000", 0x4bfd}) openat(r2, &(0x7f00000004c0)='./file0\x00', 0x84000, 0x80) r4 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x1, 0x0) r5 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x5, 0x1) ioctl$FUSE_DEV_IOC_CLONE(r4, 0x8004e500, &(0x7f00000001c0)=r5) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x2, {0x0, {0x0, 0x0, 0x2}}}, 0xa0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r5, 0x894b, &(0x7f0000000540)) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x80000, 0x0) epoll_wait(r1, &(0x7f0000000480)=[{}, {}], 0x2, 0x4) [ 340.413806] device veth0_to_bridge left promiscuous mode [ 340.424266] device team0 entered promiscuous mode [ 340.429239] device team_slave_0 entered promiscuous mode [ 340.435068] device team_slave_1 entered promiscuous mode [ 340.449448] 8021q: adding VLAN 0 to HW filter on device team0 [ 340.482560] device team0 left promiscuous mode [ 340.487333] device team_slave_0 left promiscuous mode [ 340.492878] device team_slave_1 left promiscuous mode [ 340.529093] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 340.539592] device team0 entered promiscuous mode [ 340.544618] device team_slave_0 entered promiscuous mode [ 340.550427] device team_slave_1 entered promiscuous mode 21:18:08 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f750800390005", 0x26) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x7, 0x8}) 21:18:08 executing program 7: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000001940)={'dummy0\x00', 0x0}) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="d9a0b8ffff0000db97"], &(0x7f0000000000)="6c016572000000000000", 0x0, 0xc3, &(0x7f0000009f3d)=""/195, 0x0, 0x0, [], r0}, 0x48) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") socket$packet(0x11, 0xaa260e1aeb7bd1fd, 0x300) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000dea2e391753d00000084000000000000003f0000000000000000000000000067fdfb2f000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x48) setsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x17, &(0x7f0000000100)="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", 0x1000) 21:18:08 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) accept(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x80) sendmsg$nl_netfilter(r0, &(0x7f00000014c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f0000001480)={&(0x7f0000001500)=ANY=[@ANYBLOB="3422001b412a0c00090601030000000000000000"], 0xf9}}, 0x4040881) 21:18:08 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000400)={'vcan0\x00', 0x0}) r2 = socket$xdp(0x2c, 0x3, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer\x00', 0x20200, 0x0) setsockopt$XDP_TX_RING(r2, 0x11b, 0x3, &(0x7f00000000c0)=0x2, 0x4) setsockopt$XDP_UMEM_REG(r2, 0x11b, 0x4, &(0x7f0000000080)={&(0x7f0000000000)=""/17, 0x10000, 0x1000}, 0x18) removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@random={'btrfs.', '\x00'}) syz_open_dev$sndctrl(&(0x7f0000000240)='/dev/snd/controlC#\x00', 0x2, 0x480) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000100)=0x8, 0x4) setsockopt$XDP_UMEM_COMPLETION_RING(r2, 0x11b, 0x6, &(0x7f00000002c0)=0x80, 0x4) bind$xdp(r2, &(0x7f0000000040)={0x2c, 0x2, r1}, 0x10) setsockopt$XDP_UMEM_FILL_RING(r2, 0x11b, 0x5, &(0x7f0000000140)=0xa000, 0x4) [ 340.574575] 8021q: adding VLAN 0 to HW filter on device team0 [ 340.590253] device team0 entered promiscuous mode [ 340.595431] device team_slave_0 entered promiscuous mode [ 340.602168] device team_slave_1 entered promiscuous mode 21:18:08 executing program 2: r0 = syz_open_dev$sndctrl(&(0x7f0000000040)='/dev/snd/controlC#\x00', 0xfffffffffffffffd, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000080)={0x5, 0x0, 0x0, 0x0, 'syz0\x00'}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x200000, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r1, 0x0, 0x41, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)=0x123) 21:18:08 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000002a40)) sendmsg(r0, &(0x7f0000000640)={&(0x7f00000001c0)=@sco={0x1f, {0x7, 0x64ef, 0x8000, 0x7ff, 0x8000}}, 0x80, &(0x7f0000000480)=[{&(0x7f0000000340)="c080a744355eb754d2eb0e2184c85fa44172aace7f97bf3c8064c8d0bf752bef44b83b1bdc2beb9291d0cd329dac7b486f89edabad5bac1329deb8fb8ef350eb49a91d5782ae85fc978daa09709bb463928d017760f37a16fdae51d70a87b5a96bd335846113782fe64a285f401db1a6e2ea379a5a731572e6254760b096ff7f0b30b7959c0a0a928607ed6e4b369b88adfd6f9d2a0c54b2a37c702fdf9643ebcc67d9a7e8bb1513a3557a1c29db2da58dad77e6c5ce15eacd32126f9cd82d757445aaa333d2192ece0d5037defdbbe183dc", 0xd2}, {&(0x7f0000000240)}, {&(0x7f0000000700)="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", 0x1000}, {&(0x7f0000000280)="da6c2109bd27", 0x6}, {&(0x7f0000000540)="1b7ea70f6d164f37c687840d5b2a53b139ce74e1cdf172c4247164527abb4de1e736d76d04e562c0936501119e1955ae6633d75719ba3c09c8e7d4bb4b0abbea279002ca6049e9fd3cfc5933f17db1669c8305a42dc17799db4ed2f59a069155b7c192d2333b1d0f570f6c17276265dde7d878431ac9ae380ed357a7fabf66f5da17e95f369e5faea02c164747b44c70262b34a7dba98c98e638cd59e4e0452f4329c1502df1678b398e2a28a7b055a2cd1074ef3ff502fed5fd33b5c1338530bbb093a918e41b024d818d3d4c33ecf24af4499aebaa63ff34a457c4635dbd3ac0d62f394aed94bffe", 0xe9}, {&(0x7f0000000440)='N', 0x1}], 0x6, &(0x7f0000001700)=[{0x20, 0x0, 0x2, "fb5346c28cda877e1bea56f5bdcdfdb9"}, {0xb8, 0x110, 0xffffffff7fffffff, "ef1dc5e0979dcbd9810e522355c932e4b941f8ede6b25e213929a48a8697ca9f017e6e28a09ee9fb47be50c3962dfd44a4d4c37abc0dc193f18684ce638212ef9389109f9624137e4029cb45673e150d25a279a7aa978833093f09e83f62204d5b0e6d348d2c21469602961e66bc64db702becd81dd3bfd09f609993ab4422b77b005bc6b446d8b51f021bfa1b4ac6a5040d06fa274e6c426fcc07e982a75c280360"}, {0xf8, 0x113, 0x8, "e66ec20bd29cdf20a8240d16cc5b27408da761cdc3f8f6f373aea95f144e2cd3e81d57b5f7ff72e0b5888e27c6059d077b41569909d01f4e2f87441b3bdc66d9bef5f276449a8d5600e06cca2947e347d950bd8644969463d2326b594d3ece657bf6d82b330787fba39b7c0c5fd0497d73cc7dd7c1fd65b4868779f5afa26c43dd48c3793eb3685e2f9888f2b58493d7cf9644837564997eca55292eca50186e6de9e22a225caad948651ea820d96b7c7d7f36b3f7db17143dcb1cfcdbadc58debd075398e5140702dc7f22d32e5b05744849994bcf52a67f6a105a87b1ca91c83bb"}, {0x20, 0x84, 0x81, "a69cb382969e506bd2c5859f"}, {0x40, 0x101, 0x1cf, "5c3e7da481a91e3358a86abfce473b4fed668e58b7f865bec71a8e3568be4b2df99756a213dabfa65c0279430e48"}, {0xc0, 0x11b, 0x8, "e5e236bf6b18e936c286da69166f44e38dbc7b8c066766838f9054d6dda07fea7b6977940151305c7aaf661fb4f9969a72bb58c5eb22c61eb1ebfbd740d3d1c32d07b833a2ad110cebfa7385247b441036c37b78660e951b83785982df4b7f8f0b11f3b9ed3a404262520edf4b7bed99a8012bafd084193f228a71e630f72a2f2b8fd147b11a6c38d304fbf0293e3504524f13829a143b0cbf6810ccb1ee75f13573ee7182dd3891b8a524"}, {0x18, 0x6, 0x9, "ce2bda762863"}, {0x1010, 0x10b, 0x5, "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"}], 0x1318}, 0x80) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) read(r0, &(0x7f0000000240)=""/53, 0x35) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:08 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000400)='/dev/snd/pcmC#D#p\x00', 0x0, 0x2000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000002, 0x20813, r0, 0x0) add_key$user(&(0x7f00000004c0)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300)="806117cf2b6bd304853ed40958c415652428f94614800e5c7c1f364adff0d5491ad907418f815e5d67966e07c2cc55178706e2f2e9862e090987a3dc2b6136f5def70d08ccca3a987dd0a3b5db01efeac47127590862f06d0a3eecae4f9ad98bf800721800729cf99a9fb494792749c850c6ffef20cba151a8d9070097ca9f0bfe3526832a4aabf6b43db9f279cf95f76787db2eb241704bdc8bf7e8733cdeae0000f11848e2504821c67e5c0500000000000000a7c81d56bddff78899461fc2000cdc8d0483b2f8004c6d08d0e06ac2fb533ea5225c50d0b744e0d6b146c53b78930e930f028abd9918ee9061044997", 0xf0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000840)="bd26418f413952235a21001e690d688dad66c8b3b62ffe2400de97be05adfe5f6e4759857477a4717841d79805f30f3ac05041c6b10e3b53f3a80cc43253e3b4b841e03cbbafa9e6fa769e21bf746c7acfee2ae6e2969cd08089a4ca626388e998feae1698a36820545574369c795a91655b69e4d69f9d21f1f3e0b2369ca26e8518e3ee2b0b83c002342c9368b0b18529cf3ae4880115e5a3217d510d180db5d19fdff4ad1766e5ed67c625ebdac6d8990b92743827564e2da5251df725e6bb0ca28484079c4a55284e85adbc6400a6") r1 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_netdev_private(r1, 0x89f0, &(0x7f0000000040)="103b092632a5e05237b277bf9548c0745ed3ead071c3ccdeebfa106036a3a13daafd74ad3b192f49c2c97524398c95f91b8a85e19c4db559a850c8ff7f064e") ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) getsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f00000001c0), &(0x7f0000000440)=0x4) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000480)={0x1, 0x7fff, 0x916, 0x3}) setsockopt$netlink_NETLINK_CAP_ACK(r2, 0x10e, 0xa, &(0x7f0000000080)=0x2, 0xfffffffffffffe01) [ 340.833844] 8021q: adding VLAN 0 to HW filter on device team0 21:18:08 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) inotify_init1(0x80800) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 340.916527] device veth0_to_bridge entered promiscuous mode [ 340.943967] device veth0_to_bridge left promiscuous mode [ 340.973273] device team0 left promiscuous mode [ 340.978079] device team_slave_0 left promiscuous mode [ 340.983622] device team_slave_1 left promiscuous mode 21:18:09 executing program 5: mremap(&(0x7f00002cf000/0x3000)=nil, 0x3000, 0x4000, 0x0, &(0x7f00005ae000/0x4000)=nil) setrlimit(0x2, &(0x7f0000e63ff0)={0x2000000, 0x2007ffffffc}) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8, 0x10102) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000080)={&(0x7f0000f92000/0x2000)=nil, 0x2000}, &(0x7f00000000c0)=0x10) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setrlimit(0xf, &(0x7f0000000000)={0x10000, 0x5}) 21:18:09 executing program 2: r0 = syz_open_dev$evdev(&(0x7f00000009c0)='/dev/input/event#\x00', 0x0, 0x5) write$binfmt_elf64(r0, &(0x7f00000000c0)=ANY=[], 0xffffffe8) r1 = getpgrp(0xffffffffffffffff) rt_tgsigqueueinfo(r1, 0x0, 0x16, &(0x7f0000000080)={0x20, 0x7f, 0x7, 0x8001}) r2 = gettid() write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[], 0x0) timer_create(0x0, &(0x7f00000000c0)={0x0, 0x12}, &(0x7f0000000200)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x8}, {0x0, 0x1c9c380}}, &(0x7f0000040000)) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) tkill(r2, 0x401004000000016) [ 341.041338] device team0 left promiscuous mode [ 341.046212] device team_slave_0 left promiscuous mode [ 341.051750] device team_slave_1 left promiscuous mode [ 341.061449] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:09 executing program 7: unshare(0x24020400) unshare(0x24020400) unshare(0x20400) r0 = pkey_alloc(0x0, 0x80000000000000) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2000000, r0) madvise(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xa) 21:18:09 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f750800390005", 0x26) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x7, 0x8}) [ 341.123479] device team0 left promiscuous mode [ 341.128317] device team_slave_0 left promiscuous mode [ 341.133880] device team_slave_1 left promiscuous mode [ 341.211218] mmap: syz-executor5 (12706): VmData 35139584 exceed data ulimit 33554432. Update limits or use boot option ignore_rlimit_data. 21:18:09 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x30000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r2, 0x5381) read(r0, &(0x7f0000000100)=""/86, 0x56) setsockopt$inet6_tcp_int(r1, 0x6, 0x0, &(0x7f00000002c0)=0x9, 0x4) open$dir(&(0x7f0000000280)='./file0\x00', 0x161800, 0x2) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0x30000, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r4, &(0x7f00000001c0)='./file0\x00') close(r1) [ 341.773901] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 342.425472] device team0 entered promiscuous mode [ 342.430519] device team_slave_0 entered promiscuous mode [ 342.436302] device team_slave_1 entered promiscuous mode [ 342.476208] 8021q: adding VLAN 0 to HW filter on device team0 21:18:10 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0x180, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") prctl$getname(0x10, &(0x7f0000000200)=""/14) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r0, 0x111, 0x4, 0x1, 0x4) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:10 executing program 5: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r0, &(0x7f0000000300)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xa4, r1, 0x1, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4}, @IPVS_CMD_ATTR_DAEMON={0x3c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7f}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'teql0\x00'}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x997}]}, @IPVS_CMD_ATTR_SERVICE={0x4c, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x6c}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@local}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0xa4}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r2 = socket$inet6(0xa, 0x200000000003, 0x87) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) fcntl$getownex(r2, 0x10, &(0x7f0000000340)={0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000380)={0x0}, &(0x7f00000003c0)=0xc) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r2, &(0x7f0000000400)={r0, r2, 0x85}) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f00000000c0)=0x7fffffff, 0x4) sendmsg(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="b10b938630270b", 0x7}], 0x1, &(0x7f0000000200)}, 0x8000) sendmsg(r2, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000440)="d05b0563", 0x4}], 0x1, &(0x7f0000001780)}, 0x0) 21:18:10 executing program 7: r0 = socket$inet6(0xa, 0x5, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0x9, 0x100) faccessat(r1, &(0x7f00000000c0)='./file0\x00', 0x10, 0x0) ioctl$VHOST_SET_LOG_BASE(r1, 0x4008af04, &(0x7f0000000080)=&(0x7f0000000040)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_ifreq(r2, 0x89fd, &(0x7f0000000200)={'bond0\x00', @ifru_names='bond_slave_1\x00'}) [ 342.552465] device team0 entered promiscuous mode [ 342.557555] device team_slave_0 entered promiscuous mode [ 342.563733] device team_slave_1 entered promiscuous mode [ 342.622666] 8021q: adding VLAN 0 to HW filter on device team0 [ 342.670543] device veth0_to_bridge entered promiscuous mode [ 342.682133] device team0 entered promiscuous mode [ 342.687372] device team_slave_0 entered promiscuous mode [ 342.693783] device team_slave_1 entered promiscuous mode [ 342.718855] 8021q: adding VLAN 0 to HW filter on device team0 21:18:10 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000007e00), 0x0, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000e5bff6)='/dev/dsp#\x00', 0x1, 0x0) readv(r0, &(0x7f0000000600)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1) [ 343.014866] device team0 left promiscuous mode [ 343.019905] device team_slave_0 left promiscuous mode [ 343.025480] device team_slave_1 left promiscuous mode 21:18:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet6_udp_SIOCINQ(r3, 0x541b, &(0x7f00000001c0)) getsockopt$inet6_dccp_buf(r3, 0x21, 0xe, &(0x7f0000000700)=""/4096, &(0x7f0000000280)=0x1000) r4 = syz_open_dev$mouse(&(0x7f0000000200)='/dev/input/mouse#\x00', 0xffffffff, 0x1) setsockopt$inet_opts(r4, 0x0, 0xd, &(0x7f0000000340)="9ffe7f5553abc3e8bebe8b24a2ccd3ca0da326c232256017b4a6ac2c1d46c598b487319d52d6b9ace1154a78e1dea991fc8ce47bb2080f0fe11b4634eee928092ede4aba87fa84b1cdb6b3a6f6165d3f23664d14671f79983beb488d4935a9e46d7434c87186d4ada4b23087cc047edda05dd7ac881f6c7f40e6e2d3033f38ed9dba32f8b632326c59782865c2f41641ee4d021a84630ea1ad13eab788e2119a96db2b52c428855f51bf3fb0e8c449c78125b9df84229a2246293fcec04307446a49d19d49a98fa7acea70b10ac77f935a017da65ac94bc4e06ffbc2a1ae3e96", 0xe0) getsockopt$inet_dccp_int(r1, 0x21, 0x1f, &(0x7f0000000440), &(0x7f0000000480)=0x4) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r4) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r4, 0x84, 0x18, &(0x7f0000000240)={r2, 0x8}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$uinput_user_dev(r4, &(0x7f0000001700)={'syz1\x00', {0x190, 0x0, 0x101, 0x7a39}, 0x42, [0x89c, 0x3, 0x7, 0x6, 0x10001, 0xe2b, 0x6, 0x1, 0xff, 0x7, 0x1, 0x5, 0x6602, 0x1ff, 0x6, 0x81, 0x7fff, 0x3, 0x1000, 0x9, 0x7fff, 0x1, 0x200, 0x7, 0x7, 0xff, 0x0, 0x2, 0x6, 0x1, 0x0, 0xffffffff, 0x1, 0x100000001, 0x83e, 0x8, 0x9, 0xfffffffffffffe01, 0x5, 0x34ab, 0x5, 0x9, 0x3, 0x10001, 0x3, 0x800, 0xfffffffffffff000, 0x9, 0x9, 0xfffffffffffffffa, 0x81, 0x4, 0x8, 0x8000, 0x0, 0x3, 0x2, 0x0, 0xfffffffffffffc01, 0x40, 0x3ff, 0x65, 0xffffffffffff0001, 0x2], [0x4, 0x389, 0xf76, 0x1, 0x80000000, 0x6, 0x6, 0x9, 0x7, 0x7, 0x7, 0xd2d, 0xf2, 0x4, 0x1, 0x2, 0x4822, 0x3, 0x2, 0x10001, 0x1, 0x80, 0x4, 0x2, 0x4, 0x2, 0x0, 0x0, 0x7, 0x7, 0x20, 0xffffffff, 0xffffffffffffffff, 0x0, 0x6, 0x500000000000, 0x7d4b, 0x83, 0x6, 0x1, 0x4, 0x6, 0x1, 0x9, 0x100000001, 0x0, 0xfff, 0x7, 0x4, 0x3, 0x6, 0x6, 0x8, 0x4, 0x1, 0xfffffffffffffffd, 0x401, 0x3, 0x0, 0x8, 0x20, 0x6, 0x3, 0x6], [0x9, 0x20, 0x3, 0x6, 0x100000001, 0x1, 0x9, 0x8, 0x9, 0x20, 0xffffffffffff28dc, 0x3, 0xe65, 0x3f, 0x101, 0x1, 0x0, 0x4, 0x6, 0x0, 0x5264, 0x200, 0x3, 0x0, 0x1000, 0x61948000000000, 0x200, 0x800, 0x4, 0x1fdc0000000, 0x100000001, 0x1ff, 0x8, 0x1, 0xde4, 0x2, 0x80, 0x1, 0x5, 0x6, 0x9, 0x4, 0x150, 0x20000, 0x7fffffff, 0x81, 0x6, 0x7, 0x214, 0x3, 0x5396, 0x4, 0x5, 0x8000, 0x9, 0x1f, 0x1, 0xffffffffffffff01, 0x6, 0x80000001, 0x0, 0x5b, 0x4, 0x1], [0x2, 0xd8d6, 0x1, 0x29, 0x3, 0x1, 0x6, 0x1, 0x10001, 0x1, 0x8ec3, 0x5, 0x7ff, 0x40, 0x1, 0x9, 0x9, 0x200, 0x7, 0x0, 0x7a8a, 0x0, 0x40, 0x2, 0xfffffffffffffffb, 0x5, 0x8, 0x40, 0x2, 0x74fd, 0x2, 0x7ff, 0x1f, 0x1, 0x4, 0x6a, 0x5, 0x1f, 0x800, 0x8, 0x40, 0x7, 0x4, 0x99c1, 0x3ff, 0x7ff, 0x8001, 0x1, 0x0, 0x1, 0xfffffffffffffffd, 0x9, 0x3, 0x3, 0x6d, 0x5, 0x9, 0x3ff5b130, 0x7, 0x6, 0xfffffffffffffff9, 0x1, 0x82, 0xc784]}, 0x45c) 21:18:11 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300)='/dev/snapshot\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000080)={0x0, 0x80000000}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={r2, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x8]}, &(0x7f0000000800)=0x100) r4 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r1, 0xc0bc5351, &(0x7f0000000340)={0x7, 0x2, 'client1\x00', 0x6, "f23a51b030be1544", "a3cdc0b58ddd50bbefc19b041619ce5f4844650cc436ceb0a679246b10b1c1ec", 0xa9, 0x101}) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000040)={r3, 0x0, 0x1, 0x1ff}, 0x10) [ 343.082453] device team0 left promiscuous mode [ 343.087281] device team_slave_0 left promiscuous mode [ 343.092861] device team_slave_1 left promiscuous mode [ 343.140628] device team0 entered promiscuous mode [ 343.145742] device team_slave_0 entered promiscuous mode [ 343.151633] device team_slave_1 entered promiscuous mode [ 343.189472] 8021q: adding VLAN 0 to HW filter on device team0 [ 343.287897] device team0 entered promiscuous mode [ 343.293114] device team_slave_0 entered promiscuous mode [ 343.299015] device team_slave_1 entered promiscuous mode [ 343.352836] 8021q: adding VLAN 0 to HW filter on device team0 [ 343.389785] device team0 left promiscuous mode [ 343.394607] device team_slave_0 left promiscuous mode 21:18:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) io_setup(0x3, &(0x7f00000001c0)=0x0) io_pgetevents(r1, 0x10001, 0x1, &(0x7f0000000200)=[{}], &(0x7f0000000340)={0x77359400}, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty, 0xffffffffffffffff}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup3(r0, r3, 0x80000) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000100)={0x0, 0x1, 0xfa00, {0x1, &(0x7f0000000040)={0xffffffffffffffff}, 0xfffffffffffffffb, 0x8}}, 0x12b) write$RDMA_USER_CM_CMD_RESOLVE_IP(r4, &(0x7f0000000140)={0x3, 0x40, 0xfa00, {{0xa, 0x4e24, 0xffff, @remote, 0x8}, {0xa, 0x4e22, 0x4b, @remote, 0x81}, r5, 0xcd}}, 0x48) sendto$inet6(r3, &(0x7f0000000280)="22d9971f941bfd5251fd4404005c5319d902a60110bcf9b26c7479fa291d6768866abca291fda7062cc01a0c143a0000000027bab618fd00000050cdb68e73504aa2c3b1501c4bab09527608330c3f688722ce10f086bf9af775d31150382d4588d7e59ddf100d65e10c9281a53b229fe43cf9a723ebb1fedb76f30e4f3ea35e583d2cf37ae29ff1852d552d5fa12bb182cc63373ca3eba8738c3a11db905a38b1b15e1d1e334ad546697a39205702", 0xaf, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xfffffffffffffffe, @empty, 0x4000000000000}, 0x1c) close(r0) io_submit(r1, 0xa, &(0x7f0000001cc0)=[&(0x7f0000000480)={0x0, 0x0, 0x0, 0x7, 0x6f86, r4, &(0x7f0000000380)="1a48a811f0be1800515e086493988d10b7826413ad456514c502126d34b41ea9fb281609c796dc61326ab2b9db4e523a49cc7092c188cd1ff925d47fd5c9f8dabf58c1057a201aef0536730dbe09b7691168eeccba8fed3a33f31d6457f7b7b2a66aafed0a06c5e407ea0e1e37dd6be80f96a04606061a19965c83f444b8ad5302b61bdc4d80b0ae0e3a3aef24e10a41e5f823c56c504c496aab9bc8091858499e3a091abb1cc23fb7e14a56265936932335172a1b4988289160fd71752661cffffb1e22f8442059b0d9fc56b046c83fd96742e1e3f24e3504", 0xd9, 0x8, 0x0, 0x1, r4}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x100, r4, &(0x7f00000004c0)="1f4cf60e588b89c4e29a4b2e63661dc4a63a9eb2360483948412aeb31cefa9a2acb7cb6dc5d8028eb0ffdb97223f0693ab79a6d3865aa36adbba4a7216352b44f5ce32c10f33314574a6a781de173b716965fc9d1f6f6a93be51e701f120861143c375c25f8641c44c7c08b3b42ca01cd6db9844856a26976337203ac939bfdd91c65fdc7cbe20b1", 0x88, 0x81, 0x0, 0x0, r4}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x7, 0x10001, r3, &(0x7f00000005c0)="67455141ab6d977bef286f087b763249ab5dc54012ffb638257fe02a7690f40f90defe3fd47333427d0c276f5c6166aa3e74b05e9d73eba392af3355fbe90a11ad070f64e772243c894b5e2b6f8d06b8f7b7819549d86f72d2c55ad0c6765952d7815379cc7afd8a4c8d4a23a3e6e8de813b7b6df23023118916312aa450fc6e4310248dc808b0449af8912aef0cf6cbf640ab96114b7b56e5f99045713c3455cf9d4a80d5cc6ab38800c1ef0431e56525b7587f2f757e0ea178bdca9ebdb2", 0xbf, 0x4cb, 0x0, 0x0, r4}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x3, 0x7, r3, &(0x7f00000006c0)="9edab60c324850d30156baf3f9ca8f36996f04f3cc737b413c650dcd222ba0140dc3e02dc744b8668978233000c9c10d7d71fdba52145b63357e15a93b6f9397a0a31477e77daea3432c44c531609f13466d4ae74f6a137a4983274105b9e55beff6220460548ec7f1125fe2633623fa368f125149df95e9a9da97a7961a29cfc2100fca3383e18a2eee889a88a8c0af7931b8e79c019228a6951572b504e45954a79d4b6ced4f4509ce378adb7e4c531e89d863672f4b91288d46c72fffb37aa981470e91ce7c65fe74a65d0384b56291491e7a9a522fbe3ba74cb7fe5cbd6e290751a4ae92dc9bd348b25b7dd5c2369d1b3b", 0xf3, 0x1, 0x0, 0x0, r4}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0xf, 0x8, r2, &(0x7f0000000800)="7994007e487d7c18f624ecb409fdc17b0e15ab74ab8ab7b2a6ca0a6b429a0aa8cc15c82eb8643e77cc3c99f35f4f03d1caee056e0640fb800b59aeedc1d9b92f04da34b1b0b76e81d4f2a4a1ae1fbfc4fff0f0f2fee6f0bbf7ac2d0d9a", 0x5d, 0x3226a950, 0x0, 0x1, r3}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x9, r2, &(0x7f00000008c0)="1ec864d42c875022c9eabc07090e19fe2a7cb7", 0x13, 0x80, 0x0, 0x0, r4}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa, r4, &(0x7f0000000940)="90fa5b2dedbfd58b6cd4dd86b8b65536b7aa322a1790e701404e2b58456cd45cd78de3e4c3eaf598dd7c4c86cbf09ee63b3ea9a57443d4d1a465b2057357ab79430546c1a904defacdba4b36e7ec00a6a6a30dfd61eb7971adaf18ebc9d165f27cc497a7f96acde9fc067cd9e6281d996e2378d48e4421f3ba2c30707169c81e4b3234d06381f9d8bb7583a00f516ebe2469dd2328239086ce19e102f7fa4a44b57894e5110d7d0284b8c53bc8eb6e31e4b82ec8f2bc636e3f2355c9c5cf58adafffa22470c652b327ec5ff4630ebbf17073fc3e4322d21a44900327c21e82b260057841fe37", 0xe6, 0x3ff, 0x0, 0x1, r4}, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0xa, 0x5, r3, &(0x7f0000000a80)="1f83f4541f876997e1c6896e7e379f6b7415ae752e4ed07e0579bb41f44b14c88c6e3db4f2cd14950c50bf9ccc60ec87c0831261f980f4823f8fe647f0e1312417ad34ea904ed5f8cd628e1f24", 0x4d, 0x800000000000000, 0x0, 0x1, r4}, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0xe, 0xffffffff80000000, r2, &(0x7f0000000b40)="08972ac9783cd7fd8e8d74e2cbee3f8a54e84d70a7ae0a192b5f328095c02b1b8b7634b6511d7a5aa4299d402cb5213f3d12f228e69055fb7e9cafe9287cf46cf260c644736768ee26f2c920d43111f3b857cbb8ed9f7eb7f19eb99b8e566e0bf5423eeb43b1291215c49b5cd6afe05b6b8f095376b0e857e60fd426f275f97e8954feaec951bfde5e07863f891ca51c99bae018fe0327f434f0b502474feb5e22214f592c3c18faef872e91884c17355332010b64be35d0d0957d56b21c49cce69bc7302826313097f55117d3cd9ca3a50d94eb82af39c3060ceb", 0xdb, 0x7ff, 0x0, 0x1, r4}, &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x6, 0x9, r3, &(0x7f0000000c80)="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", 0x1000, 0x2, 0x0, 0x1, r4}]) [ 343.400322] device team_slave_1 left promiscuous mode [ 343.532219] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 343.541799] device veth0_to_bridge left promiscuous mode 21:18:11 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r0) [ 343.876854] device team0 left promiscuous mode [ 343.881751] device team_slave_0 left promiscuous mode [ 343.887371] device team_slave_1 left promiscuous mode [ 343.909177] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x7, 0x8}) 21:18:12 executing program 5: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) read(r0, &(0x7f0000000040)=""/11, 0xb) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000240)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r3, &(0x7f0000000080)) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000180)) syz_open_pts(r0, 0x0) dup2(r0, r3) [ 344.845274] device team0 entered promiscuous mode [ 344.850317] device team_slave_0 entered promiscuous mode [ 344.856212] device team_slave_1 entered promiscuous mode [ 344.865601] 8021q: adding VLAN 0 to HW filter on device team0 [ 344.878144] bond0: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 344.889510] device team0 left promiscuous mode [ 344.894317] device team_slave_0 left promiscuous mode [ 344.899886] device team_slave_1 left promiscuous mode 21:18:12 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = dup(r1) getsockname$packet(r0, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=@newtfilter={0x2c, 0x2c, 0x200, 0x70bd25, 0x25dfdbfe, {0x0, r3, {0xf, 0x6}, {0xa, 0xffe0}, {0xfff2, 0xfff1}}, [@TCA_CHAIN={0x8, 0xb, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24000000}, 0x4) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:12 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x6b6202) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}}, 0xea6f, 0x13a, 0x3, 0x79a6a75, 0x1}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000340)=@assoc_id=r1, 0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r2 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000001c0)={'veth0_to_bond\x00', 0x2000}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x100, 0x0) r3 = socket(0x10, 0x802, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000380)=0x400, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 344.940607] device team0 entered promiscuous mode [ 344.945652] device team_slave_0 entered promiscuous mode [ 344.951457] device team_slave_1 entered promiscuous mode 21:18:13 executing program 2: r0 = socket$inet(0x2, 0x4000000000000001, 0x4) setsockopt$inet_tcp_int(r0, 0x6, 0x19, &(0x7f0000000040)=0x1, 0x4) poll(&(0x7f0000000080)=[{r0}], 0x1, 0x0) r1 = openat$nullb(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/nullb0\x00', 0xa000, 0x0) io_setup(0x3, &(0x7f0000000240)=0x0) io_getevents(r2, 0x6, 0x6, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}], &(0x7f0000000340)) ioctl$BLKFLSBUF(r1, 0x1261, &(0x7f0000000200)=0x400) mount(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='sockfs\x00', 0x1, &(0x7f0000000140)="26d91b4563d8e603dc39f341d4b6fed6cbc90e94b8d786a20578292227a9d70c55e67ffdc9e9489eaa78378037899ff990fed3cab4135fa46898fa36475257a94d5d64e838b1b7a0e74e204786b2b687aa0b5c5c2487001f0bc8d71245a8529d5e2bcbe0e1a0c35537e25c686b") [ 345.002072] 8021q: adding VLAN 0 to HW filter on device team0 [ 345.027232] device veth0_to_bridge entered promiscuous mode 21:18:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000140)={0xaa, 0x100000000000000}) finit_module(r1, &(0x7f0000000100)='ppp1vboxnet1\x00', 0x1) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000000080)={{&(0x7f0000012000/0x1000)=nil, 0x1000}, 0x1}) r2 = openat$vnet(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vhost-net\x00', 0x2, 0x0) r3 = dup(r2) ioctl$VHOST_SET_OWNER(r2, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f00000127c0)={'team0\x00'}) ioctl$UFFDIO_COPY(r3, 0xc028aa03, &(0x7f00000000c0)={&(0x7f0000011000/0x4000)=nil, &(0x7f0000014000/0x1000)=nil, 0x4000}) ioctl$SIOCGIFMTU(r3, 0x8921, &(0x7f0000000000)) close(r1) [ 345.052190] device veth0_to_bridge left promiscuous mode 21:18:13 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) setsockopt$bt_BT_RCVMTU(r0, 0x112, 0xd, &(0x7f0000000080)=0x10000, 0x2) ioctl$int_out(r0, 0x2, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:18:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000340)="ed2599c30f8ab1ffc5d3dd48a5c875d2f008b0c52283128c61f294fb71fefe8704cbf14189e8df104d44d5ca4bef2e087e4a8c33212dec21aff9b03423d64df57cf94391a14ec0ac8767a10864988f6be46ea6a1b2f8a0bd40a161b3ae06d2d797d7446b87e5c38cfe891912a37fac14cc06161f8bab1336c005370932a56392db60a040e2d8a68e1015a32ad76427580f639ef175defc951537348536956326a75c95") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 345.208894] device team0 left promiscuous mode [ 345.214075] device team_slave_0 left promiscuous mode [ 345.220613] device team_slave_1 left promiscuous mode 21:18:13 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x0, 0x7, 0x8}) 21:18:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x400041, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000040)={0x1, 0x72, 0x7a, 0x6, 0x9}) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000001500)={&(0x7f0000000140)={0x10, 0x3}, 0x38f, &(0x7f00000014c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="040100001a000100e0000001000000000000000000000000ac1414aa00e6092eaf453754cb00000000000000000000000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="e0000008000000000000000000000000000000002b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000200000000000000000014000e0000000000000000000000000000000000"], 0x104}}, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f0000001440)={@empty, @multicast2, 0x0}, &(0x7f0000001480)=0xc) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000001540)={@empty, 0x39, r3}) [ 345.462494] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:13 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x420001, 0x0) ioctl$EVIOCGRAB(r2, 0x40044590, &(0x7f0000000040)=0x6) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f00000002c0)={0x0, @in={{0xa, 0x0, @dev}}, 0x0, 0x0, 0x0, 0x0, 0xd}, 0x98) [ 345.556535] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. [ 345.614997] netlink: 20 bytes leftover after parsing attributes in process `syz-executor5'. 21:18:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x200, 0x0) ioctl$RTC_ALM_SET(r2, 0x40247007, &(0x7f0000000100)={0x3b, 0x1c, 0x11, 0x3, 0x4, 0x3, 0x6, 0xa6, 0xffffffffffffffff}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:13 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x400041, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 345.841060] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:13 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:14 executing program 5: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f00000001c0), 0xfffffef3) r2 = epoll_create(0x36e) r3 = socket$bt_rfcomm(0x1f, 0x3, 0x3) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) ppoll(&(0x7f0000000140)=[{r2}], 0x1, &(0x7f0000000200)={0x0, r4+30000000}, &(0x7f0000000240), 0x8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'veth0_to_bridge\x00', 0x0}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000000180)={0x90000001}) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x1, 0x47) ioctl$ifreq_SIOCGIFINDEX_team(r3, 0x8933, &(0x7f0000000040)={'team0\x00', r5}) ioctl$SNDRV_CTL_IOCTL_ELEM_READ(r0, 0xc4c85512, &(0x7f0000000300)={{0x0, 0x4, 0x7, 0x5, 'syz0\x00', 0x10000}, 0x1, [0xfffffffffffff801, 0x4, 0xfff, 0x9, 0x5, 0x7, 0xfffffffffffffff9, 0x78, 0x6, 0x100000000, 0x5, 0xff, 0xba82, 0x7, 0x1bc0000, 0x8, 0x3a3, 0x7, 0x3, 0xee6, 0xfff, 0x9, 0x0, 0x2, 0xfffffffffffffff7, 0x3, 0x3987, 0x3, 0x3f, 0x2, 0x6, 0x1, 0x3, 0x3, 0x7fff, 0x100000001, 0x5609, 0x1, 0x4, 0xe48, 0x6, 0x4, 0x46, 0x1, 0x42d1, 0xe, 0x1, 0x7, 0x4f9b, 0x400, 0x80000001, 0x8, 0x3f, 0x20, 0x101, 0x3c, 0x1, 0x6, 0x9, 0x7, 0x0, 0x89fd, 0x5, 0x1, 0x5, 0x7, 0x5, 0x40, 0x81, 0x1a, 0x0, 0x9, 0xc603, 0x101, 0x100000000, 0xd6, 0x8b, 0x0, 0x81, 0x7, 0x3dde6bc0, 0x0, 0x10001, 0x9, 0x3, 0x9, 0x3, 0x8aac, 0x6, 0x81, 0x7, 0x9, 0xfffffffffffffff9, 0x3, 0x6e, 0x0, 0x3, 0x40, 0xff, 0x0, 0x2, 0xfff, 0x7, 0x3, 0x0, 0xf61c, 0xffff, 0xb3, 0x5, 0xb4, 0xd56, 0x0, 0x92, 0x1, 0x6, 0x8001, 0x101, 0x400, 0x8, 0x4, 0x200, 0x0, 0x2, 0x1, 0x1000, 0x6c4, 0x7, 0x7], {0x77359400}}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528ac8e}], 0x1, 0x0) [ 346.002728] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x10000000000000) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sequencer2\x00', 0x200000, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r2, &(0x7f0000000380)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xa}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0xfc, r3, 0x910, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x4}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x88c}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x10001}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x100}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7ff}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip_vti0\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xbca}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x6f}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x80000001}]}, @IPVS_CMD_ATTR_DAEMON={0x30, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x4000}, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) r5 = socket(0x9, 0x5, 0x1) getpeername$inet(r5, &(0x7f0000000040)={0x2, 0x0, @multicast1}, &(0x7f0000000100)=0x10) 21:18:14 executing program 2: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 346.301573] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 346.422169] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 346.502248] device team0 entered promiscuous mode [ 346.507383] device team_slave_0 entered promiscuous mode [ 346.513373] device team_slave_1 entered promiscuous mode [ 346.533657] 8021q: adding VLAN 0 to HW filter on device team0 21:18:14 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xba6d2ec30b571089, 0x120) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000100)=0x100, 0x4) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x15, &(0x7f0000000140)={0x80000001}, 0x1) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r2) [ 346.558791] device veth0_to_bridge entered promiscuous mode [ 346.566754] device team0 left promiscuous mode [ 346.571647] device team_slave_0 left promiscuous mode [ 346.577250] device team_slave_1 left promiscuous mode [ 346.611122] device team0 entered promiscuous mode [ 346.616215] device team_slave_0 entered promiscuous mode [ 346.622073] device team_slave_1 entered promiscuous mode [ 346.669241] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.680541] device team0 entered promiscuous mode [ 346.685577] device team_slave_0 entered promiscuous mode [ 346.691348] device team_slave_1 entered promiscuous mode [ 346.701787] 8021q: adding VLAN 0 to HW filter on device team0 [ 346.714153] device team0 left promiscuous mode [ 346.719081] device team_slave_0 left promiscuous mode [ 346.724641] device team_slave_1 left promiscuous mode [ 347.019342] device team0 left promiscuous mode [ 347.024220] device team_slave_0 left promiscuous mode [ 347.029740] device team_slave_1 left promiscuous mode [ 347.065576] device team0 entered promiscuous mode [ 347.070558] device team_slave_0 entered promiscuous mode [ 347.076321] device team_slave_1 entered promiscuous mode [ 347.101622] 8021q: adding VLAN 0 to HW filter on device team0 21:18:15 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x80000000, 0x400) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)="c24c0ddce39d4ba807da1aaaabf714ab7b5b45c479adb1225f8288ae365986df1e70a82efaf625800ee96dd4e4f0c71b038b90bbb491c16e054ced4e5eb37dfbbedc8d05d61984e25d66d6303f2e74042098177375d2da57a807774bc1c8734a4e618e7d380608151c7dda52c5f95c31afba3847fd023c4bdb65dd5ad282d142944498203ffbb06186aec9ab80a0f1581366e1d494afb1bbc836aacdea2afed81676c02a80c47c9f3b1ce12e7228c318a4c058150bdf81944bd6d722d8624ab723", 0xc1, 0x1, 0x5}], 0x30000) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x404001) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:15 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r2) [ 347.112608] device team0 left promiscuous mode [ 347.117404] device team_slave_0 left promiscuous mode [ 347.122926] device team_slave_1 left promiscuous mode 21:18:15 executing program 1: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rtc0\x00', 0x98200, 0x0) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f00000000c0)={0x0, 0x1000, 0x3, 0x6, 0x0, 0x9}, &(0x7f00000001c0)=0x14) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f0000000300)={r1, 0x7, 0x5}, 0x8) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) fcntl$setlease(r0, 0x400, 0x0) syncfs(r0) r2 = dup(r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = accept$inet(r0, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x18) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r6 = socket(0x3, 0xfffffffffffffffc, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f00000002c0)={'team0\x00'}) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x30, r6, 0x13) fcntl$setstatus(r3, 0x4, 0x800) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r0, 0x28, 0x1, &(0x7f0000000540)=0x3ff, 0x8) getpeername$packet(r0, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000380)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x19, &(0x7f0000000400)={r1, 0x9}, 0x8) ioctl$sock_inet6_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f00000003c0)={@empty, 0x1b, r7}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f0000000440)=0x200000, 0x4) getsockopt$inet_sctp6_SCTP_MAXSEG(r6, 0x84, 0xd, &(0x7f0000000480)=@assoc_id=r5, &(0x7f00000004c0)=0x4) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 347.179685] device team0 entered promiscuous mode [ 347.184799] device team_slave_0 entered promiscuous mode [ 347.190628] device team_slave_1 entered promiscuous mode [ 347.211717] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 347.220689] 8021q: adding VLAN 0 to HW filter on device team0 [ 347.243965] device veth0_to_bridge left promiscuous mode 21:18:15 executing program 5: unshare(0x8000000) r0 = mq_open(&(0x7f000084dff0)='!selinuxselinux\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000040)={0x0, 0x1, 0x5}) r1 = mq_open(&(0x7f0000000000)='trustedvmnet0bdev^(&\x00', 0x1, 0x100, &(0x7f0000000080)={0x7ff, 0xf9cc, 0x93d, 0x9, 0x5, 0xa309, 0x1, 0x8}) setsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000140), 0x4) mq_timedsend(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)={0x77359400}) mq_timedreceive(r0, &(0x7f0000000100)=""/24, 0x18, 0x5, 0x0) [ 347.292308] device team0 entered promiscuous mode [ 347.297306] device team_slave_0 entered promiscuous mode [ 347.303117] device team_slave_1 entered promiscuous mode 21:18:15 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x10000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r1, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:15 executing program 7: r0 = socket$inet(0x10, 0x3, 0xc) sendmsg(r0, &(0x7f0000011fc8)={0x0, 0x0, &(0x7f0000009ff0)=[{&(0x7f0000002000)="24000000020207031dfffd946fa2830020200a0009000200001d85680c1ba3a20400ff7e", 0x24}], 0x1}, 0x0) socketpair(0x5, 0x2d9ad644de83352a, 0x1, &(0x7f0000000000)={0xffffffffffffffff}) openat$cgroup_int(r1, &(0x7f0000000040)='memory.high\x00', 0x2, 0x0) [ 347.375666] 8021q: adding VLAN 0 to HW filter on device team0 [ 347.436826] netlink: 5 bytes leftover after parsing attributes in process `syz-executor7'. [ 347.468336] netlink: 5 bytes leftover after parsing attributes in process `syz-executor7'. [ 347.477787] device team0 left promiscuous mode [ 347.482562] device team_slave_0 left promiscuous mode [ 347.488161] device team_slave_1 left promiscuous mode 21:18:15 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000001c0)={'irlan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}}) r1 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) waitid(0x101, r3, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0x10e, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0x400000}}, 0xa0) 21:18:15 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000240)='/dev/dsp#\x00', 0x0, 0x6b6202) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000540)={0x0, @in={{0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x20}}}, 0xea6f, 0x13a, 0x3, 0x79a6a75, 0x1}, &(0x7f0000000280)=0x98) setsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000340)=@assoc_id=r1, 0x4) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r2 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000001c0)={'veth0_to_bond\x00', 0x2000}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x100, 0x0) r3 = socket(0x10, 0x802, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f0000000380)=0x400, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)="c24c0ddce39d4ba807da1aaaabf714ab7b5b45c479adb1225f8288ae365986df1e70a82efaf625800ee96dd4e4f0c71b038b90bbb491c16e054ced4e5eb37dfbbedc8d05d61984e25d66d6303f2e74042098177375d2da57a807774bc1c8734a4e618e7d380608151c7dda52c5f95c31afba3847fd023c4bdb65dd5ad282d142944498203ffbb06186aec9ab80a0f1581366e1d494afb1bbc836aacdea2afed81676c02a80c47c9f3b1ce12e7228c318a4c058150bdf81944bd6d722d8624ab723", 0xc1, 0x1, 0x5}], 0x30000) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x404001) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:15 executing program 7: socket$inet6_tcp(0xa, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x200000, 0x10) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000380)={@remote, @broadcast, @loopback}, &(0x7f00000004c0)=0xc) r1 = semget(0x0, 0x0, 0x0) r2 = getuid() getresgid(&(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)=0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000200)={{{@in=@local, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000180)=0xe8) stat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f00000003c0)={{0x40, r2, r3, r4, r5, 0xe, 0x8}, 0x1, 0xf7, 0xfffffffffffffffc}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(0xffffffffffffffff, 0x29, 0xd2, &(0x7f0000000000)={{0xa, 0x0, 0x0, @local}, {0xa, 0x0, 0x1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}, 0xfffffdef) r6 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x101000) ioctl$UFFDIO_WAKE(r6, 0x8010aa02, &(0x7f00000001c0)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}) pivot_root(&(0x7f0000000440)='./file0\x00', &(0x7f0000000480)='./file0\x00') 21:18:15 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffdfffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x40000000) r0 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/prev\x00') getsockopt$inet_sctp6_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000040), &(0x7f0000000240)=0x8) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000200)={0xc, 0x8, 0xfa00, {&(0x7f0000000080)}}, 0x10) fchdir(r0) [ 348.038170] IPVS: ftp: loaded support on port[0] = 21 21:18:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e26, 0xffffffffffffffff, @empty, 0x6}, 0x381) fsync(r1) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x820000004, &(0x7f0000000080)={0xa, 0x4e22, 0x294}, 0x296) close(r1) [ 348.244111] device veth0_to_bridge entered promiscuous mode [ 348.250715] device team0 entered promiscuous mode [ 348.256263] device team_slave_0 entered promiscuous mode [ 348.261929] device team_slave_1 entered promiscuous mode [ 348.272412] 8021q: adding VLAN 0 to HW filter on device team0 [ 348.281327] device veth0_to_bridge left promiscuous mode [ 348.288651] device team0 left promiscuous mode 21:18:16 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r0, 0x4c80, r1) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000340)="a019d62eb341c56eca6881c5e15eee1aff49e3c5c61deb6d8a2a9ddeb5a1fb7035dc565130f05b9dcb18727cf42732644b40bc5774b666452dc280eb091f61ab1e2ed3f8c514f076ec589cb9a4bbd03190e0dbbd8d633687850558", 0x5b, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 348.293580] device team_slave_0 left promiscuous mode [ 348.299243] device team_slave_1 left promiscuous mode [ 348.342946] device team0 entered promiscuous mode [ 348.348057] device team_slave_0 entered promiscuous mode [ 348.353865] device team_slave_1 entered promiscuous mode 21:18:16 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4}) 21:18:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = getpid() ptrace$setsig(0x4203, r2, 0x1, &(0x7f0000000040)={0x1a, 0x9d5b, 0x100}) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) sendmmsg$inet_sctp(r4, &(0x7f0000000380)=[{&(0x7f0000000180)=@in={0x2, 0x4e23, @rand_addr=0xfffffffffffff000}, 0x10, &(0x7f0000000200)=[{&(0x7f0000000280)="1ee642bc7f2594b5bc79c2e1e6fa89db20fa37014b502929b19da6fb051f8a4de13a8408a7b29ea5ba29bc43a329ad668d0ef04cd35abafffa0dd322e57b3713382e337859969ce7da383cfc114c819691fbc0875489f6b9772172312d21a577ec90199a68701c6862f12425926af45f575281ac0fb70639585f1d5de1df8a7d6d716a617c6f504c1f6acbe6c46e8ba680bf7ef0a8262bf621e297f90b6667ed4149254a418b6568a3ecfb283e1f9adb446d8f0f6b61fb24a4f031630530ac8409abc65d0f4f660f358e0f27d4e4c209ae24a8af2182bfd0e71d01c18fec05157518e2b06be525a0b6030a36440247e50361e7bb", 0xf4}, {&(0x7f00000001c0)="4bb10c556f3015ce6f31238777396e36469d5773cf3663310d53226e083c50f8fadf1aca", 0x24}], 0x2, 0x0, 0x0, 0x1}], 0x1, 0x24000084) sendto$inet6(r3, &(0x7f0000000100)="68335640137be9b91bf00ce7a0a98d3d5bd89811bacea12f50ab7b68ff03f2eedcd906afa581d9e5431da48a9c189e8ecc49", 0xfffffea7, 0x4001, &(0x7f0000000080)={0xa, 0x4e20}, 0x1c) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r4, 0x84, 0x15, &(0x7f00000003c0)={0x80}, 0x1) close(r1) [ 348.406977] 8021q: adding VLAN 0 to HW filter on device team0 [ 348.436185] device team0 left promiscuous mode [ 348.441088] device team_slave_0 left promiscuous mode [ 348.446795] device team_slave_1 left promiscuous mode 21:18:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 348.728705] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000100), 0x2c6, 0x20000004, &(0x7f0000000040)={0xa, 0x4e23, 0x3c}, 0x1c) close(r1) [ 348.807649] IPVS: ftp: loaded support on port[0] = 21 21:18:16 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000300)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) clock_nanosleep(0x7, 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000100)=0xc) close(r1) accept$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f00000002c0)=0x1c) socket$l2tp(0x18, 0x1, 0x1) flistxattr(r0, &(0x7f00000001c0)=""/78, 0x4e) [ 348.943625] device team0 entered promiscuous mode [ 348.948798] device team_slave_0 entered promiscuous mode [ 348.954582] device team_slave_1 entered promiscuous mode [ 348.966823] 8021q: adding VLAN 0 to HW filter on device team0 [ 348.991113] device team0 left promiscuous mode [ 348.995917] device team_slave_0 left promiscuous mode [ 349.001451] device team_slave_1 left promiscuous mode [ 349.038285] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:17 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 349.236550] device team0 entered promiscuous mode [ 349.241761] device team_slave_0 entered promiscuous mode [ 349.247580] device team_slave_1 entered promiscuous mode [ 349.258917] 8021q: adding VLAN 0 to HW filter on device team0 [ 349.268460] device team0 left promiscuous mode [ 349.273273] device team_slave_0 left promiscuous mode [ 349.278813] device team_slave_1 left promiscuous mode [ 349.351608] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x80000000, 0x400) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, r0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 349.597437] device team0 entered promiscuous mode [ 349.602389] device team_slave_0 entered promiscuous mode [ 349.608236] device team_slave_1 entered promiscuous mode [ 349.616356] 8021q: adding VLAN 0 to HW filter on device team0 [ 349.626763] device team0 left promiscuous mode [ 349.631643] device team_slave_0 left promiscuous mode [ 349.637222] device team_slave_1 left promiscuous mode [ 349.837776] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:17 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/full\x00', 0x121040, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e62}, 0x1c) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) ptrace$pokeuser(0x6, r3, 0x8, 0x4) listen(r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 349.895123] device team0 entered promiscuous mode [ 349.900241] device team_slave_0 entered promiscuous mode [ 349.906111] device team_slave_1 entered promiscuous mode [ 349.917226] 8021q: adding VLAN 0 to HW filter on device team0 [ 349.926743] device team0 left promiscuous mode [ 349.931469] device team_slave_0 left promiscuous mode [ 349.937054] device team_slave_1 left promiscuous mode [ 349.946332] device team0 entered promiscuous mode [ 349.951382] device team_slave_0 entered promiscuous mode [ 349.957246] device team_slave_1 entered promiscuous mode [ 349.968877] 8021q: adding VLAN 0 to HW filter on device team0 [ 349.977332] device veth0_to_bridge entered promiscuous mode [ 349.994715] device veth0_to_bridge left promiscuous mode [ 350.003822] device team0 left promiscuous mode [ 350.008562] device team_slave_0 left promiscuous mode [ 350.014134] device team_slave_1 left promiscuous mode 21:18:18 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x0, 0x0) add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000340)="f55f814a8c9a69fcee62a90caf81a2535528b50574e645ca25a9b284f7a9165e25430f7cb8", 0x25, 0xffffffffffffffff) ioctl$GIO_UNISCRNMAP(r1, 0x4b69, &(0x7f0000000840)=""/4096) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) pipe(&(0x7f0000000040)={0xffffffffffffffff}) syz_open_pts(r2, 0x4000) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:18:18 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000100)=@req={0x3ff, 0xfff, 0x6, 0x5}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24}, 0x1c) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x4000, 0x0) write$P9_RWSTAT(r2, &(0x7f00000000c0)={0x7, 0x7f, 0x2}, 0x7) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 350.529920] device team0 entered promiscuous mode [ 350.534980] device team_slave_0 entered promiscuous mode [ 350.540868] device team_slave_1 entered promiscuous mode [ 350.553088] 8021q: adding VLAN 0 to HW filter on device team0 [ 350.562952] device team0 left promiscuous mode [ 350.567771] device team_slave_0 left promiscuous mode [ 350.573307] device team_slave_1 left promiscuous mode [ 350.934147] device team0 entered promiscuous mode [ 350.939185] device team_slave_0 entered promiscuous mode [ 350.944966] device team_slave_1 entered promiscuous mode [ 350.952783] 8021q: adding VLAN 0 to HW filter on device team0 [ 350.962918] device team0 left promiscuous mode [ 350.967645] device team_slave_0 left promiscuous mode [ 350.973244] device team_slave_1 left promiscuous mode 21:18:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)="c24c0ddce39d4ba807da1aaaabf714ab7b5b45c479adb1225f8288ae365986df1e70a82efaf625800ee96dd4e4f0c71b038b90bbb491c16e054ced4e5eb37dfbbedc8d05d61984e25d66d6303f2e74042098177375d2da57a807774bc1c8734a4e618e7d380608151c7dda52c5f95c31afba3847fd023c4bdb65dd5ad282d142944498203ffbb06186aec9ab80a0f1581366e1d494afb1bbc836aacdea2afed81676c02a80c47c9f3b1ce12e7228c318a4c058150bdf81944bd6d722d8624ab723", 0xc1, 0x1, 0x5}], 0x30000) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x404001) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:19 executing program 0: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$packet(0xffffffffffffff9c, 0x0, &(0x7f0000000080)) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000001c0)={'irlan0\x00', {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x16}}}) r1 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000040)=0x0) waitid(0x101, r3, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0x10e, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x3, 0x0, 0x0, 0x400000}}, 0xa0) [ 351.244934] device team0 entered promiscuous mode [ 351.249995] device team_slave_0 entered promiscuous mode [ 351.255799] device team_slave_1 entered promiscuous mode [ 351.263127] 8021q: adding VLAN 0 to HW filter on device team0 [ 351.276562] device team0 left promiscuous mode [ 351.281347] device team_slave_0 left promiscuous mode [ 351.286879] device team_slave_1 left promiscuous mode [ 351.313727] device team0 entered promiscuous mode [ 351.318819] device team_slave_0 entered promiscuous mode [ 351.324604] device team_slave_1 entered promiscuous mode [ 351.358937] 8021q: adding VLAN 0 to HW filter on device team0 [ 351.371153] device team0 left promiscuous mode [ 351.375937] device team_slave_0 left promiscuous mode [ 351.381493] device team_slave_1 left promiscuous mode [ 351.625777] device team0 entered promiscuous mode [ 351.630911] device team_slave_0 entered promiscuous mode [ 351.636721] device team_slave_1 entered promiscuous mode [ 351.647084] 8021q: adding VLAN 0 to HW filter on device team0 [ 351.656848] device team0 left promiscuous mode [ 351.661696] device team_slave_0 left promiscuous mode [ 351.667309] device team_slave_1 left promiscuous mode [ 351.689922] device team0 entered promiscuous mode [ 351.695100] device team_slave_0 entered promiscuous mode [ 351.700889] device team_slave_1 entered promiscuous mode [ 351.710274] 8021q: adding VLAN 0 to HW filter on device team0 [ 351.735563] device team0 left promiscuous mode [ 351.740350] device team_slave_0 left promiscuous mode [ 351.745911] device team_slave_1 left promiscuous mode [ 351.789803] device team0 entered promiscuous mode [ 351.794856] device team_slave_0 entered promiscuous mode [ 351.800654] device team_slave_1 entered promiscuous mode [ 351.836767] 8021q: adding VLAN 0 to HW filter on device team0 21:18:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x80000000, 0x400) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:20 executing program 7: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x10000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r1, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:20 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r2 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r3 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r4 = syz_open_dev$vcsn(&(0x7f0000000240)='/dev/vcs#\x00', 0x1f, 0x10000) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000340)) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r1) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x1c, &(0x7f0000000280)=[@in6={0xa, 0x4e20, 0xffff, @local, 0x3}]}, &(0x7f00000006c0)=0x10) r5 = socket(0x10, 0x802, 0x0) keyctl$read(0xb, r2, &(0x7f0000000540)=""/167, 0xa7) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f00000001c0)=0x0) rt_sigqueueinfo(r6, 0x2a, &(0x7f0000000200)={0x3d, 0x7, 0x2, 0x9}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:20 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='cpuset.effective_mems\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000300)={0x1, 0x6, 0xdf, {0x0, 0x1c9c380}, 0x1, 0x3ff}) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) r3 = getgid() r4 = getgid() getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) fstat(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = getgid() stat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r10 = getgid() setgroups(0x8, &(0x7f00000005c0)=[r3, r4, r5, r6, r7, r8, r9, r10]) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) fcntl$getownex(r0, 0x10, &(0x7f0000000600)) 21:18:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000240)='./file0\x00', 0x8) 21:18:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000300)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) clock_nanosleep(0x7, 0x1, &(0x7f0000000140)={0x77359400}, &(0x7f0000000180)) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) getsockopt$IP_VS_SO_GET_INFO(r1, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000100)=0xc) close(r1) accept$inet6(r2, &(0x7f0000000280)={0xa, 0x0, 0x0, @ipv4={[], [], @multicast2}}, &(0x7f00000002c0)=0x1c) socket$l2tp(0x18, 0x1, 0x1) flistxattr(r0, &(0x7f00000001c0)=""/78, 0x4e) 21:18:20 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)="c24c0ddce39d4ba807da1aaaabf714ab7b5b45c479adb1225f8288ae365986df1e70a82efaf625800ee96dd4e4f0c71b038b90bbb491c16e054ced4e5eb37dfbbedc8d05d61984e25d66d6303f2e74042098177375d2da57a807774bc1c8734a4e618e7d380608151c7dda52c5f95c31afba3847fd023c4bdb65dd5ad282d142944498203ffbb06186aec9ab80a0f1581366e1d494afb1bbc836aacdea2afed81676c02a80c47c9f3b1ce12e7228c318a4c058150bdf81944bd6d722d8624ab723", 0xc1, 0x1, 0x5}], 0x30000) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x404001) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 352.394965] device team0 left promiscuous mode [ 352.399795] device team_slave_0 left promiscuous mode [ 352.405381] device team_slave_1 left promiscuous mode [ 352.409242] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 352.476486] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:20 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c, 0x80800) getsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000200), &(0x7f0000000280)=0x4) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r0, 0x800448d2, &(0x7f0000000540)={0x4, &(0x7f00000002c0)=[{}, {}, {}, {}]}) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) lookup_dcookie(0x6c, &(0x7f0000000100)=""/187, 0xbb) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r2) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000580)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) [ 352.613639] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 352.676124] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:20 executing program 4: r0 = socket$packet(0x11, 0x5, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r0) [ 352.859260] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 352.970555] device team0 left promiscuous mode [ 352.975648] device team_slave_0 left promiscuous mode [ 352.981257] device team_slave_1 left promiscuous mode [ 352.992253] device team0 left promiscuous mode [ 352.997393] device team_slave_0 left promiscuous mode [ 353.004555] device team_slave_1 left promiscuous mode 21:18:21 executing program 0 (fault-call:4 fault-nth:0): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) [ 353.355096] FAULT_INJECTION: forcing a failure. [ 353.355096] name failslab, interval 1, probability 0, space 0, times 0 [ 353.366463] CPU: 0 PID: 13105 Comm: syz-executor0 Not tainted 4.18.0-rc8+ #34 [ 353.373766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 353.383151] Call Trace: [ 353.385821] dump_stack+0x17c/0x1c0 [ 353.389548] should_fail+0x867/0xaa0 [ 353.393333] __should_failslab+0x278/0x2a0 [ 353.397671] should_failslab+0x29/0x70 [ 353.401618] kmem_cache_alloc_node+0x156/0xc80 [ 353.406279] ? __alloc_skb+0x208/0x9b0 [ 353.410231] ? netlink_autobind+0x9ba/0xa10 [ 353.414647] __alloc_skb+0x208/0x9b0 [ 353.418426] netlink_sendmsg+0x776/0x1350 [ 353.422647] ? netlink_getsockopt+0x11c0/0x11c0 [ 353.427397] sock_write_iter+0x3b8/0x470 [ 353.431528] ? sock_read_iter+0x480/0x480 [ 353.435743] __vfs_write+0x7ac/0xa50 [ 353.439572] vfs_write+0x467/0x8c0 [ 353.443243] __x64_sys_write+0x1b7/0x3c0 [ 353.447365] ? ksys_write+0x340/0x340 [ 353.451224] do_syscall_64+0x15b/0x220 [ 353.455183] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 353.460407] RIP: 0033:0x457089 [ 353.463618] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 353.483445] RSP: 002b:00007f270f360c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 353.491249] RAX: ffffffffffffffda RBX: 00007f270f3616d4 RCX: 0000000000457089 [ 353.498564] RDX: 0000000000000027 RSI: 0000000020fa8000 RDI: 0000000000000004 [ 353.505869] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 353.513196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 353.520516] R13: 00000000004d6da0 R14: 00000000004c7bc7 R15: 0000000000000000 21:18:21 executing program 4: r0 = accept4$unix(0xffffffffffffffff, 0x0, &(0x7f00000001c0), 0x80800) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000200)=0x3) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000140)='/dev/rfkill\x00', 0x10840, 0x0) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000180)=0x8f8) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000380)={{0x88, @dev={0xac, 0x14, 0x14, 0x1f}, 0x4e22, 0x4, 'sed\x00', 0x1, 0xf80000000000000, 0x1a}, {@rand_addr=0x8, 0x4e21, 0x4, 0x0, 0x4, 0x6}}, 0x44) r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x14000, 0x20) ioctl$sock_kcm_SIOCKCMUNATTACH(r4, 0x89e1, &(0x7f0000000100)={r3}) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/net/pfkey\x00', 0x2000, 0x0) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f0000000440)='tls\x00', 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000280)={0x101, 0x0, 0x4, 0x4, 0xe0, 0x0, 0x80000000, 0x1, 0x0}, &(0x7f00000002c0)=0x20) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000300)={r6, 0x7}, &(0x7f0000000340)=0x8) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r7, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r3) [ 353.594576] device team0 entered promiscuous mode [ 353.599827] device team_slave_0 entered promiscuous mode [ 353.605607] device team_slave_1 entered promiscuous mode [ 353.613240] 8021q: adding VLAN 0 to HW filter on device team0 [ 353.624119] device team0 left promiscuous mode [ 353.629058] device team_slave_0 left promiscuous mode [ 353.634582] device team_slave_1 left promiscuous mode [ 353.729115] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:21 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x20c040, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 353.942611] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 353.957112] device team0 entered promiscuous mode [ 353.962128] device team_slave_0 entered promiscuous mode [ 353.967966] device team_slave_1 entered promiscuous mode [ 353.977108] 8021q: adding VLAN 0 to HW filter on device team0 [ 353.984948] device team0 entered promiscuous mode [ 353.990103] device team_slave_0 entered promiscuous mode [ 353.995910] device team_slave_1 entered promiscuous mode [ 354.006795] 8021q: adding VLAN 0 to HW filter on device team0 [ 354.015647] device team0 entered promiscuous mode [ 354.020723] device team_slave_0 entered promiscuous mode [ 354.026501] device team_slave_1 entered promiscuous mode 21:18:22 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x80000000, 0x400) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty, 0x1000}, 0x11) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) dup2(r0, r0) r3 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x80000, 0x0) ioctl$TIOCNOTTY(r3, 0x5422) [ 354.045486] 8021q: adding VLAN 0 to HW filter on device team0 [ 354.064940] device team0 left promiscuous mode [ 354.069914] device team_slave_0 left promiscuous mode [ 354.075449] device team_slave_1 left promiscuous mode 21:18:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x8, @mcast1, 0x8000}, 0x1c) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 354.354314] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000200)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xfffffffffffffc74) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x18402, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000280)=""/4096) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x406, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000100)={r1, r3, 0x9a7, 0x3, &(0x7f0000000040)="021c401f883075de982912fd5b9a1e89e80a5e9c8ce3695d", 0x9, 0x2, 0xc11, 0x6, 0x5, 0x2, 0x0, "90e7a15a97a55254ad5638fc01cee755db0304d2684b95e7161ba1bcbdd9fb7c4800aab97df6b7b9e6358562caa45cebd10fd26e675ffce6dc2e36d2e684d07c4cdfcc9b25864864e5f417dcc3ed8c28f00d27042e0311c0d859de0c3c17fce0792a59a860f02fcb24b7818065d6df315afbd2332f4f2c70ee32f48f310893753bb567c60fa070a0f5fd970a2754fdb220f6ae16844db9243d438d639396fb76fe1ac82282b47c20e5e2b87bea981969cbd9d9b9f8e404ddf558686b76d8a31e098b760246"}) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 354.447708] device team0 entered promiscuous mode [ 354.452822] device team_slave_0 entered promiscuous mode [ 354.458606] device team_slave_1 entered promiscuous mode [ 354.486967] 8021q: adding VLAN 0 to HW filter on device team0 21:18:22 executing program 7: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x10000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r1, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 354.508752] device team0 left promiscuous mode [ 354.513584] device team_slave_0 left promiscuous mode [ 354.519168] device team_slave_1 left promiscuous mode [ 354.540867] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:22 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)='./file0\x00') r3 = accept4(r2, &(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @host}, &(0x7f00000001c0)=0x80, 0x80800) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000280)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r3, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2800020}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x98, r4, 0x410, 0x70bd29, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x20}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@mcast2}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x2}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x82f}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipddp0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}]}, 0x98}}, 0x40) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) getsockopt$inet_sctp6_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000400)=@assoc_value, &(0x7f0000000440)=0x8) [ 354.806515] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 354.872532] device team0 left promiscuous mode [ 354.877378] device team_slave_0 left promiscuous mode [ 354.882993] device team_slave_1 left promiscuous mode [ 355.111411] device team0 entered promiscuous mode [ 355.116393] device team_slave_0 entered promiscuous mode [ 355.122250] device team_slave_1 entered promiscuous mode [ 355.129917] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.139366] device team0 left promiscuous mode [ 355.144261] device team_slave_0 left promiscuous mode [ 355.149773] device team_slave_1 left promiscuous mode [ 355.163765] device team0 entered promiscuous mode [ 355.168927] device team_slave_0 entered promiscuous mode [ 355.174687] device team_slave_1 entered promiscuous mode [ 355.192273] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.200946] device veth0_to_bridge entered promiscuous mode 21:18:23 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0), &(0x7f0000000200)=0x4) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) [ 355.211621] device team0 left promiscuous mode [ 355.216399] device team_slave_0 left promiscuous mode [ 355.221923] device team_slave_1 left promiscuous mode 21:18:23 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x8000, 0x0) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(0xffffffffffffffff, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x8, 0x3}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000000300)={r1, @in6={{0xa, 0x4e24, 0x1206, @local, 0x7}}, [0x6, 0x8001, 0x3f, 0x7, 0x5, 0x7, 0x3, 0x7, 0x2, 0x7, 0xaa, 0x2, 0xfff, 0x80000000, 0x8e]}, &(0x7f0000000400)=0x100) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getpeername(r0, &(0x7f0000000440)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000004c0)=0x80) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r2 = socket(0x8, 0x802, 0x9) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'tm0\a\x00\b\x00', 0x1100}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:18:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'security\x00'}, &(0x7f0000000240)=0x54) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000380)={0x7, 0x8, 0xfa00, {r3, 0x8}}, 0x10) 21:18:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)="c24c0ddce39d4ba807da1aaaabf714ab7b5b45c479adb1225f8288ae365986df1e70a82efaf625800ee96dd4e4f0c71b038b90bbb491c16e054ced4e5eb37dfbbedc8d05d61984e25d66d6303f2e74042098177375d2da57a807774bc1c8734a4e618e7d380608151c7dda52c5f95c31afba3847fd023c4bdb65dd5ad282d142944498203ffbb06186aec9ab80a0f1581366e1d494afb1bbc836aacdea2afed81676c02a80c47c9f3b1ce12e7228c318a4c058150bdf81944bd6d722d8624ab723", 0xc1, 0x1, 0x5}], 0x30000) r1 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x404001) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000080)=0x39f) 21:18:23 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0xa, 0x40004e22, 0x0, @mcast2, 0x4000}, 0xfffffffffffffde1) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:23 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) sched_yield() r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x4042, 0x0) write$P9_RLOPEN(r0, &(0x7f0000000080)={0x18, 0xd, 0x2, {{0xc2, 0x4, 0x8}, 0x8}}, 0x18) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = socket(0x4, 0x7fc, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f00000001c0)={0x32, 0xfff, 0x3}, 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000300)={"7465616d300000ffffffc000", 0x10000004bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 355.610694] device team0 entered promiscuous mode [ 355.615665] device team_slave_0 entered promiscuous mode [ 355.621446] device team_slave_1 entered promiscuous mode [ 355.628764] 8021q: adding VLAN 0 to HW filter on device team0 [ 355.643207] device team0 left promiscuous mode [ 355.647919] device team_slave_0 left promiscuous mode [ 355.653450] device team_slave_1 left promiscuous mode [ 356.041920] device team0 entered promiscuous mode [ 356.047118] device team_slave_0 entered promiscuous mode [ 356.052966] device team_slave_1 entered promiscuous mode [ 356.062145] 8021q: adding VLAN 0 to HW filter on device team0 [ 356.070353] device veth0_to_bridge left promiscuous mode [ 356.078960] device team0 left promiscuous mode [ 356.083752] device team_slave_0 left promiscuous mode [ 356.089372] device team_slave_1 left promiscuous mode 21:18:24 executing program 0 (fault-call:4 fault-nth:1): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:24 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000240)='./file0\x00', 0x8) 21:18:24 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x7f, 0x8001) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) fstatfs(r0, &(0x7f0000000300)=""/88) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:18:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:24 executing program 7: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x80000000000002, &(0x7f0000000140)=0x78, 0x4) bind$inet(r1, &(0x7f0000deb000)={0x2, 0x4e23, @multicast1}, 0x10) socketpair$unix(0x1, 0x10000000003, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='hybla\x00', 0x6) sendto$inet(r1, &(0x7f0000a88f88), 0xfffffffffffffe6e, 0x20000000, &(0x7f0000e68000)={0x2, 0x4004e23, @local}, 0x10) shutdown(r1, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 356.222392] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 356.298635] FAULT_INJECTION: forcing a failure. [ 356.298635] name failslab, interval 1, probability 0, space 0, times 0 [ 356.310173] CPU: 1 PID: 13203 Comm: syz-executor0 Not tainted 4.18.0-rc8+ #34 [ 356.317478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 356.326857] Call Trace: [ 356.329516] dump_stack+0x17c/0x1c0 [ 356.333195] should_fail+0x867/0xaa0 [ 356.337006] __should_failslab+0x278/0x2a0 [ 356.341313] should_failslab+0x29/0x70 [ 356.345265] __kmalloc_node_track_caller+0x23f/0x11d0 [ 356.350567] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 356.356006] ? netlink_sendmsg+0x776/0x1350 [ 356.360429] __alloc_skb+0x2ce/0x9b0 [ 356.364196] ? netlink_sendmsg+0x776/0x1350 [ 356.368583] netlink_sendmsg+0x776/0x1350 [ 356.372807] ? netlink_getsockopt+0x11c0/0x11c0 [ 356.377557] sock_write_iter+0x3b8/0x470 [ 356.381683] ? sock_read_iter+0x480/0x480 [ 356.385883] __vfs_write+0x7ac/0xa50 [ 356.389681] vfs_write+0x467/0x8c0 [ 356.393326] __x64_sys_write+0x1b7/0x3c0 [ 356.397449] ? ksys_write+0x340/0x340 [ 356.401295] do_syscall_64+0x15b/0x220 [ 356.405242] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 356.410465] RIP: 0033:0x457089 [ 356.413672] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 356.433415] RSP: 002b:00007f270f360c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 356.441185] RAX: ffffffffffffffda RBX: 00007f270f3616d4 RCX: 0000000000457089 [ 356.448489] RDX: 0000000000000027 RSI: 0000000020fa8000 RDI: 0000000000000004 [ 356.455797] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 356.463100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 356.470439] R13: 00000000004d6da0 R14: 00000000004c7bc7 R15: 0000000000000001 21:18:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000100)={'mangle\x00', 0x3, [{}, {}, {}]}, 0x58) ioctl$sock_ifreq(r0, 0x89b7, &(0x7f0000000040)={'bcsf0\x00', @ifru_ivalue}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 356.544343] device team0 left promiscuous mode [ 356.549126] device team_slave_0 left promiscuous mode [ 356.554586] device team_slave_1 left promiscuous mode 21:18:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)="c24c0ddce39d4ba807da1aaaabf714ab7b5b45c479adb1225f8288ae365986df1e70a82efaf625800ee96dd4e4f0c71b038b90bbb491c16e054ced4e5eb37dfbbedc8d05d61984e25d66d6303f2e74042098177375d2da57a807774bc1c8734a4e618e7d380608151c7dda52c5f95c31afba3847fd023c4bdb65dd5ad282d142944498203ffbb06186aec9ab80a0f1581366e1d494afb1bbc836aacdea2afed81676c02a80c47c9f3b1ce12e7228c318a4c058150bdf81944bd6d722d8624ab723", 0xc1, 0x1, 0x5}], 0x30000) syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x4, 0x404001) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 356.641599] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:24 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) creat(&(0x7f00000001c0)='./file0\x00', 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x2, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2282, &(0x7f0000000180)) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r2, 0x29, 0x45, &(0x7f0000000040)={'HL\x00'}, &(0x7f0000000100)=0x1e) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r2) [ 356.917104] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 356.955786] device team0 entered promiscuous mode [ 356.961826] device team_slave_0 entered promiscuous mode [ 356.967610] device team_slave_1 entered promiscuous mode [ 356.979424] 8021q: adding VLAN 0 to HW filter on device team0 [ 356.989104] device team0 entered promiscuous mode [ 356.994087] device team_slave_0 entered promiscuous mode [ 356.999896] device team_slave_1 entered promiscuous mode [ 357.007594] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 357.009827] 8021q: adding VLAN 0 to HW filter on device team0 [ 357.026211] device team0 entered promiscuous mode [ 357.031159] device team_slave_0 entered promiscuous mode [ 357.036987] device team_slave_1 entered promiscuous mode [ 357.047636] 8021q: adding VLAN 0 to HW filter on device team0 [ 357.060820] device team0 left promiscuous mode 21:18:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = semget(0x3, 0x3, 0x8) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000280)={{{@in=@local, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@remote}}, &(0x7f0000000380)=0xe8) fstat(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000440)={{0x83, r2, r4, r5, r6, 0x40, 0x4}, 0x6, 0x2807, 0x8e}) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000500)={&(0x7f00000004c0)='./file0\x00', 0x0, 0x2b5e8ff9ba05dd39}, 0x10) bind$inet6(r7, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r7, 0x0) fchown(r7, r5, r3) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r8, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r9 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000540)='/dev/hwrng\x00', 0x80000, 0x0) setsockopt$RDS_RECVERR(r9, 0x114, 0x5, &(0x7f0000000580), 0x4) close(r7) [ 357.065764] device team_slave_0 left promiscuous mode [ 357.071336] device team_slave_1 left promiscuous mode [ 357.157639] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 357.226898] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 357.363136] device team0 entered promiscuous mode [ 357.368266] device team_slave_0 entered promiscuous mode [ 357.374089] device team_slave_1 entered promiscuous mode [ 357.381519] 8021q: adding VLAN 0 to HW filter on device team0 [ 357.389149] device team0 left promiscuous mode [ 357.393875] device team_slave_0 left promiscuous mode [ 357.399438] device team_slave_1 left promiscuous mode 21:18:25 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) flock(r0, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xdf) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) getsockopt$inet_mreqn(r2, 0x0, 0x24, &(0x7f00000002c0)={@broadcast, @dev}, &(0x7f0000000300)=0xc) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup(r3) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000140)={r5, 0xff, 0x10}, 0xc) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:25 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = syz_open_dev$vcsa(&(0x7f0000000200)='/dev/vcsa#\x00', 0x5, 0x200) mknodat(r0, &(0x7f0000000240)='./file0\x00', 0x9020, 0xfa) r1 = socket(0x10, 0x802, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x400000, 0x0) ioctl$VT_WAITACTIVE(r2, 0x5607) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000340)={'ifb0\x00', 0xffffffffffffffff}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 357.585440] device team0 left promiscuous mode [ 357.590342] device team_slave_0 left promiscuous mode [ 357.595874] device team_slave_1 left promiscuous mode [ 357.608317] device team0 left promiscuous mode [ 357.613050] device team_slave_0 left promiscuous mode [ 357.618615] device team_slave_1 left promiscuous mode [ 357.691313] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 357.748285] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:25 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) write$FUSE_LK(r2, &(0x7f0000000140)={0x28, 0xffffffffffffffda, 0x7, {{0xfffffffffffffff8, 0x1476, 0x2, r3}}}, 0x28) flistxattr(r0, &(0x7f0000000180)=""/84, 0x54) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) [ 357.924809] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 357.987425] device veth0_to_bridge entered promiscuous mode [ 357.993901] device team0 entered promiscuous mode [ 357.999092] device team_slave_0 entered promiscuous mode [ 358.004836] device team_slave_1 entered promiscuous mode [ 358.017177] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.028731] device team0 entered promiscuous mode 21:18:26 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$packet(0x11, 0x3, 0x300) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 358.033736] device team_slave_0 entered promiscuous mode [ 358.039580] device team_slave_1 entered promiscuous mode [ 358.063473] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.077471] device team0 left promiscuous mode [ 358.082260] device team_slave_0 left promiscuous mode 21:18:26 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{0x0, 0x0, 0x0, 0x2}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'veth0_to_team\x00', 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 358.087820] device team_slave_1 left promiscuous mode [ 358.143158] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:26 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000240)='./file0\x00', 0x8) [ 358.498742] device team0 entered promiscuous mode [ 358.503737] device team_slave_0 entered promiscuous mode [ 358.509568] device team_slave_1 entered promiscuous mode [ 358.517995] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.526677] device team0 entered promiscuous mode [ 358.531854] device team_slave_0 entered promiscuous mode [ 358.537663] device team_slave_1 entered promiscuous mode [ 358.548217] 8021q: adding VLAN 0 to HW filter on device team0 [ 358.562478] device team0 left promiscuous mode [ 358.567442] device team_slave_0 left promiscuous mode [ 358.572988] device team_slave_1 left promiscuous mode [ 358.802688] device team0 left promiscuous mode [ 358.807453] device team_slave_0 left promiscuous mode [ 358.812955] device team_slave_1 left promiscuous mode [ 358.981115] device team0 entered promiscuous mode [ 358.986291] device team_slave_0 entered promiscuous mode [ 358.992145] device team_slave_1 entered promiscuous mode [ 358.999565] 8021q: adding VLAN 0 to HW filter on device team0 [ 359.008120] device team0 left promiscuous mode [ 359.012896] device team_slave_0 left promiscuous mode [ 359.018407] device team_slave_1 left promiscuous mode [ 359.025925] device veth0_to_bridge left promiscuous mode [ 359.033556] device team0 left promiscuous mode [ 359.038369] device team_slave_0 left promiscuous mode [ 359.043923] device team_slave_1 left promiscuous mode 21:18:27 executing program 0 (fault-call:4 fault-nth:2): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x80000, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x8, 0x80000) ioctl$sock_kcm_SIOCKCMCLONE(r1, 0x89e2, &(0x7f0000000040)={r0}) getsockopt$inet_sctp6_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl(r2, 0x0, &(0x7f00000003c0)="5e951daad56298703c2d10fc01365bef6a7d689675b17d3523c8a6d2ec7153ccb076c1d02e1b2da700b4728748c3ded4ee7411e9a2a1bba4776353cb1d3e510c2877858488dc92fa03070df1ff8086c3fca948ef9347d91ed15d4334c7a053a057b7252a0389e39e5ad072cfc217777761c5a92d419d0f640b994a4661fe9e4684b29151446cd78ed970630730e66077da2331ebee52b5eb407f054dc6ea9e81013540fdb56f3ccf3e4ccf917a4eebf34b2bf55e3263c72b1b3e7db82fe1a695821f9c9097a938b8358d09a43f6308dafe2698831494f96f5f966ba86f8e043475e00452a07fbcd3d7cfbbb6b858b7852b7e805a5819b71d") bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @mcast2}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x80000, 0xa0) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r5, 0xc1205531, &(0x7f0000000280)={0x80, 0x3, 0x7ff8000000000, 0xfffffffffffff9b2, [], [], [], 0x3, 0x3, 0x8, 0xf15, "29d90d7122de58e82134343b7c2b12c2"}) close(r3) 21:18:27 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) write$FUSE_LK(r2, &(0x7f0000000140)={0x28, 0xffffffffffffffda, 0x7, {{0xfffffffffffffff8, 0x1476, 0x2, r3}}}, 0x28) flistxattr(r0, &(0x7f0000000180)=""/84, 0x54) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 21:18:27 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)="c24c0ddce39d4ba807da1aaaabf714ab7b5b45c479adb1225f8288ae365986df1e70a82efaf625800ee96dd4e4f0c71b038b90bbb491c16e054ced4e5eb37dfbbedc8d05d61984e25d66d6303f2e74042098177375d2da57a807774bc1c8734a4e618e7d380608151c7dda52c5f95c31afba3847fd023c4bdb65dd5ad282d142944498203ffbb06186aec9ab80a0f1581366e1d494afb1bbc836aacdea2afed81676c02a80c47c9f3b1ce12e7228c318a4c058150bdf81944bd6d722d8624ab723", 0xc1, 0x1, 0x5}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 359.262455] FAULT_INJECTION: forcing a failure. [ 359.262455] name failslab, interval 1, probability 0, space 0, times 0 [ 359.273963] CPU: 0 PID: 13280 Comm: syz-executor0 Not tainted 4.18.0-rc8+ #34 [ 359.281272] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 359.290650] Call Trace: [ 359.293311] dump_stack+0x17c/0x1c0 [ 359.296991] should_fail+0x867/0xaa0 [ 359.300774] __should_failslab+0x278/0x2a0 [ 359.305103] should_failslab+0x29/0x70 [ 359.309052] kmem_cache_alloc_node+0x156/0xc80 [ 359.313684] ? __alloc_skb+0x208/0x9b0 [ 359.317493] device veth0_to_team entered promiscuous mode [ 359.317636] __alloc_skb+0x208/0x9b0 [ 359.325372] device team0 entered promiscuous mode [ 359.326937] netlink_dump+0x37e/0x1500 [ 359.327027] __netlink_dump_start+0x10fd/0x1230 [ 359.327095] packet_diag_handler_dump+0x2bd/0x2d0 [ 359.331956] device team_slave_0 entered promiscuous mode [ 359.335824] ? packet_diag_handler_dump+0x2d0/0x2d0 [ 359.335888] ? packet_sendmsg_spkt+0x1ca0/0x1ca0 [ 359.340852] device team_slave_1 entered promiscuous mode [ 359.345450] sock_diag_rcv_msg+0x221/0x5d0 [ 359.345528] netlink_rcv_skb+0x36e/0x5f0 [ 359.354352] 8021q: adding VLAN 0 to HW filter on device team0 [ 359.356020] ? sock_diag_bind+0x170/0x170 [ 359.356087] sock_diag_rcv+0x63/0x80 [ 359.388443] netlink_unicast+0x1492/0x1740 [ 359.392727] ? diag_net_exit+0x90/0x90 [ 359.396661] netlink_sendmsg+0x114c/0x1350 [ 359.400938] ? netlink_getsockopt+0x11c0/0x11c0 [ 359.405663] sock_write_iter+0x3b8/0x470 [ 359.409777] ? sock_read_iter+0x480/0x480 [ 359.413964] __vfs_write+0x7ac/0xa50 [ 359.417735] vfs_write+0x467/0x8c0 [ 359.421365] __x64_sys_write+0x1b7/0x3c0 [ 359.425479] ? ksys_write+0x340/0x340 [ 359.429323] do_syscall_64+0x15b/0x220 [ 359.433259] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 359.438477] RIP: 0033:0x457089 [ 359.441686] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 21:18:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) llistxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0) 21:18:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000240)='./file0\x00', 0x8) [ 359.461392] RSP: 002b:00007f270f360c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 359.469150] RAX: ffffffffffffffda RBX: 00007f270f3616d4 RCX: 0000000000457089 [ 359.476449] RDX: 0000000000000027 RSI: 0000000020fa8000 RDI: 0000000000000004 [ 359.483752] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 359.491053] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 359.498360] R13: 00000000004d6da0 R14: 00000000004c7bc7 R15: 0000000000000002 21:18:27 executing program 3: r0 = open(&(0x7f0000000240)='./file0\x00', 0x2, 0x80) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000001c0)=0x0) sched_setaffinity(r1, 0x8, &(0x7f0000000200)=0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$UI_BEGIN_FF_UPLOAD(r0, 0xc06855c8, &(0x7f0000000340)={0x7, 0x8, {0x57, 0x8000, 0xb38, {0x8, 0x400}, {0x7, 0x7}, @const={0x4, {0x1, 0x2, 0x4, 0x7}}}, {0x53, 0xf2, 0x614, {0x0, 0x80000000}, {0x5, 0x6}, @cond=[{0x8001, 0x9, 0x9, 0x80000001, 0x0, 0x7fff}, {0x3, 0x8, 0x7f, 0xaa, 0x9, 0xffffffffffffff80}]}}) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) r3 = semget$private(0x0, 0x2, 0x0) semctl$SETVAL(r3, 0x0, 0x10, &(0x7f0000000280)=0x2) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 359.515247] device team0 left promiscuous mode [ 359.519963] device team_slave_0 left promiscuous mode [ 359.525479] device team_slave_1 left promiscuous mode [ 359.620072] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:27 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) ioctl(r0, 0x6, &(0x7f0000000180)="0afa578883") close(r1) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x7, 0x1) ioctl(r0, 0x9, &(0x7f0000000280)="93ad6151220183d37c37c45c119316cbdb55a8a9e91945090732cfd276408ec76f5d781e6fbcae6490a56209a4f17aadf594b5913c53c5caf9496b9c2721316826b5ae829c460b963269c6af894be95cfdc50cdd5c069a1b07e402b3213a05478dd6146a99ecf78d457889d04fa379063677639c2cb4f00cb47ba8d17af2ab92bbf2e9857ba04632725e56c7ae86f477c5ce0243d480e0b5b4979c38b329ed") write$FUSE_NOTIFY_DELETE(r3, &(0x7f0000000100)={0x46, 0x6, 0x0, {0x2, 0x6, 0x1d, 0x0, "766d6e657431656d305e76626f786e6574306e6f646576f470726f635e"}}, 0x46) [ 359.890703] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 359.927694] device veth0_to_bridge entered promiscuous mode [ 359.935415] device team0 left promiscuous mode [ 359.940319] device team_slave_0 left promiscuous mode [ 359.945857] device team_slave_1 left promiscuous mode 21:18:28 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x80, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x641, 0x0, 0x0, 0x81, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f00000001c0)={r0, 0xd1}, 0x8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:28 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) getsockopt$sock_int(r0, 0x1, 0x2c, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket(0x10, 0x802, 0x0) r2 = syz_open_dev$dspn(&(0x7f00000001c0)='/dev/dsp#\x00', 0x7, 0x10000) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000300)={0x2, 0x3, 0x7f}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:18:28 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) write$FUSE_LK(r2, &(0x7f0000000140)={0x28, 0xffffffffffffffda, 0x7, {{0xfffffffffffffff8, 0x1476, 0x2, r3}}}, 0x28) flistxattr(r0, &(0x7f0000000180)=""/84, 0x54) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 21:18:28 executing program 4: r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x1000000004e21, 0x0, @loopback, 0x2}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) kcmp(r2, r3, 0x1, r0, r0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 360.315332] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) ioctl$sock_proto_private(r0, 0x89e6, &(0x7f0000000100)="8ad5ea806a869aefb4929af0e7e3fca64b4ea86898b2530925783eaa9fdca524832de49b568c9f63c874d2c0dddbd985252aa9f102dc9571a1c260bec36f391ffa15fe26a02f48151fd94ccb") setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 360.520298] device team0 entered promiscuous mode [ 360.525434] device team_slave_0 entered promiscuous mode [ 360.531327] device team_slave_1 entered promiscuous mode [ 360.550873] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.558607] device team0 entered promiscuous mode [ 360.563584] device team_slave_0 entered promiscuous mode [ 360.566151] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.569407] device team_slave_1 entered promiscuous mode [ 360.587602] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.613184] device veth0_to_bridge left promiscuous mode [ 360.619425] device team0 entered promiscuous mode [ 360.624399] device team_slave_0 entered promiscuous mode [ 360.630299] device team_slave_1 entered promiscuous mode 21:18:28 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f00000001c0)={'security\x00'}, &(0x7f0000000240)=0x54) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000280)={0xffffffffffffffff}, 0x2, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f0000000380)={0x7, 0x8, 0xfa00, {r3, 0x8}}, 0x10) [ 360.654314] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.691183] device team0 entered promiscuous mode [ 360.696200] device team_slave_0 entered promiscuous mode [ 360.701992] device team_slave_1 entered promiscuous mode 21:18:28 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x80000, 0x4) ioctl$UI_SET_FFBIT(r3, 0x4004556b, 0xd) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:28 executing program 0 (fault-call:4 fault-nth:3): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) [ 360.756905] 8021q: adding VLAN 0 to HW filter on device team0 [ 360.791797] device team0 left promiscuous mode [ 360.796580] device team_slave_0 left promiscuous mode [ 360.802234] device team_slave_1 left promiscuous mode [ 360.858444] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 360.924181] FAULT_INJECTION: forcing a failure. [ 360.924181] name failslab, interval 1, probability 0, space 0, times 0 [ 360.935607] CPU: 1 PID: 13346 Comm: syz-executor0 Not tainted 4.18.0-rc8+ #34 [ 360.942928] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 360.952322] Call Trace: [ 360.954995] dump_stack+0x17c/0x1c0 [ 360.958698] should_fail+0x867/0xaa0 [ 360.962510] __should_failslab+0x278/0x2a0 [ 360.966811] should_failslab+0x29/0x70 [ 360.970792] __kmalloc_node_track_caller+0x23f/0x11d0 [ 360.976070] ? __msan_metadata_ptr_for_load_4+0x10/0x20 [ 360.981517] ? netlink_dump+0x37e/0x1500 [ 360.985653] __alloc_skb+0x2ce/0x9b0 [ 360.989415] ? netlink_dump+0x37e/0x1500 [ 360.993537] netlink_dump+0x37e/0x1500 [ 360.997544] __netlink_dump_start+0x10fd/0x1230 [ 361.002303] packet_diag_handler_dump+0x2bd/0x2d0 [ 361.007201] ? packet_diag_handler_dump+0x2d0/0x2d0 [ 361.012269] ? packet_sendmsg_spkt+0x1ca0/0x1ca0 [ 361.017103] sock_diag_rcv_msg+0x221/0x5d0 [ 361.021429] netlink_rcv_skb+0x36e/0x5f0 [ 361.025565] ? sock_diag_bind+0x170/0x170 [ 361.029794] sock_diag_rcv+0x63/0x80 [ 361.033563] netlink_unicast+0x1492/0x1740 [ 361.037856] ? diag_net_exit+0x90/0x90 [ 361.041818] netlink_sendmsg+0x114c/0x1350 [ 361.046116] ? netlink_getsockopt+0x11c0/0x11c0 [ 361.050867] sock_write_iter+0x3b8/0x470 [ 361.055003] ? sock_read_iter+0x480/0x480 [ 361.059212] __vfs_write+0x7ac/0xa50 [ 361.062997] vfs_write+0x467/0x8c0 [ 361.066653] __x64_sys_write+0x1b7/0x3c0 [ 361.070775] ? ksys_write+0x340/0x340 [ 361.074618] do_syscall_64+0x15b/0x220 [ 361.078577] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 361.083801] RIP: 0033:0x457089 [ 361.087009] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 361.106744] RSP: 002b:00007f270f360c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 361.114508] RAX: ffffffffffffffda RBX: 00007f270f3616d4 RCX: 0000000000457089 [ 361.121829] RDX: 0000000000000027 RSI: 0000000020fa8000 RDI: 0000000000000004 [ 361.129155] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 361.136459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 361.143761] R13: 00000000004d6da0 R14: 00000000004c7bc7 R15: 0000000000000003 [ 361.230871] device team0 entered promiscuous mode [ 361.235954] device team_slave_0 entered promiscuous mode [ 361.241760] device team_slave_1 entered promiscuous mode [ 361.251976] 8021q: adding VLAN 0 to HW filter on device team0 21:18:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$full(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/full\x00', 0x20000, 0x0) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000380)={@dev, 0x0}, &(0x7f00000003c0)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r0, 0x8936, &(0x7f0000000400)={@empty, 0x66, r1}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) accept$inet(r2, &(0x7f0000000340)={0x2, 0x0, @broadcast}, &(0x7f0000000280)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r3 = socket(0x2, 0x802, 0x40) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 361.281450] device team0 left promiscuous mode [ 361.286333] device team_slave_0 left promiscuous mode [ 361.291884] device team_slave_1 left promiscuous mode 21:18:29 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) write$FUSE_LK(r2, &(0x7f0000000140)={0x28, 0xffffffffffffffda, 0x7, {{0xfffffffffffffff8, 0x1476, 0x2, r3}}}, 0x28) flistxattr(r0, &(0x7f0000000180)=""/84, 0x54) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 21:18:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000100)={0xa, 0x4e22}, 0xfffffffffffffcc4) listen(r1, 0xff) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x200000, 0x0) ioctl$UI_SET_PROPBIT(r3, 0x4004556e, 0x10) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:29 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='schedstat\x00') ioctl$SNDRV_CTL_IOCTL_HWDEP_INFO(r2, 0x80dc5521, &(0x7f0000000100)=""/132) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x6, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0xb001}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f00000001c0)={r1, @in6={{0xa, 0x4e23, 0x401, @remote, 0x90f9}}}, 0x84) [ 361.783459] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:29 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000200)='/dev/dsp\x00', 0x400c1, 0x0) getsockopt$ARPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x63, &(0x7f0000000240)={'HL\x00'}, &(0x7f0000000280)=0x1e) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x102, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000700)=""/4096) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 361.854698] device team0 left promiscuous mode [ 361.857082] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 361.859518] device team_slave_0 left promiscuous mode [ 361.875367] device team_slave_1 left promiscuous mode [ 362.156203] device team0 entered promiscuous mode [ 362.161346] device team_slave_0 entered promiscuous mode [ 362.167252] device team_slave_1 entered promiscuous mode [ 362.175274] 8021q: adding VLAN 0 to HW filter on device team0 [ 362.183478] device team0 entered promiscuous mode [ 362.188572] device team_slave_0 entered promiscuous mode [ 362.194385] device team_slave_1 entered promiscuous mode 21:18:30 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340)='/dev/vga_arbiter\x00', 0x1, 0x0) accept4$vsock_stream(r0, &(0x7f0000000380)={0x28, 0x0, 0x0, @my=0x1}, 0x10, 0x800) r1 = memfd_create(&(0x7f0000000580)='\x00', 0x1) ioctl$SNDRV_TIMER_IOCTL_STOP(r1, 0x54a1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) prctl$getname(0x10, &(0x7f0000000200)=""/168) [ 362.206150] 8021q: adding VLAN 0 to HW filter on device team0 [ 362.218578] device team0 left promiscuous mode [ 362.223406] device team_slave_0 left promiscuous mode [ 362.229093] device team_slave_1 left promiscuous mode [ 362.277351] device team0 entered promiscuous mode [ 362.282423] device team_slave_0 entered promiscuous mode [ 362.288296] device team_slave_1 entered promiscuous mode [ 362.330707] 8021q: adding VLAN 0 to HW filter on device team0 [ 362.352730] device veth0_to_bridge entered promiscuous mode [ 362.361393] device team0 left promiscuous mode [ 362.366176] device team_slave_0 left promiscuous mode [ 362.371703] device team_slave_1 left promiscuous mode 21:18:30 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='(\x00'}, 0x10) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="c8000000b6f2280ddcf47f2fb1528983277c76558fd73548d8a506075402c48e36a2db03252bccb41df96f63f4964065440b8b35e2b41847aa2df79e8c008a03f91d1d8aa48168938746d5b2203e68a9bebf499205721fb337e3eb4b36f025e0dd9221703fd0bd155a0488219762ae7a10ba1c35488b5049ef83ff391f88484d5ef5dba88bae5f379899f325acccccd7e26727009d5c0ddae1ad42e61e59a3ae9be72e89635982edde55726ddf22b29a2b7a3c92b21e3023306f71eb443ecbbc3441e949575374a096880000"], &(0x7f0000000440)=0xd0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={r3, @in={{0x2, 0x4e20, @remote}}, [0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r4 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_tcp_SIOCATMARK(r2, 0x8905, &(0x7f0000000040)) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) keyctl$revoke(0x3, r0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) ioctl$sock_inet_SIOCGIFADDR(r1, 0x8915, &(0x7f0000000480)={'gre0\x00', {0x2, 0x4e24, @broadcast}}) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000300)={0x101, 0x275}) 21:18:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x2}, 0xfffffffffffffe81) syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x5, 0x0) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:30 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000200)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xfffffffffffffc74) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x18402, 0x0) ioctl$EVIOCGNAME(r2, 0x80404506, &(0x7f0000000280)=""/4096) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x406, r0) ioctl$sock_bt_hidp_HIDPCONNADD(r4, 0x400448c8, &(0x7f0000000100)={r1, r3, 0x9a7, 0x3, &(0x7f0000000040)="021c401f883075de982912fd5b9a1e89e80a5e9c8ce3695d", 0x9, 0x2, 0xc11, 0x6, 0x5, 0x2, 0x0, "90e7a15a97a55254ad5638fc01cee755db0304d2684b95e7161ba1bcbdd9fb7c4800aab97df6b7b9e6358562caa45cebd10fd26e675ffce6dc2e36d2e684d07c4cdfcc9b25864864e5f417dcc3ed8c28f00d27042e0311c0d859de0c3c17fce0792a59a860f02fcb24b7818065d6df315afbd2332f4f2c70ee32f48f310893753bb567c60fa070a0f5fd970a2754fdb220f6ae16844db9243d438d639396fb76fe1ac82282b47c20e5e2b87bea981969cbd9d9b9f8e404ddf558686b76d8a31e098b760246"}) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:30 executing program 7: r0 = memfd_create(&(0x7f0000000040)='/dev/input/mice\x00', 0x0) fcntl$setown(r0, 0x8, 0x0) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x7, &(0x7f0000000000)={0x7}, 0x4) r1 = getpgid(0x0) fcntl$setown(r0, 0x8, r1) [ 362.499831] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:30 executing program 7: r0 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_VSOCK_SET_GUEST_CID(r0, 0x4008af60, &(0x7f0000000040)={@my=0x0}) r1 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_dgram(r1, &(0x7f0000000200)={0x28, 0x0, 0x0, @my=0x0}, 0x10) r2 = dup2(r1, r0) setsockopt$SO_VM_SOCKETS_CONNECT_TIMEOUT(r2, 0x28, 0x6, &(0x7f0000000180)={0x0, 0x7530}, 0x10) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000001c0)={r2, 0x6, 0x1, 0x12, &(0x7f0000000080)=[0x0, 0x0], 0x2}, 0x20) connect$vsock_dgram(r2, &(0x7f0000000240)={0x28, 0x0, 0xffffffffffffffff, @hyper}, 0xfffffffffffffee7) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'teql0\x00', 0x0}) sendto$packet(r2, &(0x7f00000000c0)="9baf3a555ab3050a1cfc4885578cfdd3a9570d6310a53a599f6483713a75b0ed851c1812b9194c9b606bd318f1", 0x2d, 0x0, &(0x7f0000000140)={0x11, 0x6, r3, 0x1, 0x9, 0x6, @local}, 0x14) 21:18:30 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x0, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:30 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000004fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = socket(0xa, 0x1, 0x0) getsockopt$inet6_int(r1, 0x6, 0x21, &(0x7f0000000040), &(0x7f0000013000)=0x4) mmap(&(0x7f0000000000/0xfe3000)=nil, 0xfe3000, 0x3, 0x32, 0xffffffffffffffff, 0x0) close(r0) [ 362.746426] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 363.004156] device team0 entered promiscuous mode [ 363.009368] device team_slave_0 entered promiscuous mode [ 363.015223] device team_slave_1 entered promiscuous mode [ 363.023151] 8021q: adding VLAN 0 to HW filter on device team0 [ 363.035526] device team0 left promiscuous mode [ 363.040628] device team_slave_0 left promiscuous mode [ 363.047661] device team_slave_1 left promiscuous mode [ 363.291129] device veth0_to_bridge left promiscuous mode [ 363.297625] device team0 entered promiscuous mode [ 363.302616] device team_slave_0 entered promiscuous mode [ 363.308356] device team_slave_1 entered promiscuous mode [ 363.315609] 8021q: adding VLAN 0 to HW filter on device team0 [ 363.323717] device team0 left promiscuous mode [ 363.328470] device team_slave_0 left promiscuous mode [ 363.334053] device team_slave_1 left promiscuous mode 21:18:31 executing program 0 (fault-call:4 fault-nth:4): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:31 executing program 5: unshare(0x24020400) unshare(0x24020400) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') unshare(0x20400) 21:18:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) pipe2(&(0x7f0000000180)={0xffffffffffffffff}, 0x80800) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0xca, &(0x7f00000001c0)={0x965d, 0x1, 0x4, 0x8, 0xf72}, 0xc) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) ioctl$TIOCSBRK(r1, 0x5427) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockname(r2, &(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, &(0x7f0000000040)=0x80) sendto$inet6(r3, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x6c6}, 0x1c) close(r2) 21:18:31 executing program 2: ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)="c24c0ddce39d4ba807da1aaaabf714ab7b5b45c479adb1225f8288ae365986df1e70a82efaf625800ee96dd4e4f0c71b038b90bbb491c16e054ced4e5eb37dfbbedc8d05d61984e25d66d6303f2e74042098177375d2da57a807774bc1c8734a4e618e7d380608151c7dda52c5f95c31afba3847fd023c4bdb65dd5ad282d142944498203ffbb06186aec9ab80a0f1581366e1d494afb1bbc836aacdea2afed81676c02a80c47c9f3b1ce12e7228c318a4c058150bdf81944bd6d722d8624ab723", 0xc1, 0x1, 0x5}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 363.341959] device team0 entered promiscuous mode [ 363.346988] device team_slave_0 entered promiscuous mode [ 363.352910] device team_slave_1 entered promiscuous mode [ 363.361833] 8021q: adding VLAN 0 to HW filter on device team0 [ 363.412490] device team0 left promiscuous mode [ 363.417326] device team_slave_0 left promiscuous mode [ 363.422932] device team_slave_1 left promiscuous mode 21:18:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(0xffffffffffffffff, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)="c24c0ddce39d4ba807da1aaaabf714ab7b5b45c479adb1225f8288ae365986df1e70a82efaf625800ee96dd4e4f0c71b038b90bbb491c16e054ced4e5eb37dfbbedc8d05d61984e25d66d6303f2e74042098177375d2da57a807774bc1c8734a4e618e7d380608151c7dda52c5f95c31afba3847fd023c4bdb65dd5ad282d142944498203ffbb06186aec9ab80a0f1581366e1d494afb1bbc836aacdea2afed81676c02a80c47c9f3b1ce12e7228c318a4c058150bdf81944bd6d722d8624ab723", 0xc1, 0x1, 0x5}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:31 executing program 5: unshare(0x24020400) unshare(0x24020400) syz_genetlink_get_family_id$fou(&(0x7f0000000000)='fou\x00') unshare(0x20400) 21:18:31 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x100) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) socketpair(0x10, 0x7, 0x8, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000100)={0x0, @in6={{0xa, 0x4e23, 0x9, @mcast2, 0x80000001}}, 0x1, 0x1f, 0x78, 0x5, 0x40}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp6_SCTP_RTOINFO(r3, 0x84, 0x0, &(0x7f0000000200)={r4, 0x4, 0x7fff, 0x101}, &(0x7f0000000280)=0x10) [ 363.686379] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 363.932712] device team0 entered promiscuous mode [ 363.937741] device team_slave_0 entered promiscuous mode [ 363.943489] device team_slave_1 entered promiscuous mode [ 363.951522] 8021q: adding VLAN 0 to HW filter on device team0 [ 363.959543] device team0 left promiscuous mode [ 363.964285] device team_slave_0 left promiscuous mode [ 363.969811] device team_slave_1 left promiscuous mode 21:18:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x20, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0xa, 0xfffffffffffffffc) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$PIO_CMAP(r1, 0x4b71, &(0x7f0000000200)={0x4, 0x401, 0x7, 0x8, 0x80000001, 0x6}) r2 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x80000000, 0x200) ioctl$PPPIOCGCHAN(r2, 0x80047437, &(0x7f0000000340)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RMKDIR(r1, &(0x7f0000000280)={0x14, 0x49, 0x2, {0x10, 0x2, 0x4}}, 0x14) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 364.191455] device team0 entered promiscuous mode [ 364.196603] device team_slave_0 entered promiscuous mode [ 364.202397] device team_slave_1 entered promiscuous mode [ 364.213838] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.222465] device team0 left promiscuous mode [ 364.227231] device team_slave_0 left promiscuous mode [ 364.232749] device team_slave_1 left promiscuous mode 21:18:32 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) r1 = shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x4000) shmdt(r1) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 364.255593] device team0 entered promiscuous mode [ 364.260661] device team_slave_0 entered promiscuous mode [ 364.266430] device team_slave_1 entered promiscuous mode [ 364.281771] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.296762] device veth0_to_bridge entered promiscuous mode [ 364.310976] FAULT_INJECTION: forcing a failure. [ 364.310976] name fail_futex, interval 1, probability 0, space 0, times 0 [ 364.322572] CPU: 1 PID: 13442 Comm: syz-executor0 Not tainted 4.18.0-rc8+ #34 [ 364.329896] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 364.339310] Call Trace: [ 364.341963] dump_stack+0x17c/0x1c0 [ 364.345646] should_fail+0x867/0xaa0 [ 364.349418] get_futex_key+0x32a/0x1c50 [ 364.353438] ? kmsan_set_origin+0x93/0x150 [ 364.357747] futex_wake+0x17b/0xbe0 [ 364.361413] ? kmsan_set_origin_inline+0x6b/0x120 [ 364.366317] do_futex+0x9f6/0x6b00 [ 364.369923] ? vmalloc_to_page_or_null+0x3b/0xa0 [ 364.374765] ? kmsan_set_origin_inline+0x6b/0x120 [ 364.379685] ? __msan_poison_alloca+0x173/0x200 [ 364.384436] ? uprobe_free_utask+0x52/0x870 [ 364.388861] mm_release+0x319/0x690 [ 364.392582] exit_mm+0xbb/0x790 [ 364.395939] do_exit+0xbf7/0x3890 [ 364.399471] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 364.405021] do_group_exit+0x1a0/0x350 [ 364.408968] get_signal+0x1425/0x1ef0 [ 364.412843] ? put_pid+0x3d/0x240 [ 364.416380] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 364.421846] do_signal+0x120/0x2090 [ 364.425573] ? fsnotify+0x479/0x1ad0 [ 364.429332] ? kmsan_set_origin_inline+0x6b/0x120 [ 364.434218] ? __msan_poison_alloca+0x173/0x200 [ 364.438936] ? prepare_exit_to_usermode+0x46/0x410 [ 364.443950] prepare_exit_to_usermode+0x273/0x410 [ 364.448881] syscall_return_slowpath+0xdb/0x700 [ 364.453624] ? fput+0x29e/0x2e0 [ 364.457001] ? __x64_sys_write+0x369/0x3c0 [ 364.461293] do_syscall_64+0x1ab/0x220 [ 364.465235] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 364.470459] RIP: 0033:0x457089 [ 364.473663] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 364.493347] RSP: 002b:00007f270f360c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 364.501113] RAX: 0000000000000027 RBX: 00007f270f3616d4 RCX: 0000000000457089 21:18:32 executing program 1: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfffffffffffffffc}, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:18:32 executing program 7: r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) close(r0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/cuse\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f00000001c0)) ioctl$IOC_PR_PREEMPT_ABORT(r2, 0x401870cc, &(0x7f0000000000)={0x0, 0x5, 0x5, 0x1000}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000040)={0x20000000fffd}) epoll_pwait(r1, &(0x7f0000000080)=[{}], 0x1, 0x0, &(0x7f0000000140), 0x8) 21:18:32 executing program 5: perf_event_open(&(0x7f0000000140)={0x0, 0x70, 0x16}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) memfd_create(&(0x7f00000000c0)='ppp1\'!\x00', 0x1) openat$dsp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dsp\x00', 0x20080, 0x0) 21:18:32 executing program 4: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x200000, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000180)={{0xffffffffffffffff, 0x2, 0x4, 0x3, 0x9}}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xffffffffffffffee) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e1e, 0xfffffffffffffffd}, 0xfffffffffffffcd4) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$LOOP_SET_FD(r2, 0x4c00, r1) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x4, 0x800) setsockopt$inet_opts(r4, 0x0, 0x4, &(0x7f0000000100)="e69997acb712ef53af3b0a34ced78b0104c49b7325ef1cf8b9e3284e8487b790625b1b3ed82f8d4005217105d2ecdd1cc9a5f9bb8e99623c0f68", 0x3a) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000240)) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x805c, &(0x7f0000000400)="ead39a47e5d1886d0ec13c3cd726b6c5f22becaa0f91bc4e679f458c2be3eb2781045ec3e858d5beb1e91fb1734df5cae6f7641cb1ca9e9d8b49c0e912dbf9c31930eb490d55e9d4f7e73b4b78356333c50718f2df89c3a985ffa7462af3f03435059433cda02b6510b8c5c3") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xc, &(0x7f00000001c0)=0x592, 0x4) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000340)='./file0\x00', 0x40) 21:18:32 executing program 7: r0 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x1, 0x2) setsockopt$inet_udp_int(r0, 0x11, 0x1, &(0x7f0000000280)=0x1d, 0xfffffffffffffdcf) write$RDMA_USER_CM_CMD_GET_EVENT(r0, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000100)}}, 0x10) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000080)) eventfd(0x100000001) poll(&(0x7f00000005c0)=[{r0, 0xffffffffffffffff}], 0x1, 0x0) poll(&(0x7f00000002c0)=[{r0, 0x108}, {r0, 0x2081}, {r0, 0x60}, {r0, 0x2}], 0x4, 0x6484) r1 = semget(0x3, 0x1, 0x404) semctl$SEM_INFO(r1, 0x0, 0x13, &(0x7f0000000300)=""/28) ioctl$int_in(r0, 0x5473, &(0x7f00000000c0)=0xfffffffffffffffc) fchdir(r0) 21:18:32 executing program 5: r0 = getuid() getresgid(&(0x7f0000000080), &(0x7f00000000c0)=0x0, &(0x7f0000000140)) lchown(&(0x7f0000000040)='./file0\x00', r0, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='net/sockstat6\x00') ioctl$TCFLSH(r3, 0x540b, 0xed26) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) request_key(&(0x7f000000aff5)='asymmetric\x00', &(0x7f0000001ffb), &(0x7f0000001fee)="520972757374e363757367725665303a4465", 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000)='/dev/snapshot\x00', 0x0, 0x0) fchmodat(r4, &(0x7f0000000180)='./file0\x00', 0x40) ioctl$TIOCSTI(r4, 0x5412, 0x200) [ 364.508428] RDX: 0000000000000027 RSI: 0000000020fa8000 RDI: 0000000000000004 [ 364.515732] RBP: 0000000000930140 R08: 0000000000000000 R09: 0000000000000000 [ 364.523035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000005 [ 364.530340] R13: 00000000004d6da0 R14: 00000000004c7bc7 R15: 0000000000000004 [ 364.545189] device team0 left promiscuous mode [ 364.549963] device team_slave_0 left promiscuous mode [ 364.555479] device team_slave_1 left promiscuous mode [ 364.649641] device team0 entered promiscuous mode [ 364.654745] device team_slave_0 entered promiscuous mode [ 364.660540] device team_slave_1 entered promiscuous mode [ 364.687472] 8021q: adding VLAN 0 to HW filter on device team0 [ 364.697443] device veth0_to_bridge left promiscuous mode [ 364.708540] device team0 left promiscuous mode [ 364.713519] device team_slave_0 left promiscuous mode [ 364.720720] device team_slave_1 left promiscuous mode 21:18:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x35}, 0xa23875c2425fe2da) r2 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x7, 0x0) setsockopt$bt_BT_CHANNEL_POLICY(r2, 0x112, 0xa, &(0x7f0000000100)=0x6, 0x4) r3 = open(&(0x7f0000000040)='./file0\x00', 0x10002, 0x12) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e21, 0x6, @remote, 0x1ff}, {0xa, 0x4e23, 0x3, @remote, 0x5}, 0x8, [0x800, 0xdf9, 0x3, 0x4000000, 0x4, 0xffffffffffffff5d, 0x8000, 0x8000]}, 0x5c) setsockopt$inet_udp_int(r3, 0x11, 0x6f, &(0x7f0000000080)=0x401, 0x4) r4 = socket$netlink(0x10, 0x3, 0x4) write(r4, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x60000, 0x0) ioctl$KDGKBSENT(0xffffffffffffffff, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x0, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)="c24c0ddce39d4ba807da1aaaabf714ab7b5b45c479adb1225f8288ae365986df1e70a82efaf625800ee96dd4e4f0c71b038b90bbb491c16e054ced4e5eb37dfbbedc8d05d61984e25d66d6303f2e74042098177375d2da57a807774bc1c8734a4e618e7d380608151c7dda52c5f95c31afba3847fd023c4bdb65dd5ad282d142944498203ffbb06186aec9ab80a0f1581366e1d494afb1bbc836aacdea2afed81676c02a80c47c9f3b1ce12e7228c318a4c058150bdf81944bd6d722d8624ab723", 0xc1, 0x1, 0x5}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:32 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) close(r2) [ 364.863768] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 365.449920] device team0 left promiscuous mode [ 365.454822] device team_slave_0 left promiscuous mode [ 365.460362] device team_slave_1 left promiscuous mode 21:18:33 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x0) write$binfmt_elf32(r0, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x2, 0x8, 0x7, 0x9, 0x3, 0x3e, 0xff, 0x49, 0x38, 0x1e2, 0x5, 0x5, 0x20, 0x1, 0x4, 0x2, 0x1}, [{0x5, 0x3, 0x43951d3b, 0xe2c, 0x9, 0xfffffffe00000000, 0x3, 0x431d}], "b3af8a9a6a2a53f592ccaaa9baa66329a067628d4ad3d7941aafc3baf602effdd229714bf668c59542809f755c521e9b406f63c7a45e3db164ecfc977eb057af82ce194225bce3be6d53ebf5881a3825216448acad34d7b9f68cf28b6d8186d58999f5eeccd73666f48e9ad09719528a6a2f089ddebe8044ffb680d30eff5b72931bf8f7b25424a3e888d7308d30f6adf248fc681a83d0201c2d2ddd669300b82c8f8be690f1411b43501eed44643f50340c6a83d33aab2815c898b69cbd0133565ae6e47d1e147c8caa2b90ac4efc2eb3", [[], [], [], [], [], [], []]}, 0x829) ioctl$UI_END_FF_UPLOAD(r0, 0x406855c9, &(0x7f00000001c0)={0x2, 0xffffffffffffffa2, {0x52, 0x20, 0x7972, {0x89f, 0x5}, {0xfc00, 0x1}, @period={0x5f, 0xe25a, 0xfffffffffffffff9, 0x3f, 0x8, {0x40, 0x7fff}, 0x0, &(0x7f0000000180)}}, {0x52, 0xfffffffffffffeff, 0x3, {0x1, 0x97a8}, {0x4}, @ramp={0x1, 0x2, {0x7, 0xea2, 0x0, 0x9}}}}) r1 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_tcp_buf(r0, 0x6, 0x1a, &(0x7f0000000100)=""/60, &(0x7f0000000140)=0x3c) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r2) [ 365.748001] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 365.763174] device team0 entered promiscuous mode [ 365.768102] device team_slave_0 entered promiscuous mode [ 365.773914] device team_slave_1 entered promiscuous mode [ 365.781613] 8021q: adding VLAN 0 to HW filter on device team0 [ 365.791668] device team0 entered promiscuous mode [ 365.796611] device team_slave_0 entered promiscuous mode [ 365.802409] device team_slave_1 entered promiscuous mode [ 365.809927] 8021q: adding VLAN 0 to HW filter on device team0 [ 365.817875] device team0 left promiscuous mode [ 365.822629] device team_slave_0 left promiscuous mode [ 365.828268] device team_slave_1 left promiscuous mode [ 365.836523] device team0 entered promiscuous mode [ 365.841599] device team_slave_0 entered promiscuous mode [ 365.847400] device team_slave_1 entered promiscuous mode [ 365.855284] 8021q: adding VLAN 0 to HW filter on device team0 [ 365.863512] device team0 left promiscuous mode [ 365.868251] device team_slave_0 left promiscuous mode [ 365.873824] device team_slave_1 left promiscuous mode 21:18:33 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x80081, 0x0) statx(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x3, &(0x7f0000000300)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:18:33 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)=0x2) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x4000, 0x0) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:33 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) r1 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x800, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e20, @local}}, 0x4, 0x80, 0xf4f6, 0x7, 0x4}, &(0x7f00000001c0)=0x98) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)={r2, 0xfd, "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"}, &(0x7f0000000200)=0x105) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0x9, &(0x7f0000000280)={r2, @in6={{0xa, 0x4e22, 0x20, @dev={0xfe, 0x80, [], 0xa}, 0x7ff}}, 0x8, 0x9, 0x2, 0x6, 0x44}, 0x98) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x2000000080000c2) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r3) 21:18:34 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000040)) close(r2) 21:18:34 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9d17, 0x4}, 0x4) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hwrng\x00', 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:34 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) ioctl$int_in(r0, 0x5473, &(0x7f0000000040)=0x44) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r2) [ 366.327908] device team0 entered promiscuous mode [ 366.333080] device team_slave_0 entered promiscuous mode [ 366.338949] device team_slave_1 entered promiscuous mode [ 366.346731] 8021q: adding VLAN 0 to HW filter on device team0 [ 366.355325] device team0 left promiscuous mode [ 366.360315] device team_slave_0 left promiscuous mode [ 366.365901] device team_slave_1 left promiscuous mode [ 366.439765] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 366.657978] device team0 entered promiscuous mode [ 366.663344] device team_slave_0 entered promiscuous mode [ 366.669243] device team_slave_1 entered promiscuous mode [ 366.677104] 8021q: adding VLAN 0 to HW filter on device team0 [ 366.694917] device team0 left promiscuous mode [ 366.699873] device team_slave_0 left promiscuous mode [ 366.705367] device team_slave_1 left promiscuous mode 21:18:34 executing program 5: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockname(r0, &(0x7f0000000000)=@sco, &(0x7f0000000100)=0x34) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") ioctl$fiemap(0xffffffffffffffff, 0xc020660b, &(0x7f0000000280)=ANY=[@ANYBLOB="41012e7b12e57fe0f7830f93d2de59ec777b1ba3f9396916308cc1f2b3468b75c38e56b0681f721ac8c3d48db64ef007c22e599011dfb8b4c2283f1dcf3d09a9559977f139b67f22328db3d842ac58e517d36aecc9de2ad830a4619d2f9b86a1dc5262014d141a972df317642f7888e5bb589451b8c30c076dc87990a7d3b41ca1175fb63f72caf535ea58b2b019673405a22e6048326153fde944238706f439cf6cc60feb9af2955531556feb8c9d0110ca4a"]) write(r1, &(0x7f0000000340)="fb3b7712a25857697bde953d1f28912b1ece9f3ef355a1bd0373370308b0c6c1be08e90d32e16ecfce8ad6466d010d2edd32f87e88c677fc7ddedec0428ec725dd38ae7311b13009c2f4b4b510f5788eecff092b63ba301b95b77c06ce489797ec11248a423fa978d27ddfea218dcfd8450b592178452738e2954fcbb1a5a9bb0100a7b63a7cdcfe7d9ec47e11", 0x9a41ed9b9e23200b) ioctl$sock_inet6_udp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000200)) socket$packet(0x11, 0x1000000000002, 0x300) r2 = syz_open_dev$sndpcmc(&(0x7f0000000240)='/dev/snd/pcmC#D#c\x00', 0x3, 0x400) ioctl$TIOCCONS(r2, 0x541d) 21:18:34 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x7, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 366.732107] device veth0_to_bridge entered promiscuous mode [ 366.742444] device team0 entered promiscuous mode [ 366.747669] device team_slave_0 entered promiscuous mode [ 366.753478] device team_slave_1 entered promiscuous mode 21:18:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1a, &(0x7f00000001c0)={0x0, 0xa3, "40578f5e17452f5d635574710f7fd155ac1267e3f26d0402fbafd8a28fa4d6a4480ef78708392da526efa89a694357d4fbe2f195e40d1894f651bbe2c74b723fc100efdb6521cefaf1abb817ca9a8e1824b1c9e31658588062a4c514b811cc17d449c4829a18e6a1e3b1922b6012ec60af20c10402f4cba1e3635209584b1c1768ad4fc89fc026c3d56145fc1efac2ad71fb3ba20afcf8dbe60fd4e00d7f625d3f4d25"}, &(0x7f0000000280)=0xab) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000340)={r1, @in={{0x2, 0x4e24, @multicast1}}}, &(0x7f0000000400)=0x84) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 366.794114] 8021q: adding VLAN 0 to HW filter on device team0 [ 366.822700] device team0 left promiscuous mode [ 366.827769] device team_slave_0 left promiscuous mode [ 366.835477] device team_slave_1 left promiscuous mode 21:18:35 executing program 7: r0 = socket(0x10, 0x4000000000000002, 0xc) write(r0, &(0x7f0000594000)="1f0000000104ff00fd4354c007110000f305010008000100010423dcffdf00", 0x1f) write(r0, &(0x7f00000000c0)="1f0000000104fffffd3b54c007110000f30501000b0003001f0000b1aedfb5", 0x1f) r1 = gettid() fcntl$setown(r0, 0x8, r1) 21:18:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000040)) [ 367.313485] netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. [ 367.335649] netlink: 'syz-executor7': attribute type 3 has an invalid length. [ 367.351061] netlink: 3 bytes leftover after parsing attributes in process `syz-executor7'. [ 367.367327] netlink: 'syz-executor7': attribute type 3 has an invalid length. 21:18:35 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x100, 0x4) sendto$inet6(r0, &(0x7f0000000300)="0401000000dd20ddb8460900ffab5b4202938207d9fb3780398d5375c5f73f93912929060035352cd5a1f57590080053c0e385472da722a59a7a033b710720a42f2a2bb404e158524c10d6afcc2f2dbbd6324717270000fdffffff0000002950a67c0000000000001dea2a1d438de96baf7d2ed34e2650463f8643d26d4e6a1b85d10671762e1d8454ff0007879cffff0000903e51a039c78003a1669982eb136e8ee9cf2fc8", 0xa6, 0x800000000000, &(0x7f00000000c0)={0xa, 0x200000800, 0x20000000008, @mcast2}, 0x1c) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x3, 0x0) openat$cgroup_ro(r1, &(0x7f0000000080)='cpuset.effective_mems\x00', 0x0, 0x0) [ 367.439597] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:35 executing program 7: setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2, &(0x7f00000000c0)=0x20001, 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000300)={@in={{0x2, 0x0, @remote}}, 0x0, 0x8, 0x0, "a73b49214351f35802653ffbbf1971945682d15b746e1eab9a2d13241d7f662dde4899e40db535cde1849961fa615145571c3c7c9dfcca1aeddf7a5c82bec87aeeb76495bb7869befa26efd0f7c8a067"}, 0xd8) setsockopt$inet_tcp_int(r0, 0x6, 0x20, &(0x7f0000000040)=0x2, 0xf6) r1 = gettid() ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000000)=r1) r2 = dup(r0) connect$inet(r2, &(0x7f0000000200)={0x2, 0x0, @remote}, 0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000080)={0x0}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x1b, &(0x7f0000000140)={r3, 0x79, "580d91e7b60a4e2ae8bb8d53f9985d07f33e34b71a73b48edfc5c801aa870d3983cca050c6c35d9fd8446e18d643cbbac87fb2d1ea25b99859614dcd3dee8e2c3a3452ba84f36eaf3274a96375530b6769c9217b972733a7c90bd649440372238ee6adbd9ccee750c4d9b38fedbd15a33e1c898d83e5ba09d9"}, &(0x7f0000000240)=0x81) [ 367.699841] device team0 entered promiscuous mode [ 367.704966] device team_slave_0 entered promiscuous mode [ 367.710771] device team_slave_1 entered promiscuous mode [ 367.719741] 8021q: adding VLAN 0 to HW filter on device team0 [ 367.735414] device team0 left promiscuous mode [ 367.740275] device team_slave_0 left promiscuous mode 21:18:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f0000000280)={0xa, 0x4e22}, 0x1c) close(r0) r3 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x802) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000100)={0x0, 0x41, "b4381bc781046b4a8c78c58b4d4e0c755623c4eabfc66bae23404f7ee4a05d62e90d640a98b87347863f2609af2c690d85d2157e2c80f2cfdfa1335895b71e2fac"}, &(0x7f0000000180)=0x49) bind$inet6(r1, &(0x7f0000000200)={0xa, 0x4e20, 0x7fff, @loopback, 0x6}, 0x1c) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r3, 0x84, 0x78, &(0x7f00000001c0)=r4, 0x4) [ 367.745877] device team_slave_1 left promiscuous mode [ 367.768546] device team0 entered promiscuous mode [ 367.773616] device team_slave_0 entered promiscuous mode [ 367.779525] device team_slave_1 entered promiscuous mode 21:18:35 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 367.795264] 8021q: adding VLAN 0 to HW filter on device team0 [ 367.807724] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 367.821562] device team0 left promiscuous mode [ 367.826398] device team_slave_0 left promiscuous mode [ 367.831959] device team_slave_1 left promiscuous mode 21:18:35 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0x3, 0x4, 0xf9, 0x7fff}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r2 = open(&(0x7f0000000040)='./file0\x00', 0x240000, 0x0) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) fstatfs(r2, &(0x7f0000000100)=""/206) [ 368.088193] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:36 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x4000, 0x0) ioctl$RTC_WIE_OFF(r3, 0x7010) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r3, 0xc0bc5310, &(0x7f0000000100)) close(r1) [ 368.149723] device team0 entered promiscuous mode [ 368.154779] device team_slave_0 entered promiscuous mode [ 368.160592] device team_slave_1 entered promiscuous mode [ 368.169957] 8021q: adding VLAN 0 to HW filter on device team0 [ 368.179479] device team0 left promiscuous mode [ 368.184255] device team_slave_0 left promiscuous mode [ 368.190080] device team_slave_1 left promiscuous mode [ 368.264692] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 368.550241] device team0 entered promiscuous mode [ 368.555293] device team_slave_0 entered promiscuous mode [ 368.561228] device team_slave_1 entered promiscuous mode [ 368.569961] 8021q: adding VLAN 0 to HW filter on device team0 [ 368.581399] device team0 left promiscuous mode [ 368.586230] device team_slave_0 left promiscuous mode [ 368.591768] device team_slave_1 left promiscuous mode [ 368.826381] device team0 entered promiscuous mode [ 368.831503] device team_slave_0 entered promiscuous mode [ 368.837307] device team_slave_1 entered promiscuous mode [ 368.844778] 8021q: adding VLAN 0 to HW filter on device team0 [ 368.852504] device veth0_to_bridge left promiscuous mode [ 368.859662] device team0 left promiscuous mode [ 368.864464] device team_slave_0 left promiscuous mode [ 368.870129] device team_slave_1 left promiscuous mode [ 368.881231] device team0 entered promiscuous mode [ 368.886179] device team_slave_0 entered promiscuous mode [ 368.892089] device team_slave_1 entered promiscuous mode [ 368.912992] 8021q: adding VLAN 0 to HW filter on device team0 21:18:36 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000080)={0x5, 0x800c, 0x100, 0x400000000000, 0x0}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={r3, 0x9f}, 0x8) r4 = socket$netlink(0x10, 0x3, 0x4) write(r4, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:36 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x4400, 0x200) close(r1) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x8) fcntl$setstatus(r1, 0x4, 0x2000) 21:18:36 executing program 7: unshare(0x20400) r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000001680)={0x0, 0x1, 0x126, @random="d6931e3265cb"}, 0x10) 21:18:36 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x80000, 0x0) setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000200)={0x8}, 0x4) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$TIOCCBRK(r0, 0x5428) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:36 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0), 0x0, 0x1, 0x5}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:36 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000000c0)={'team0\x00', 0xfffffffffffffffd}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x10000, 0x0) ioctl$TCSBRK(r2, 0x5409, 0x400) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) finit_module(r0, &(0x7f0000000200)="7465616d300000ffffffc000", 0x3) 21:18:36 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x0, 0x40) r2 = fcntl$getown(r0, 0x9) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000180)) fcntl$setownex(r0, 0xf, &(0x7f0000000240)={0x2, r2}) sendmsg$key(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00008feff0)={&(0x7f00000001c0)={0x2, 0xd, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, [@sadb_address={0x3, 0x6, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}, @sadb_x_policy={0x8, 0x12, 0x2, 0x2, 0x0, 0x0, 0x0, {0x30, 0x0, 0xffffff03, 0x3, 0x0, 0xf00, 0x0, @in6=@loopback, @in=@remote}}, @sadb_address={0x3, 0x5, 0x0, 0x0, 0x0, @in={0x2, 0x0, @multicast1}}]}, 0x80}}, 0x0) r3 = add_key$keyring(&(0x7f0000000080)='keyring\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff9) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000040)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r3) socket$nl_route(0x10, 0x3, 0x0) [ 368.929291] device team0 left promiscuous mode [ 368.934169] device team_slave_0 left promiscuous mode [ 368.939722] device team_slave_1 left promiscuous mode [ 368.989871] device team0 entered promiscuous mode [ 368.994938] device team_slave_0 entered promiscuous mode [ 369.000757] device team_slave_1 entered promiscuous mode [ 369.058406] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 369.059890] 8021q: adding VLAN 0 to HW filter on device team0 21:18:37 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000100)=0x2) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x4000, 0x0) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:37 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x8, 0x0) accept$inet(r0, &(0x7f0000000080), &(0x7f00000001c0)=0x10) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x1f}}, 0xa0) [ 369.147948] device veth0_to_bridge entered promiscuous mode [ 369.161357] device team0 left promiscuous mode [ 369.166316] device team_slave_0 left promiscuous mode [ 369.173347] device team_slave_1 left promiscuous mode 21:18:37 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x4197, &(0x7f0000000200)="f0be368a0c0f30d6d6173b1d22da80267cd792b66f7e08f509144e8f764070a33d7b72a33b8f256459d286afbc2004e5d2f911fb8e35c8d3a00967e28678ad8151b720c0c2247387c5190b9dfc0a19e9") r1 = socket(0x10, 0x3, 0x9) write$P9_RWALK(r0, &(0x7f0000000000)={0x23, 0x6f, 0x2, {0x2, [{0x0, 0x2, 0x7}, {0x4, 0x4, 0x6}]}}, 0x23) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000380)=@bridge_delneigh={0x1c}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) 21:18:37 executing program 5: mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8003, &(0x7f0000000140)=0x3, 0x20, 0xfffffffffffffffd) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/hci\x00') ioctl$VT_WAITACTIVE(r0, 0x5607) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x10) 21:18:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r2) 21:18:37 executing program 5: socketpair(0x9, 0x2, 0x401, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000340)) pipe2(&(0x7f0000989000)={0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r2 = userfaultfd(0x0) r3 = accept4$vsock_stream(r1, &(0x7f0000000100)={0x28, 0x0, 0x2711, @reserved}, 0x10, 0x800) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x80, 0xfffffffffffffa83, 0x8000, 0x6, 0x6, 0x995e, 0xfff, 0x45b2ef35, 0x0}, &(0x7f0000000180)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f00000001c0)={0x3, 0x5, 0x208, 0x0, 0x6, 0x4, 0x1f, 0x7, r4}, &(0x7f0000000200)=0x20) fcntl$addseals(r3, 0x409, 0x9) getpeername$unix(r0, &(0x7f0000000240)=@abs, &(0x7f00000003c0)=0x2c8) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r5 = creat(&(0x7f000009aff8)='./file0\x00', 0x0) write$sndseq(r5, &(0x7f0000011fd2)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @time=@time={0x77359400}}], 0x30) mount(&(0x7f0000434ff8)='./file0\x00', &(0x7f0000abf000)='./file0\x00', &(0x7f0000f4c000)='jfs\x00', 0x1023402, 0x0) unlink(&(0x7f00003b3000)='./file0\x00') setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=ANY=[@ANYBLOB='s'], &(0x7f00000000c0)='\x00', 0x1, 0x0) dup2(r1, r2) [ 369.511733] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) socketpair(0x1, 0x0, 0xb0a0, &(0x7f0000000040)={0xffffffffffffffff}) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000100)=""/4) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 369.737003] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:37 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) socketpair(0x3, 0x80007, 0x3ff, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f0000000140)={0x1, 0x2, 0x0, [{0x7, 0x2, 0x7, 0xffff, 0x5, 0x0, 0x80000000}, {0x5, 0x7fffffff, 0x1, 0xfff, 0x8a, 0x9, 0xcb0}]}) socketpair$inet6(0xa, 0x5, 0x5, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r3) [ 369.996683] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:38 executing program 5: r0 = perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x80011, r0, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x0) mremap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffb000/0x1000)=nil) [ 370.222237] device team0 entered promiscuous mode [ 370.227450] device team_slave_0 entered promiscuous mode [ 370.233346] device team_slave_1 entered promiscuous mode [ 370.244320] 8021q: adding VLAN 0 to HW filter on device team0 [ 370.266996] device veth0_to_bridge entered promiscuous mode [ 370.274062] device team0 left promiscuous mode [ 370.278893] device team_slave_0 left promiscuous mode [ 370.284447] device team_slave_1 left promiscuous mode [ 370.332368] device team0 entered promiscuous mode [ 370.337515] device team_slave_0 entered promiscuous mode [ 370.343316] device team_slave_1 entered promiscuous mode [ 370.415296] 8021q: adding VLAN 0 to HW filter on device team0 [ 370.424086] device team0 left promiscuous mode [ 370.428844] device team_slave_0 left promiscuous mode [ 370.434402] device team_slave_1 left promiscuous mode [ 370.598880] device veth0_to_bridge left promiscuous mode [ 370.605697] device team0 left promiscuous mode [ 370.610507] device team_slave_0 left promiscuous mode [ 370.616144] device team_slave_1 left promiscuous mode [ 370.625974] device team0 entered promiscuous mode [ 370.631125] device team_slave_0 entered promiscuous mode [ 370.636965] device team_slave_1 entered promiscuous mode [ 370.647538] 8021q: adding VLAN 0 to HW filter on device team0 [ 370.656077] device veth0_to_bridge left promiscuous mode 21:18:38 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) socket$netlink(0x10, 0x3, 0x4) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000040)) close(r1) 21:18:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0), 0x0, 0x0, 0x5}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:38 executing program 3: add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:38 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) ioctl$LOOP_SET_DIRECT_IO(r2, 0x4c08, 0x3f) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") removexattr(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)=@random={'os2.', '/proc/sys/net/ipv4/vs/sync_refresh_period\x00'}) sendto$inet(r0, &(0x7f0000000000), 0x0, 0x200007fb, &(0x7f0000e68000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f0000000000)={0x0, 0x3}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r1, 0x84, 0x5, &(0x7f00000000c0)={r3, @in={{0x2, 0x4e22, @loopback}}}, 0x84) ioctl$void(r1, 0xc004587f) 21:18:38 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/autofs\x00', 0xa00, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:38 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x286000, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000080)={0x0, r0, 0x9, 0x2}, 0x14) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x8, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7, 0xfffffffffffffffd, 0x0, 0x0, 0x100000]}, &(0x7f0000000800)=0xffffff83) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:18:38 executing program 7: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r1) bind$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) r2 = dup2(r0, r1) connect$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) accept$unix(r0, &(0x7f0000000100), &(0x7f0000000040)=0x6e) setsockopt$kcm_KCM_RECV_DISABLE(r2, 0x119, 0x1, &(0x7f0000000200)=0x100000001, 0x4) [ 370.834235] device team0 left promiscuous mode [ 370.839090] device team_slave_0 left promiscuous mode [ 370.844683] device team_slave_1 left promiscuous mode [ 370.865215] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:38 executing program 7: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)='ramfs\x00', 0x0, &(0x7f0000000540)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0//ile0\x00', 0x2000, 0x8) ioctl$SNDRV_CTL_IOCTL_ELEM_LIST(r0, 0xc0505510, &(0x7f0000000140)={0x2, 0x4, 0x40, 0x9, &(0x7f0000000240)=[{}, {}, {}, {}]}) mount(&(0x7f0000d04000)='./file0\x00', &(0x7f0000903000)='./file0\x00', &(0x7f0000811ffa)='bdev\x00', 0x100000, &(0x7f0000444000)) mount(&(0x7f0000fb6000)='./file0\x00', &(0x7f0000d78000)='.', &(0x7f0000fdb000)='ubifs\x00', 0x1003, 0x0) mount(&(0x7f0000377ff8)='.', &(0x7f0000187ff8)='.', &(0x7f0000753000)='mslos\x00', 0x5010, &(0x7f00000e7000)) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") unshare(0x2000400) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) 21:18:38 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) r1 = dup2(r0, r0) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) getsockopt$IP_VS_SO_GET_VERSION(r3, 0x0, 0x480, &(0x7f0000000040), &(0x7f0000000100)=0x40) close(r2) r4 = syz_open_dev$usbmon(&(0x7f0000000140)='/dev/usbmon#\x00', 0x6, 0x4100) ioctl$KDMKTONE(r4, 0x4b30, 0x8) close(r2) [ 371.123378] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:39 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) setsockopt$inet6_tcp_int(r1, 0x6, 0x18, &(0x7f0000000040)=0x2a3, 0x4) listen(r1, 0x8001006) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={0xfffffffffffffff9, 0x9, 0x2, 0x1, 0x9, 0xfffffffffffffff9, 0x2, 0x4d2, 0x0}, &(0x7f0000000180)=0x20) setsockopt$inet_sctp6_SCTP_AUTH_DEACTIVATE_KEY(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000001c0)={r3, 0x30}, 0x8) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000100)=""/8) close(r1) [ 371.374516] device team0 left promiscuous mode [ 371.379269] device team_slave_0 left promiscuous mode [ 371.384873] device team_slave_1 left promiscuous mode [ 371.400706] device team0 entered promiscuous mode [ 371.405824] device team_slave_0 entered promiscuous mode [ 371.411667] device team_slave_1 entered promiscuous mode [ 371.430192] 8021q: adding VLAN 0 to HW filter on device team0 [ 371.446841] device veth0_to_bridge entered promiscuous mode [ 371.453969] device team0 entered promiscuous mode [ 371.458965] device team_slave_0 entered promiscuous mode [ 371.464794] device team_slave_1 entered promiscuous mode [ 371.490727] 8021q: adding VLAN 0 to HW filter on device team0 [ 371.502961] device team0 entered promiscuous mode [ 371.508190] device team_slave_0 entered promiscuous mode [ 371.513988] device team_slave_1 entered promiscuous mode [ 371.523790] 8021q: adding VLAN 0 to HW filter on device team0 21:18:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) eventfd2(0x7c6, 0x80800) syz_emit_ethernet(0xfffffe82, &(0x7f0000000100)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000180)) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffdef, 0x40, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) [ 371.558216] device team0 left promiscuous mode [ 371.563118] device team_slave_0 left promiscuous mode [ 371.569159] device team_slave_1 left promiscuous mode 21:18:39 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000140)="e47f7976f48e3a4404445d", 0xb, 0x20000004, &(0x7f0000000180)={0xa, 0x4e22, 0x81a}, 0x1c) close(r1) [ 371.723126] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:39 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) eventfd2(0x7c6, 0x80800) syz_emit_ethernet(0xfffffe82, &(0x7f0000000100)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "d8652b", 0x14, 0x0, 0x0, @local, @local, {[], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, &(0x7f0000000180)) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x151) connect$inet6(r0, &(0x7f0000000140), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) sendto$inet6(r0, &(0x7f00000005c0), 0xfffffdef, 0x40, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, 0x1c) 21:18:39 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x8000, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:40 executing program 5: pipe(&(0x7f0000000340)={0xffffffffffffffff}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x0) fremovexattr(r0, &(0x7f0000000600)=ANY=[@ANYBLOB="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"]) [ 371.993257] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 372.135529] device team0 left promiscuous mode [ 372.140343] device team_slave_0 left promiscuous mode [ 372.145990] device team_slave_1 left promiscuous mode [ 372.180603] device team0 left promiscuous mode [ 372.185412] device team_slave_0 left promiscuous mode [ 372.190979] device team_slave_1 left promiscuous mode [ 372.472155] device team0 entered promiscuous mode [ 372.477244] device team_slave_0 entered promiscuous mode [ 372.483088] device team_slave_1 entered promiscuous mode [ 372.490337] 8021q: adding VLAN 0 to HW filter on device team0 [ 372.503232] device veth0_to_bridge left promiscuous mode 21:18:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x800) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000001c0)={{{@in6=@remote, @in=@broadcast}}, {{@in6=@loopback}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:40 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000040)={0xa, 0x4e22, 0x101, @empty, 0xffffffffffffffff}, 0x1c) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x7, 0x400) ioctl$EVIOCSKEYCODE(r2, 0x40084504, &(0x7f0000000140)=[0xe4d, 0x9]) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000180)=0x6, 0x2) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f00000001c0)=@assoc_value={0x0, 0x2}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000280)={r4, 0x9, 0x4000000000}, 0x8) close(r1) 21:18:40 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) write$P9_RAUTH(r0, &(0x7f0000000280)={0x14, 0x67, 0x2, {0x40, 0x0, 0x3}}, 0x14) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/snapshot\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f0000000340)=ANY=[@ANYRES32=0x0, @ANYBLOB="fb000000b514dc57440e8900b4ab24e91b4c5be39e11354bbee7a4937b0a7c0e20a8e55832457f9e610a7d9be6f5a7df1190dc79a4c3c53dd204fdcef498c82609d8986b4bf78c4812828794fba1fef9fbbda33d3e9300ee496e9f74efc89d33ed005c8351e76bd8bc544243c55ac1aa68144baba328f75a1fe95272f13dcbe5e5cb19f3ab3cbf04314609b76a1a2d3dd5f3a42f078b4540fa52b697c200cba16bd94713e86d78f4a007e4ff2724e43152dfe1cae620d5aa3915ca2a0fd2506b2bc5f9cebaa858674069f12fe888fe2d9724c9898cc911226a6f0140bd2725ee67e7b3dd13b8079a1fdcabf75c0000000000000000000000"], &(0x7f0000000200)=0x103) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r2, 0x84, 0xf, &(0x7f0000000540)={r3, @in6={{0xa, 0x4e20, 0x80000000, @loopback, 0x3daaab10}}, 0x6, 0x100000000, 0x1d, 0xe27e, 0xbe74}, &(0x7f0000000240)=0x98) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r4 = socket(0x10, 0x802, 0x7) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:40 executing program 5: add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:40 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) socketpair$inet_dccp(0x2, 0x6, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl(r1, 0x0, &(0x7f0000000000)) r2 = accept$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r3 = syz_open_dev$vcsn(&(0x7f0000000480)='/dev/vcs#\x00', 0x1c0000000000, 0x80) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000005c0)={r3, &(0x7f0000000840)="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", &(0x7f00000004c0)="1e9fea57b594470b6fda7ec678c3f9edb46eaf5f67ebb2a04affec3c6318774a981f86f9893cddd56050accc0e76890f7aee341c5360d43843dee44c4705ea8a0eeb7ea2e3f4d1462db9a24bab1a1ab71bf22109a59bf426b33f01a8c5f44b7fab542ed6bfa4779590eaf1fbc7d1516ba2d942aeae329a38075deaab8dae9489684f7fe8c5465606fd5c8fda6c3dfba059ced797b0827267c6df7637b102a43185a0449a6f235568b6152ec21ea177234d36f51fc7248adafe98235ef984000107bef461d1764cd66b4fbc"}, 0x20) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1f, &(0x7f0000000080)={@mcast1, 0x0}, &(0x7f00000001c0)=0x14) ioctl$SCSI_IOCTL_GET_IDLUN(r3, 0x5382, &(0x7f0000001ec0)) r5 = syz_genetlink_get_family_id$team(&(0x7f0000000640)='team\x00') sendmsg$TEAM_CMD_NOOP(r3, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x101}, 0xc, &(0x7f0000000680)={&(0x7f0000001840)={0x63c, r5, 0x300, 0x70bd25, 0x25dfdbfc, {}, [{{0x8, 0x1, r4}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x79fd}}}]}}, {{0x8, 0x1, r4}, {0xb4, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x74, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x44, 0x4, [{0x1, 0x3ff, 0x7, 0x3}, {0x0, 0x7, 0x83, 0x80000001}, {0x2, 0xffffffff, 0x1ff, 0xb9}, {0x8, 0x6, 0x100, 0x3}, {0x101, 0x9, 0x1, 0x2e}, {0x40, 0x800, 0x80, 0x913}, {0x1ff, 0xaf21, 0x833, 0x47e}, {0xfffffffffffffffd, 0x0, 0x8, 0x4}]}}}]}}, {{0x8, 0x1, r4}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r4}, {0xf0, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x426d}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xfff}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r4}, {0xbc, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r4}, {0x220, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x13}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xb6d}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x5, 0x10001, 0x0, 0xece}, {0xffffffffffffa178, 0x80, 0x1, 0x9}]}}}]}}, {{0x8, 0x1, r4}, {0xf4, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff9}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}]}}]}, 0x63c}, 0x1, 0x0, 0x0, 0x8011}, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000300)={'bond0\x00', r4}) r6 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000380)='/dev/snd/controlC#\x00'}, 0x10) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_NEXT_DEVICE(r7, 0xc0045540, &(0x7f0000001e80)=0x9) write$FUSE_NOTIFY_DELETE(r7, &(0x7f0000000440)={0x2d, 0x6, 0x0, {0x5, 0x3, 0x4, 0x0, 'ppp1'}}, 0x2d) write$P9_RGETATTR(r2, &(0x7f0000000200)={0xa0, 0x19, 0x1, {0x0, {0x0, 0x0, 0x80}}}, 0xa0) syz_open_dev$sndctrl(&(0x7f0000000340)='/dev/snd/controlC#\x00', 0x7f, 0x80) 21:18:40 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r0 = openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x101080, 0x2) ioctl$BLKRRPART(r0, 0x125f, 0x0) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:40 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0), 0x0, 0x0, 0x5}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 372.683859] device team0 entered promiscuous mode [ 372.688935] device team_slave_0 entered promiscuous mode [ 372.694741] device team_slave_1 entered promiscuous mode [ 372.705952] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 372.727679] 8021q: adding VLAN 0 to HW filter on device team0 [ 372.741880] device veth0_to_bridge entered promiscuous mode [ 372.758815] device team0 left promiscuous mode [ 372.763681] device team_slave_0 left promiscuous mode [ 372.769304] device team_slave_1 left promiscuous mode 21:18:40 executing program 4: r0 = socket$packet(0x11, 0x1000, 0x300) bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x0, 0x1, &(0x7f0000001fe8)=ANY=[@ANYBLOB="ea84a3e7fe891e6daf"], &(0x7f0000003ff6)='syzkaller\x00', 0x0, 0xc3, &(0x7f0000009f3d)=""/195}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x1, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="b4000000000000002500000000000000070000000000000000000000000000009500000000000000170a28afa664113e502e4b7906d2b19a8649c4f0b72abad886d1b4c27a525c11233d4af3d1caa249841e22e04f0e8287ad1a03c8d9c6d8129aa8b0beb182c01ade6032e2a6ab2c885cdcd4ca0968aa035de7bb19860072b73147c045f6f93bf78e28c2de1907dc1bfe6027bb98dd7d8646a01185f1bc5ee60ae0afc60a6341a6475fc5237cb4c99cad39d9bda8676c3c4e20f5641f74208f2f4890b47f9055bcdbb4784a432fed7ec6fe69f5f73f46a90131cb3af5d501379c9abe0905c7115b447cbf1a3cbfe92e2841b30a5cf9b4eb8949eb0a02d07ea2b219431ecca7502bdd26533c461d06ab9ebe7d27791b1398e466388c6ef092c80f47d457943375989f637081d8"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0x437, &(0x7f000000cf3d)=""/195}, 0x23) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0)=0x3, 0x4) ioctl$UI_GET_SYSNAME(r2, 0x8040552c, &(0x7f0000000180)) listen(r1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000100)={{0xa, 0x4e22, 0x1, @empty, 0x9}, {0xa, 0x4e22, 0x81, @empty, 0x100000000}, 0x6, [0x6, 0x8, 0x4, 0x100000000, 0x9, 0x6, 0x3, 0xffff]}, 0x5c) [ 373.039332] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 373.077161] device team0 entered promiscuous mode [ 373.082231] device team_slave_0 entered promiscuous mode [ 373.088126] device team_slave_1 entered promiscuous mode [ 373.105135] 8021q: adding VLAN 0 to HW filter on device team0 [ 373.119439] device team0 left promiscuous mode [ 373.124599] device team_slave_0 left promiscuous mode [ 373.131762] device team_slave_1 left promiscuous mode 21:18:41 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0xa97}, 0x1c) close(r1) r3 = socket(0x10, 0x7, 0x3) getsockopt$inet6_mreq(r0, 0x29, 0x1f, &(0x7f00000001c0)={@loopback, 0x0}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r3, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2002000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)=ANY=[@ANYBLOB="240000001900000725bd7000ffdbdf251c900000fd03ff0000abd5334a97263e", @ANYRES32=r4], 0x24}}, 0x8001) [ 373.388910] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:41 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x40000, 0x0) getgid() setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000040), &(0x7f0000000100)=0xfffffffffffffd59) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000180)={0x0, @broadcast, @multicast2}, &(0x7f00000001c0)=0xa) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@local, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@loopback}}, &(0x7f0000000200)=0xe8) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000580)='/dev/ppp\x00', 0x400400, 0x0) setsockopt$packet_int(r5, 0x107, 0x0, &(0x7f00000004c0)=0x4, 0x4) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f0000000500)={0x20, 0x9, 0x5}) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in6=@loopback, @in=@rand_addr=0x2, 0x4e21, 0xba, 0x4e22, 0x8, 0xa, 0x20, 0x20, 0x3a, r3, r4}, {0x4, 0x43b8, 0x100, 0x835, 0x8, 0x101, 0xfffffffffffff001, 0x7fff}, {0x5, 0x62d6, 0x6, 0x9}, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x3}, {{@in6=@mcast2, 0x4d3, 0x3b}, 0xa, @in=@broadcast, 0x3505, 0x4, 0x3, 0x9, 0x6, 0x7f, 0x80}}, 0xe8) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r5, 0xc10c5541, &(0x7f00000005c0)={0xfff, 0xa6, 0x6bd, 0x0, 0x0, [], [], [], 0x8, 0x1}) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000480)='/dev/loop-control\x00', 0x101840, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000700)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r5, &(0x7f00000008c0)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x10400000}, 0xc, &(0x7f0000000880)={&(0x7f0000000740)={0x13c, r6, 0x200, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x7fffffff}, @IPVS_CMD_ATTR_SERVICE={0x1c, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x8000}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1000}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffffffffffffe}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xc3d}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x3c, 0x4}}]}, @IPVS_CMD_ATTR_SERVICE={0x50, 0x1, [@IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x3}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x1b}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x6c}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sh\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'nq\x00'}, @IPVS_SVC_ATTR_ADDR={0x14}, @IPVS_SVC_ATTR_TIMEOUT={0x8}]}, @IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x7}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x200}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x7fffffff}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x663}]}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @rand_addr=0xbe54}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x100000001}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}]}]}, 0x13c}, 0x1, 0x0, 0x0, 0x40}, 0x4000) shmget$private(0x0, 0x3000, 0x1020, &(0x7f0000ffd000/0x3000)=nil) [ 373.515800] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 373.709896] device team0 left promiscuous mode [ 373.715645] device team_slave_0 left promiscuous mode [ 373.721320] device team_slave_1 left promiscuous mode [ 373.911250] device team0 entered promiscuous mode [ 373.916560] device team_slave_0 entered promiscuous mode [ 373.922344] device team_slave_1 entered promiscuous mode [ 373.930464] 8021q: adding VLAN 0 to HW filter on device team0 [ 373.938143] device team0 entered promiscuous mode [ 373.943099] device team_slave_0 entered promiscuous mode [ 373.948943] device team_slave_1 entered promiscuous mode [ 373.956624] 8021q: adding VLAN 0 to HW filter on device team0 [ 373.975114] device team0 entered promiscuous mode [ 373.980126] device team_slave_0 entered promiscuous mode [ 373.985957] device team_slave_1 entered promiscuous mode 21:18:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:42 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 374.018274] 8021q: adding VLAN 0 to HW filter on device team0 21:18:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000240)="40220b9582855f9683b8772a8737d09201ffa3cee815a14c1d781c34671d6d82937248965a697fb172cc26b079afee27c36f0d00773249ebe9095e48fe9219db93650fd674fa4ffc0256288de5f529bebf224fd770a846c33fe01e5400000000000000") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 374.070685] device team0 left promiscuous mode [ 374.075527] device team_slave_0 left promiscuous mode [ 374.081160] device team_slave_1 left promiscuous mode [ 374.124934] device team0 entered promiscuous mode [ 374.130143] device team_slave_0 entered promiscuous mode [ 374.135955] device team_slave_1 entered promiscuous mode [ 374.148877] 8021q: adding VLAN 0 to HW filter on device team0 [ 374.157488] device veth0_to_bridge left promiscuous mode [ 374.164336] device team0 left promiscuous mode [ 374.169239] device team_slave_0 left promiscuous mode [ 374.174884] device team_slave_1 left promiscuous mode 21:18:42 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x6, 0x0) 21:18:42 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) socketpair(0x3, 0xa, 0x100, &(0x7f0000000380)={0xffffffffffffffff}) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/sloppy_sctp\x00', 0x2, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f00000000c0)='veno\x00', 0x5) fremovexattr(r1, &(0x7f00000003c0)=@known='system.sockprotoname\x00') accept4$inet(r1, &(0x7f0000000440)={0x2, 0x0, @dev}, &(0x7f0000000480)=0x10, 0x800) socketpair$inet_udp(0x2, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff}) accept$inet(r2, &(0x7f0000000340)={0x2, 0x0, @broadcast}, &(0x7f0000000300)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000400)={r3, 0x200, 0x1}, 0x8) r4 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000002c0)={'team0\x00'}) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000040)={0x7fff, 0x74, 0x1, 0x885d}, 0x8) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 374.528708] device team0 entered promiscuous mode [ 374.533961] device team_slave_0 entered promiscuous mode [ 374.539782] device team_slave_1 entered promiscuous mode [ 374.547439] 8021q: adding VLAN 0 to HW filter on device team0 21:18:42 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 374.597457] device team0 left promiscuous mode [ 374.602375] device team_slave_0 left promiscuous mode [ 374.607942] device team_slave_1 left promiscuous mode [ 374.868281] device team0 entered promiscuous mode [ 374.873298] device team_slave_0 entered promiscuous mode [ 374.879186] device team_slave_1 entered promiscuous mode [ 374.887206] 8021q: adding VLAN 0 to HW filter on device team0 [ 374.895340] device veth0_to_bridge entered promiscuous mode [ 374.906486] device team0 left promiscuous mode [ 374.911395] device team_slave_0 left promiscuous mode [ 374.917094] device team_slave_1 left promiscuous mode [ 374.925929] device team0 entered promiscuous mode [ 374.930947] device team_slave_0 entered promiscuous mode [ 374.936730] device team_slave_1 entered promiscuous mode [ 374.945298] 8021q: adding VLAN 0 to HW filter on device team0 [ 374.959313] device team0 left promiscuous mode 21:18:43 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req={0x20, 0x7fff, 0x5, 0xce}, 0x142) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) r3 = syz_open_dev$amidi(&(0x7f00000000c0)='/dev/amidi#\x00', 0x5, 0x4000) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(0xffffffffffffff9c, 0x84, 0x76, &(0x7f0000000100)={0x0, 0x400}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000180)={r4}, &(0x7f00000001c0)=0x8) [ 374.964282] device team_slave_0 left promiscuous mode [ 374.971694] device team_slave_1 left promiscuous mode 21:18:43 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 375.073631] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:43 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x7) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x2) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000100)=[@in={0x2, 0x4e22, @local}], 0x10) close(r1) 21:18:43 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000140)={0xffffffffffffffff}, 0x0, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r0, &(0x7f0000000280)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x0, r1, 0x3c, 0x1, @ib={0x1b, 0x1f, 0x4, {"e1bf9888c4e2eefc6683077febff8248"}, 0x3f, 0xffffffff, 0x6}}}, 0xa0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$bt_hci(r2, 0x0, 0x3, &(0x7f0000000540)=""/4096, &(0x7f0000001540)=0x1000) getsockopt(r0, 0x1, 0xffffffff, &(0x7f0000000440)=""/220, &(0x7f0000000200)=0xdc) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f0000000340)=""/247) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000001580), 0x4) sendto$inet6(r4, &(0x7f0000000200), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r3) 21:18:43 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) userfaultfd(0x80000) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x5, 0x40080) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 375.548202] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 375.635768] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:43 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty, 0x9}, 0x1c) listen(r1, 0x7ff) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x10000, 0x0) getsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000100), &(0x7f0000000140)=0x4) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 375.752588] device team0 entered promiscuous mode [ 375.757709] device team_slave_0 entered promiscuous mode [ 375.763538] device team_slave_1 entered promiscuous mode [ 375.773210] 8021q: adding VLAN 0 to HW filter on device team0 [ 375.782324] device team0 left promiscuous mode [ 375.787198] device team_slave_0 left promiscuous mode [ 375.792774] device team_slave_1 left promiscuous mode 21:18:43 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x29a, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x3074}, 0x1c) close(r1) r3 = dup(r0) mq_timedreceive(r3, &(0x7f0000000100)=""/120, 0x78, 0x5, 0x0) [ 376.026242] device team0 entered promiscuous mode [ 376.031299] device team_slave_0 entered promiscuous mode [ 376.037218] device team_slave_1 entered promiscuous mode [ 376.047082] 8021q: adding VLAN 0 to HW filter on device team0 [ 376.056869] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x6) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'eql\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:44 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x7, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f00000004c0), 0x0, 0x0, 0x5}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 376.166417] device team0 left promiscuous mode [ 376.171298] device team_slave_0 left promiscuous mode [ 376.176885] device team_slave_1 left promiscuous mode [ 376.186051] device team0 entered promiscuous mode [ 376.191129] device team_slave_0 entered promiscuous mode [ 376.196947] device team_slave_1 entered promiscuous mode 21:18:44 executing program 5: r0 = socket$nl_generic(0xa, 0x5, 0x84) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)=')mime_typevboxnet1ppp0ppp0+,vmnet0[%vboxnet0\x00'}, 0x10) ioctl$SNDRV_CTL_IOCTL_ELEM_REMOVE(r1, 0xc0405519, &(0x7f0000000100)={0x9, 0x0, 0x1f, 0x4, 'syz1\x00', 0x20}) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x89f0, &(0x7f0000000040)={'bridge0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\x00\x006{\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']}) [ 376.237350] 8021q: adding VLAN 0 to HW filter on device team0 21:18:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) unlink(&(0x7f0000000040)='./file0\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 376.289563] device team0 left promiscuous mode [ 376.294428] device team_slave_0 left promiscuous mode [ 376.300160] device team_slave_1 left promiscuous mode 21:18:44 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x100000000, 0x0) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x73, &(0x7f0000000080)={0x0, 0x6, 0x20, 0x3, 0x1}, &(0x7f00000001c0)=0x18) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000840)={r1, 0x1000, "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"}, &(0x7f0000000300)=0x1008) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f00000003c0)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffff9) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000340)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 376.443370] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:44 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'nr0\x00', 0x0}) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000280)={{{@in=@dev={0xac, 0x14, 0x14, 0xa}, @in=@broadcast, 0x4e24, 0xfff000000000000, 0x4e22, 0x8001, 0x2, 0x20, 0x80, 0x0, r2, r3}, {0x9, 0xc7c, 0x3, 0x1, 0x9, 0x200, 0x5, 0x7}, {0x4, 0x6, 0x8, 0x10000}, 0xaa0, 0x6e6bb9, 0x2, 0x1, 0x2, 0x2}, {{@in, 0x4d3, 0x6f}, 0xa, @in, 0x0, 0x3, 0x3, 0x80000000, 0xa48, 0x2, 0x5}}, 0xe8) setsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000380)=@dstopts={0x0, 0x2d, [], [@padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0xfffffffffffffff7, 0xcb, "5a217ca995003442ee838f870cafd0e97a57b6350f9a90916099cc4040a57ff6bb831b67ed26fc8c8edfac324e211b4e209af8a76d40034b764e42480c33e7a9a76b798153d72868b811283fae664f4fde633b91ecf7f2c341138343db42667f214fbefebd57728c19ccde08c675d4562d0e17c3ad106c0cc3585c4a5ed19adcd0048ee4e3ef1582f6e6f6072f9f9a6bd7d67b18ca658799fb85af8ba2444ab4d3ee1a9b70b917697b4d5854bcefb93070b71e5d69b16c68a790d2154adddb82f609c09c8667b5ecfa62a5"}, @calipso={0x7, 0x40, {0x4fe, 0xe, 0xb505, 0x2, [0x4, 0x1f, 0x7, 0x2, 0x800, 0x9, 0xb380]}}, @ra={0x5, 0x2, 0xffffffff7fffffff}, @ra={0x5, 0x2, 0xffffffffffffffff}, @enc_lim={0x4, 0x1, 0x4}, @enc_lim={0x4, 0x1, 0x1}, @ra={0x5, 0x2, 0x1}, @generic={0x6, 0x41, "f81a7293bc680db16e8e0017ea691224ae0120bb816e4fdeedfa10fa272a8e5d8bb800bba755556b3173e1630e1a0e05d3757f5070789305084ac8baf92e60bb88"}]}, 0x178) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 376.659407] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 376.708776] device team0 entered promiscuous mode [ 376.713806] device team_slave_0 entered promiscuous mode [ 376.719630] device team_slave_1 entered promiscuous mode [ 376.728718] 8021q: adding VLAN 0 to HW filter on device team0 [ 376.737959] device veth0_to_bridge left promiscuous mode [ 376.755975] device team0 left promiscuous mode [ 376.761081] device team_slave_0 left promiscuous mode [ 376.766645] device team_slave_1 left promiscuous mode [ 376.778915] device team0 entered promiscuous mode [ 376.784224] device team_slave_0 entered promiscuous mode [ 376.790223] device team_slave_1 entered promiscuous mode [ 376.824230] 8021q: adding VLAN 0 to HW filter on device team0 21:18:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x200000, 0x104) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r3, 0x84, 0x1e, &(0x7f0000000100), 0x4) mkdirat$cgroup(r3, &(0x7f00000000c0)='syz1\x00', 0x1ff) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:44 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x8, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f0000000440)="e900681e485638ca9eccf7f56a8542930f1197df0b7ac2292f3e5bd14d601bd78c7db2ff1f7e6c84b71d4c88c0a55307a0d2582246c799b4fbf2f6f2fbef0cd9eab88acf34d146011c37b0eb7ac493a2974ff960dd96d59d13156d2a1e1d16", 0x5f, 0x10001, 0x8000}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:44 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x7, 0x4c00) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 376.869543] device team0 left promiscuous mode [ 376.874273] device team_slave_0 left promiscuous mode [ 376.879867] device team_slave_1 left promiscuous mode 21:18:44 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r2 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x42, &(0x7f0000c86000), &(0x7f0000000000)=0x15c) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000009fe8)={0xaa, 0xe}) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f000000d000)={{&(0x7f0000909000/0x4000)=nil, 0x4000}, 0x1}) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000000)=""/189, 0xbd}], 0x1) madvise(&(0x7f00001a2000/0xc00000)=nil, 0xc00000, 0x4000000000000008) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socket$inet6_udp(0xa, 0x2, 0x0) 21:18:45 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x6, 0x0) [ 376.980530] device team0 entered promiscuous mode [ 376.985686] device team_slave_0 entered promiscuous mode [ 376.991497] device team_slave_1 entered promiscuous mode [ 377.045424] 8021q: adding VLAN 0 to HW filter on device team0 [ 377.103112] device veth0_to_bridge entered promiscuous mode 21:18:45 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x7, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f0000000340)="cf6a1aa61295799301a42ebda74eaa7a0b49b1065905d6e21130f48b02cb6067d64bff798d9b7e77a10cbe249a44ee46692e8ce5406f45ad790bc907332cda99476b8ef602926b2286259c4fbbafdbcd7bdbb00a62446a4882a57c193cc3e2cd4b5b9a4bb3e3f0b016c2953f440b12d53ab95b43089ceef0cd11d5af2a05ce1dea2a9db33001cb7aa57f8f7f81a407818961fdfe281efe30d815df35e9f25a76f5836fa73f774e47ab186038f8e7b9e8d308cc439b0ecb6bc65c331778ceef7f6d1c3af6", 0xc4, 0x8288, 0x8}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:45 executing program 1: r0 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x7acb7d20dfcbdb28) ioctl$PIO_UNIMAPCLR(r0, 0x4b68, &(0x7f0000000080)={0x1, 0x7f, 0x80}) sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{0x1000000000}, 0x20, 0x51}) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/packet\x00') setsockopt$IP_VS_SO_SET_DELDEST(r1, 0x0, 0x488, &(0x7f0000000300)={{0x11, @multicast1, 0x4e21, 0x4, 'lblcr\x00', 0x0, 0x3, 0x2}, {@dev={0xac, 0x14, 0x14, 0x15}, 0x4e22, 0x3, 0x5, 0x3, 0x6}}, 0x44) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = accept$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r4 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r3, 0x5}, 0x8) write$binfmt_aout(r2, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x45c) [ 377.162480] device team0 left promiscuous mode [ 377.167547] device team_slave_0 left promiscuous mode [ 377.174789] device team_slave_1 left promiscuous mode 21:18:45 executing program 7: r0 = socket$inet6(0xa, 0x800, 0x0) recvmmsg(r0, &(0x7f0000002580)=[{{&(0x7f00000001c0)=@in6={0xa, 0x0, 0x0, @ipv4={[], [], @local}}, 0x80, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/255, 0xff}, {&(0x7f0000000340)=""/214, 0xd6}, {&(0x7f0000000440)=""/101, 0x65}], 0x3, &(0x7f00000004c0)=""/99, 0x63, 0x1}, 0xffffffffffff7fff}, {{&(0x7f0000000540)=@hci, 0x80, &(0x7f0000000640)=[{&(0x7f00000005c0)=""/76, 0x4c}], 0x1, &(0x7f0000000680)=""/146, 0x92, 0x1ff}, 0xffffffffffff0000}, {{&(0x7f0000000740)=@ax25, 0x80, &(0x7f0000000cc0)=[{&(0x7f00000007c0)=""/25, 0x19}, {&(0x7f0000000800)=""/203, 0xcb}, {&(0x7f0000000900)=""/130, 0x82}, {&(0x7f00000009c0)=""/158, 0x9e}, {&(0x7f0000000a80)=""/90, 0x5a}, {&(0x7f0000000b00)=""/149, 0x95}, {&(0x7f0000000bc0)=""/226, 0xe2}], 0x7, &(0x7f0000000d40)=""/138, 0x8a, 0x8001}, 0x8000}, {{&(0x7f0000000e00)=@ethernet={0x0, @local}, 0x80, &(0x7f00000013c0)=[{&(0x7f0000000e80)=""/156, 0x9c}, {&(0x7f0000000f40)=""/221, 0xdd}, {&(0x7f0000001040)}, {&(0x7f0000001080)=""/118, 0x76}, {&(0x7f0000001100)=""/203, 0xcb}, {&(0x7f0000001200)=""/203, 0xcb}, {&(0x7f0000001300)=""/160, 0xa0}], 0x7, &(0x7f0000001440)=""/70, 0x46}, 0x473}, {{&(0x7f00000014c0)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, 0x80, &(0x7f0000002540)=[{&(0x7f0000001540)=""/4096, 0x1000}], 0x1, 0x0, 0x0, 0x7}, 0x3}], 0x5, 0x10000, &(0x7f00000026c0)={0x77359400}) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000040)='lo\x00', 0x2) clock_gettime(0x0, &(0x7f0000002740)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000002700), 0x0, 0x2100, &(0x7f0000002780)={r2, r3+30000000}) syz_open_dev$midi(&(0x7f0000001040)='/dev/midi#\x00', 0x7, 0x90000) write$P9_RRENAME(r1, &(0x7f0000000080)={0x7, 0x15, 0x2}, 0x7) recvmmsg(0xffffffffffffffff, &(0x7f0000002b80), 0x0, 0xfffffffffffffffc, &(0x7f0000002b00)) 21:18:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)='\x00') sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) 21:18:45 executing program 7: perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 377.666485] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:45 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000100)={@in={{0x2, 0x4e21, @multicast1}}, 0xf039, 0x4, 0x98, "c156c657eff7b94dc3a252bd61b972339e7506ba9e3b2d698e1bf2c5a6d3cdbe91a0001c99f90a6c955072ea3ea6fd3b55d85fc65c009f1b8663787a826af21d851bfd3959655d5ba732dfeac60fc961"}, 0xd8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000280)={r3, 0x28, &(0x7f0000000200)}, 0x10) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r2) 21:18:45 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)='\x00') sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) [ 377.866861] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 378.129670] device veth0_to_bridge entered promiscuous mode [ 378.135880] device veth0_to_bridge left promiscuous mode [ 378.143844] device team0 entered promiscuous mode [ 378.148819] device team_slave_0 entered promiscuous mode [ 378.154606] device team_slave_1 entered promiscuous mode 21:18:46 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x6, 0x0) [ 378.176909] 8021q: adding VLAN 0 to HW filter on device team0 [ 378.184739] device team0 left promiscuous mode [ 378.189467] device team_slave_0 left promiscuous mode [ 378.195132] device team_slave_1 left promiscuous mode [ 378.441106] device team0 left promiscuous mode [ 378.445915] device team_slave_0 left promiscuous mode [ 378.451461] device team_slave_1 left promiscuous mode [ 378.460313] device team0 entered promiscuous mode [ 378.465386] device team_slave_0 entered promiscuous mode [ 378.471249] device team_slave_1 entered promiscuous mode [ 378.479582] 8021q: adding VLAN 0 to HW filter on device team0 [ 378.487529] device team0 entered promiscuous mode [ 378.492561] device team_slave_0 entered promiscuous mode [ 378.498384] device team_slave_1 entered promiscuous mode [ 378.506425] 8021q: adding VLAN 0 to HW filter on device team0 [ 378.515406] device team0 left promiscuous mode [ 378.520174] device team_slave_0 left promiscuous mode [ 378.525696] device team_slave_1 left promiscuous mode 21:18:46 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tee(r0, r0, 0x0, 0x6) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0xa0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f0000000200)="db28826d88c37bf6a1a62bda4e8a190b0527a8b289d8c7cfd517288adb54b845cda471a35c8ae40dbcea6a6ca9c8e3d3a1077604d87b06496dac89ebf130e16df7cc4f1947bca4f189234f2d2608665e59c8b207f8a4496347bfea37", &(0x7f0000000540)=""/208}, 0x18) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 378.721694] device team0 entered promiscuous mode [ 378.726730] device team_slave_0 entered promiscuous mode [ 378.732585] device team_slave_1 entered promiscuous mode [ 378.740860] 8021q: adding VLAN 0 to HW filter on device team0 [ 378.749719] device team0 left promiscuous mode [ 378.754586] device team_slave_0 left promiscuous mode [ 378.760177] device team_slave_1 left promiscuous mode 21:18:46 executing program 7: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f00000001c0)='/dev/snd/pcmC#D#p\x00', 0x7, 0x4c00) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:46 executing program 4: r0 = socket$packet(0x11, 0x5, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 379.175499] device team0 entered promiscuous mode [ 379.180595] device team_slave_0 entered promiscuous mode [ 379.186398] device team_slave_1 entered promiscuous mode [ 379.195322] 8021q: adding VLAN 0 to HW filter on device team0 [ 379.209485] device team0 left promiscuous mode [ 379.214371] device team_slave_0 left promiscuous mode [ 379.220069] device team_slave_1 left promiscuous mode [ 379.241177] device team0 entered promiscuous mode [ 379.246152] device team_slave_0 entered promiscuous mode [ 379.251954] device team_slave_1 entered promiscuous mode [ 379.270207] 8021q: adding VLAN 0 to HW filter on device team0 [ 379.288582] device veth0_to_bridge left promiscuous mode [ 379.297302] device veth0_to_bridge entered promiscuous mode [ 379.304440] device veth0_to_bridge left promiscuous mode [ 379.319473] device team0 left promiscuous mode [ 379.324553] device team_slave_0 left promiscuous mode [ 379.331552] device team_slave_1 left promiscuous mode 21:18:47 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) r3 = memfd_create(&(0x7f0000000080)='veth0_to_bridge\x00', 0x2) ioctl$TIOCMGET(r3, 0x5415, &(0x7f00000000c0)) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:47 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f00000001c0), &(0x7f0000000200)=0xc) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000140)=0x1c) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x4e24, 0x42, @remote, 0x2b2f}, 0x1c) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r3 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x420a00, 0x0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000280)={0x0, 0x7}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000300)={r4, 0x46a10415, 0x2, [0x8, 0x6]}, &(0x7f0000000340)=0xc) listen(r2, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r3) 21:18:47 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x6, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f00000004c0), 0x0, 0x0, 0x5}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:47 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f00000000c0)) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) syz_open_dev$sndpcmp(&(0x7f0000000080)='/dev/snd/pcmC#D#p\x00', 0x6, 0x0) 21:18:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getresgid(&(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280)=0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000540)={0x0, 0x93, "ef65f0649f66f61f48f0f21da9740e555d7e609f9670ceb4d8c67ed1ec32a0e5ddada2cbc643348a9f8f6959004c03389b871e85565e9bc6ba293641deb7851b9f751d2e28b4e8797a06d00343d3b5c5311c46b57686b9e2786536fb592ba2dbe4210faebaa062d3894d5ea9c114718938afd8fc75aec5cd911c5284a87e11652d4591148eb4e273f90939671a97735a162ba7"}, &(0x7f0000000480)=0x9b) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x23, &(0x7f00000004c0)={r2, 0xfffffffffffffff8}, 0x8) stat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r1, r3) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r4 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) ioctl$TIOCGSID(0xffffffffffffff9c, 0x5429, &(0x7f0000000400)=0x0) sched_getattr(r5, &(0x7f0000000440), 0x30, 0x0) bind$pptp(r4, &(0x7f00000001c0)={0x18, 0x2, {0x2}}, 0x1e) 21:18:47 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) socketpair(0xb, 0xa, 0x1, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r1, 0x80045300, &(0x7f0000000080)) [ 379.551757] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 379.918271] device team0 entered promiscuous mode [ 379.923257] device team_slave_0 entered promiscuous mode [ 379.929136] device team_slave_1 entered promiscuous mode [ 379.937858] 8021q: adding VLAN 0 to HW filter on device team0 [ 379.946940] device team0 left promiscuous mode [ 379.951933] device team_slave_0 left promiscuous mode [ 379.957502] device team_slave_1 left promiscuous mode 21:18:48 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)='\x00') sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) [ 380.165528] device team0 entered promiscuous mode [ 380.170696] device team_slave_0 entered promiscuous mode [ 380.176497] device team_slave_1 entered promiscuous mode [ 380.185243] 8021q: adding VLAN 0 to HW filter on device team0 [ 380.198471] device veth0_to_bridge entered promiscuous mode [ 380.247689] device team0 left promiscuous mode [ 380.252500] device team_slave_0 left promiscuous mode [ 380.258203] device team_slave_1 left promiscuous mode 21:18:48 executing program 4: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/sys/net/ipv4/vs/snat_reroute\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000280), &(0x7f00000002c0)=0xb) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r1, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000b80)={@mcast2, 0x0}, &(0x7f0000000bc0)=0x14) bind(r1, &(0x7f0000000c00)=@hci={0x1f, r3, 0x2}, 0x80) getresuid(&(0x7f0000000140), &(0x7f0000000180), &(0x7f00000001c0)) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e21, 0xc4, @empty, 0x8}, 0x8f58c906a5180f9a) listen(r2, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) r5 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x400000, 0x0) connect$rds(r5, &(0x7f0000000100)={0x2, 0x4e23, @local}, 0x10) close(r2) 21:18:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x10000, 0x4) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000340)='IPVS\x00') sendmsg$IPVS_CMD_GET_DEST(r1, &(0x7f0000000440)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000380)=ANY=[@ANYBLOB='|\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000026bd7000fedbdf250800000008000400a606000048000100080009005300000014000300e000000100000000000000000000000008000b007369700008000600727200000800050000000000080001000a0000000800050002000000"], 0x64}, 0x1, 0x0, 0x0, 0x4000}, 0x800) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x153, r0, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x7, 0x200000) ioctl$EVIOCGMTSLOTS(r4, 0x8040450a, &(0x7f0000000100)=""/44) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r5, &(0x7f0000000280)="ffe8ac390bcfd726d86f88254321321b1f732cf1376623ccbd02c1a6080c87d3c94e60b556408a3b50078e9f55a2fec2e34875a7d097f682957ad00e788cd94d94866382fe89dd43b699af5237e57bfddffa302162dcfe5d23c2fd894408c2ce240ac67cdc03caf2fd416ca2f9358de5cfa2aa865909ced9e8373f574cf817b16c599713c5386176567c061e3f7c06", 0x8f, 0x20000004, &(0x7f0000000080)={0xa, 0x4e23, 0x0, @local}, 0x1c) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000180)={r4, 0x3, 0x1, 0x2, &(0x7f0000000140)=[0x0, 0x0], 0x2}, 0x20) close(r3) 21:18:48 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$packet(0x11, 0x3, 0x300, &(0x7f0000000040)) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty, 0x8000}, 0x1c) close(r1) [ 380.674428] device team0 left promiscuous mode [ 380.679304] device team_slave_0 left promiscuous mode [ 380.684890] device team_slave_1 left promiscuous mode [ 380.721305] device veth0_to_bridge entered promiscuous mode [ 380.727736] device team0 entered promiscuous mode [ 380.730133] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 380.732839] device team_slave_0 entered promiscuous mode [ 380.748799] device team_slave_1 entered promiscuous mode [ 380.757559] 8021q: adding VLAN 0 to HW filter on device team0 21:18:48 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) [ 380.769759] device team0 entered promiscuous mode [ 380.774804] device team_slave_0 entered promiscuous mode [ 380.780576] device team_slave_1 entered promiscuous mode [ 380.788246] 8021q: adding VLAN 0 to HW filter on device team0 [ 380.796419] device veth0_to_bridge left promiscuous mode [ 380.805069] device team0 left promiscuous mode [ 380.810068] device team_slave_0 left promiscuous mode [ 380.815666] device team_slave_1 left promiscuous mode 21:18:48 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) getsockopt$inet_int(r0, 0x0, 0x13, &(0x7f0000000280), &(0x7f00000002c0)=0x4) arch_prctl(0x1006, &(0x7f00000003c0)="e12bc632773b7d273c4c65a62ef650a7520f399970af1a3b43f6656f1defcd90826139bc7f3437a5e22c1b5a982bc55303ecdb462bb9bb0315e8d849a89dff7bb795a0a9bdc9ae917c6debc0a13fc5d7cad3027a1f51f3abecf8e7227899ce646d69d6dedfe5ec232f7c6f73aac80d65ffdb070c1486da288f9ca77c1b6a6216fc7e8465fab21e34bd484b3a89e2a94ddacdf90ee999f788457bb2e3c7a637a831a078cfbef089bcdb1e") connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x8, @dev={0xfe, 0x80, [], 0x1e}}, 0x1c) splice(r0, &(0x7f0000000080), r0, &(0x7f00000000c0), 0x0, 0xf) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r1 = syz_open_dev$vcsa(&(0x7f0000000140)='/dev/vcsa#\x00', 0x100000001, 0x8000) ioctl$sock_bt_hidp_HIDPCONNADD(r1, 0x400448c8, &(0x7f00000001c0)={r0, r0, 0x2, 0x7, &(0x7f0000000180)="fe6369b643bccb7e9f91dd299193ab580a34ff9856a5dd84998770cb9d582a", 0x6, 0x2, 0x0, 0x3, 0x1, 0x6, 0x7fffffff, "37a082de9218a52db8a26573c94f1e2a638060284594609667a781d3d20e0f50d3c52ed6520fdf1268d1d3a3b0aba089cbd8fefe1fa809f4e493ff8ad60bb80641bb029abcc24313ce22fdd981e92eb9087b5c42ac225cd3345a6aa616b43b18956be269b317b86435ad31f3f7ca4e97aaa270de1eae6b4dab8e435c93e41c78b3727efe22"}) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x6, &(0x7f0000000040)=0xc8, 0x4) [ 380.929369] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_netdev_private(r0, 0x89fc, &(0x7f0000000100)="bf7c3d9c129b2041967161e031742c4ccfdae359ab37d0d5475132724e7f2d5b5c33372312a9b2962fd3556e8ac42bdebf3553aba64b99654d78d921655fad43b6ad34c653885f7897d7bba8623c53f240a8799f441ebe10c165239f098465dd5658d16c812d3bb688717439903cc282d0594abaaba26e66c83e6ab9421796e9e4f6aa5bbd9413566f22f0a6") setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) socketpair$inet(0x2, 0x0, 0x2, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_buf(r3, 0x6, 0x1d, &(0x7f0000000280)="fd0015b140b2e76ccf80cd307e651b6d919da09e5663c6ea709f1c68316d710a9c4957f93f7db495b9d1b5b8ed556f58e3ad629792415dcef5ca75602fa7a4196febbd742ac5fc2212c9d5a916ca0568b40e70aba3ef59e5773fe6e0cebc5cabb059397cc16c4a612e88388c1b3c0fd3d2e3ef3e48e4", 0x76) r4 = dup3(r1, r1, 0x80000) ioctl$sock_inet_udp_SIOCINQ(r4, 0x541b, &(0x7f0000000040)) [ 381.212474] device team0 left promiscuous mode [ 381.217268] device team_slave_0 left promiscuous mode [ 381.222805] device team_slave_1 left promiscuous mode 21:18:49 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x8) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000200)={'IDLETIMER\x00'}, &(0x7f0000000240)=0x1e) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) 21:18:49 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)='\x00') sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) 21:18:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x6, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 381.595650] device team0 left promiscuous mode [ 381.600706] device team_slave_0 left promiscuous mode [ 381.606296] device team_slave_1 left promiscuous mode [ 381.616769] device team0 entered promiscuous mode [ 381.621845] device team_slave_0 entered promiscuous mode [ 381.627626] device team_slave_1 entered promiscuous mode [ 381.651280] 8021q: adding VLAN 0 to HW filter on device team0 [ 381.671711] device veth0_to_bridge left promiscuous mode [ 381.701788] device team0 entered promiscuous mode [ 381.706801] device team_slave_0 entered promiscuous mode [ 381.712577] device team_slave_1 entered promiscuous mode [ 381.749847] 8021q: adding VLAN 0 to HW filter on device team0 [ 381.835281] device team0 left promiscuous mode [ 381.840163] device team_slave_0 left promiscuous mode [ 381.845695] device team_slave_1 left promiscuous mode 21:18:49 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000100)='/dev/md0\x00', 0x800, 0x0) r3 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r3, &(0x7f0000000400)={0xa, 0x4, 0x0, @loopback}, 0x1c) capset(&(0x7f00000001c0)={0x20080522}, &(0x7f0000000200)) sendto$inet6(r3, &(0x7f0000000240)="04", 0x1, 0x0, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x6}, 0x1c) ioctl$BLKTRACETEARDOWN(r2, 0x1276, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x4) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f00000000c0)) write(r4, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000080)={r1, 0x1, 0x6, @local}, 0x10) openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x0, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:49 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) r0 = socket(0x1b, 0x800, 0x904) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) tee(r1, r1, 0x7, 0x9) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x68, r2, 0x2, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x3ff}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e23}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x800}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3ff}]}, 0x68}, 0x1, 0x0, 0x0, 0x20000000}, 0x841) ioctl$sock_SIOCOUTQNSD(r0, 0x894b, &(0x7f00000003c0)) 21:18:49 executing program 5: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) tee(r0, r0, 0x0, 0x6) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0xa0) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f0000000200)="db28826d88c37bf6a1a62bda4e8a190b0527a8b289d8c7cfd517288adb54b845cda471a35c8ae40dbcea6a6ca9c8e3d3a1077604d87b06496dac89ebf130e16df7cc4f1947bca4f189234f2d2608665e59c8b207f8a4496347bfea37", &(0x7f0000000540)=""/208}, 0x18) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x5, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:49 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000340)={{{@in=@local, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@mcast1}}, &(0x7f0000000200)=0xe8) r2 = getegid() lchown(&(0x7f00000001c0)='./file0\x00', r1, r2) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:49 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0xfffffffffffffd94) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x10000, 0x0) ioctl$PPPIOCGL2TPSTATS(r1, 0x80487436, &(0x7f0000000280)="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") r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r3) [ 382.064519] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:50 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000140)='\x00') sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)) [ 382.386851] device team0 entered promiscuous mode [ 382.392069] device team_slave_0 entered promiscuous mode [ 382.397888] device team_slave_1 entered promiscuous mode [ 382.406527] 8021q: adding VLAN 0 to HW filter on device team0 [ 382.415698] device team0 left promiscuous mode [ 382.420454] device team_slave_0 left promiscuous mode [ 382.426057] device team_slave_1 left promiscuous mode 21:18:50 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 382.753925] device veth0_to_bridge entered promiscuous mode [ 382.763018] device team0 left promiscuous mode [ 382.768318] device team_slave_0 left promiscuous mode [ 382.775371] device team_slave_1 left promiscuous mode 21:18:50 executing program 4: r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x1000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @multicast1}}, [0x1ff, 0x101, 0x5, 0x8, 0x3500000000000000, 0xcc2, 0x9333, 0x7fff, 0x101, 0x4, 0x2, 0x37a, 0x1ff, 0x200, 0x3]}, &(0x7f0000000200)=0x100) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000280)={r1, 0x5}, 0x8) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r4) [ 383.016249] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:51 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x6, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 383.114837] device team0 entered promiscuous mode [ 383.119830] device team_slave_0 entered promiscuous mode [ 383.126077] device team_slave_1 entered promiscuous mode [ 383.137602] 8021q: adding VLAN 0 to HW filter on device team0 [ 383.148679] device team0 entered promiscuous mode [ 383.153655] device team_slave_0 entered promiscuous mode [ 383.159437] device team_slave_1 entered promiscuous mode 21:18:51 executing program 5: r0 = gettid() ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r0, 0x10, &(0x7f00000000c0)={0x2}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) fsetxattr(r1, &(0x7f0000000000)=@known='security.capability\x00', &(0x7f0000000100)='!$,\x00', 0x4, 0x0) [ 383.174526] 8021q: adding VLAN 0 to HW filter on device team0 [ 383.185843] device veth0_to_bridge left promiscuous mode [ 383.196563] device team0 left promiscuous mode [ 383.201759] device team_slave_0 left promiscuous mode [ 383.208640] device team_slave_1 left promiscuous mode 21:18:51 executing program 5: unshare(0x20400) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x0, 0x0) ioctl$PPPIOCGCHAN(r0, 0x80047437, &(0x7f0000000000)) fcntl$setlease(r0, 0x400, 0x0) fcntl$setlease(r0, 0x400, 0x2) 21:18:51 executing program 5: r0 = socket$inet6(0xa, 0x80803, 0x87) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000000000041}, 0xc) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000400)={{{@in, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x0, 0x0, 0x1}, {{@in=@dev, 0x0, 0x2b}, 0x0, @in6=@loopback, 0x0, 0x0, 0x0, 0x90}}, 0xe8) connect$inet6(r0, &(0x7f00000000c0), 0x1c) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000080), 0x4) 21:18:51 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000bc8000)) write$binfmt_script(r2, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x1) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r0, &(0x7f0000011fd2), 0xffffffcb) tee(r1, r0, 0x2, 0x0) dup2(r1, r3) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0xcc, &(0x7f0000000040)={{0xa, 0x4e20, 0x101, @ipv4={[], [], @rand_addr=0x9e}, 0xd}, {0xa, 0x4e23, 0x5, @dev={0xfe, 0x80, [], 0x13}, 0xc65a}, 0x1f, [0x8000, 0x3, 0x400, 0x43, 0x2, 0x8000, 0x80, 0x1ff]}, 0x5c) [ 383.776348] device team0 entered promiscuous mode [ 383.781355] device team_slave_0 entered promiscuous mode [ 383.787189] device team_slave_1 entered promiscuous mode [ 383.794864] 8021q: adding VLAN 0 to HW filter on device team0 [ 383.819102] device team0 left promiscuous mode [ 383.823841] device team_slave_0 left promiscuous mode [ 383.829368] device team_slave_1 left promiscuous mode [ 383.838775] device team0 entered promiscuous mode [ 383.843937] device team_slave_0 entered promiscuous mode [ 383.849767] device team_slave_1 entered promiscuous mode [ 383.858943] 8021q: adding VLAN 0 to HW filter on device team0 21:18:51 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) 21:18:51 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0xfffffffffffffff7, 0x101000) r2 = fcntl$getown(r0, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_REPLACE(r1, 0xc1105518, &(0x7f0000000340)={{0x7, 0x0, 0x1ff, 0x7, '\x00', 0x5e}, 0x3, 0x0, 0x5, r2, 0x2, 0xffffffff, 'syz0\x00', &(0x7f0000000200)=['proc\x00', 'team0\x00'], 0xb, [], [0x5, 0xea72, 0x101]}) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$binfmt_aout(r0, &(0x7f0000000700)={{0xcc, 0xf2, 0x7fff, 0x335, 0xc0, 0x0, 0x26d}, "5281fb816bb105817db95e2939d24fbb247efbdcf003d51e6b0a7ed316831819d62b99bd437879f28de7b077b9db52c2fa77f5a6b9ffc34b7493002a954a45f3850fbb2930da6b31275b96bcabdcf870e2c0462b9402c3a738b4d8a552cd7e514905ad580ac872fbf7c134f8fca0b5bbaae1468822c24ee9", [[], [], [], []]}, 0x498) [ 383.866971] device veth0_to_bridge entered promiscuous mode [ 383.873523] device veth0_to_bridge left promiscuous mode [ 383.882537] device team0 left promiscuous mode [ 383.887437] device team_slave_0 left promiscuous mode [ 383.892972] device team_slave_1 left promiscuous mode 21:18:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) fanotify_init(0x9, 0x80000) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:52 executing program 1: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x8}, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) openat$fuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/fuse\x00', 0x2, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x3) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:18:52 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) r1 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x6, 0x400000) setsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f0000000140)=@int=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req={0xd9b3, 0x1, 0x80000001, 0x7fff}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r2, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$can_raw(0x1d, 0x3, 0x1) sendto$inet6(r3, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) close(r2) sendto$inet(r1, &(0x7f0000000180)="fe8d90db05740c1cfcff819eedeaf35beb6f162bfb186bf205ca6008d8d0c6a4c05d88dbcf7f164803453b9505881207b5a24f5e4aa911a58ebc2974a2c6d62ee8c753e6158b0436e2f3733e3c1291fad8ca", 0x52, 0x8010, &(0x7f0000000200)={0x2, 0x4e20, @rand_addr=0x4}, 0x10) 21:18:52 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = socket(0x10, 0x5, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) close(r0) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 384.259190] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 384.450894] device team0 entered promiscuous mode [ 384.455913] device team_slave_0 entered promiscuous mode [ 384.461757] device team_slave_1 entered promiscuous mode 21:18:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x4, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:52 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in={{0x2, 0x4e22}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, &(0x7f00000000c0)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) select(0x40, &(0x7f00000001c0)={0x7, 0x5c, 0x2, 0x4, 0x7, 0xe8, 0x1, 0x40}, &(0x7f00000002c0)={0x8, 0x9, 0x8, 0x1, 0x100, 0x3, 0x5, 0x7}, &(0x7f0000000300)={0x1, 0x1, 0xffff, 0x7f, 0x9, 0x4, 0x1, 0x3}, &(0x7f0000000340)={0x77359400}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:18:52 executing program 5: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x40, 0x0) ioctl$RTC_ALM_READ(r0, 0x80247008, &(0x7f0000000100)) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) close(r1) recvmsg$kcm(r2, &(0x7f0000005880)={&(0x7f0000004700)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000005780)=[{&(0x7f0000004780)=""/4096, 0x1000}], 0x1, &(0x7f00000057c0)=""/175, 0xaf}, 0x40) bind$bt_rfcomm(r1, &(0x7f0000000000)={0x1f, {0x5, 0x33e3, 0x4, 0x2, 0xc50, 0x6}}, 0xa) write$FUSE_STATFS(r2, &(0x7f0000000040)={0x60, 0x0, 0x8, {{0x2, 0x1, 0x4, 0x5, 0xfffffffffffffffa, 0x9, 0x7, 0x3}}}, 0x60) [ 384.519982] 8021q: adding VLAN 0 to HW filter on device team0 [ 384.542886] device veth0_to_bridge entered promiscuous mode [ 384.558208] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. 21:18:52 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vsock\x00', 0x20000, 0x0) ioctl$TIOCGETD(r0, 0x5424, &(0x7f0000000200)) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 384.584464] device veth0_to_bridge left promiscuous mode [ 384.603124] device team0 left promiscuous mode [ 384.607907] device team_slave_0 left promiscuous mode [ 384.613444] device team_slave_1 left promiscuous mode 21:18:52 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x80, 0x7}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f0000000100)={r4, 0x5}, &(0x7f00000001c0)=0x8) 21:18:52 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x6, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:52 executing program 5: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x18) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000080)=""/110) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000500), &(0x7f0000000800)) [ 384.784926] Unknown ioctl 21540 21:18:52 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000008000)={0x8, {{0x2, 0x0, @multicast2}}}, 0x90) mprotect(&(0x7f0000008000/0x4000)=nil, 0x4000, 0xa) getsockopt$inet_buf(r0, 0x0, 0x30, &(0x7f0000008000), &(0x7f0000000000)=0x369) [ 385.153269] device team0 left promiscuous mode [ 385.158201] device team_slave_0 left promiscuous mode [ 385.163769] device team_slave_1 left promiscuous mode [ 385.179069] device team0 entered promiscuous mode [ 385.184171] device team_slave_0 entered promiscuous mode [ 385.189986] device team_slave_1 entered promiscuous mode 21:18:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f, 0x5}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000280)={0x8, 0x120, 0xfa00, {0x2, {0x5, 0x1, "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", 0x18, 0x4457, 0x101, 0xfffffffffffffff9, 0x8, 0x8, 0x0, 0x1}, r2}}, 0x128) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r3, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r3) [ 385.203599] 8021q: adding VLAN 0 to HW filter on device team0 [ 385.212345] device team0 entered promiscuous mode [ 385.217298] device team_slave_0 entered promiscuous mode [ 385.223148] device team_slave_1 entered promiscuous mode 21:18:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sequencer2\x00', 0x80000, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f00000003c0)={0x1, 0x2, [@local, @broadcast]}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) ioctl$int_out(r2, 0x5460, &(0x7f0000000400)) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r2, 0x84, 0x70, &(0x7f00000001c0)={r1, @in={{0x2, 0x4e20}}, [0x26a9, 0x9, 0x4, 0x7, 0x6, 0x8000, 0x80, 0xd5fd965, 0x7, 0x4, 0x1, 0xc0, 0x3, 0x6, 0x992]}, &(0x7f0000000340)=0x100) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 385.269870] 8021q: adding VLAN 0 to HW filter on device team0 [ 385.292115] device veth0_to_bridge entered promiscuous mode [ 385.298563] device team0 entered promiscuous mode [ 385.303558] device team_slave_0 entered promiscuous mode [ 385.309346] device team_slave_1 entered promiscuous mode [ 385.322139] 8021q: adding VLAN 0 to HW filter on device team0 [ 385.348499] Unknown ioctl 21540 [ 385.352537] device team0 left promiscuous mode [ 385.357434] device team_slave_0 left promiscuous mode [ 385.363054] device team_slave_1 left promiscuous mode [ 385.375974] device team0 entered promiscuous mode [ 385.381182] device team_slave_0 entered promiscuous mode [ 385.386973] device team_slave_1 entered promiscuous mode [ 385.401191] TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. [ 385.408886] 8021q: adding VLAN 0 to HW filter on device team0 21:18:53 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(r0, 0x0, 0x42, &(0x7f0000000040)={'TPROXY\x00'}, &(0x7f0000000080)=0x1e) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 385.425153] device team0 left promiscuous mode [ 385.429975] device team_slave_0 left promiscuous mode [ 385.435563] device team_slave_1 left promiscuous mode 21:18:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x3) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000100)=""/241, &(0x7f0000000040)=0xf1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:53 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000280)='/dev/audio\x00', 0x200000, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8905, &(0x7f0000000340)) ioctl$VHOST_SET_VRING_BUSYLOOP_TIMEOUT(r0, 0x4008af23, &(0x7f0000000100)={0x3, 0x4}) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 385.781220] device team0 left promiscuous mode [ 385.785972] device team_slave_0 left promiscuous mode [ 385.791536] device team_slave_1 left promiscuous mode 21:18:53 executing program 4: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000240)=0x1, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) listen(r1, 0x3) getsockopt$inet6_opts(r1, 0x29, 0x3b, &(0x7f0000000100)=""/241, &(0x7f0000000040)=0xf1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r2, &(0x7f0000000280), 0xffffffee, 0x20000004, &(0x7f0000000080)={0xa, 0x4e22}, 0x1c) close(r1) 21:18:54 executing program 4: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in={{0x2, 0x4e22}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}, &(0x7f00000000c0)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) select(0x40, &(0x7f00000001c0)={0x7, 0x5c, 0x2, 0x4, 0x7, 0xe8, 0x1, 0x40}, &(0x7f00000002c0)={0x8, 0x9, 0x8, 0x1, 0x100, 0x3, 0x5, 0x7}, &(0x7f0000000300)={0x1, 0x1, 0xffff, 0x7f, 0x9, 0x4, 0x1, 0x3}, &(0x7f0000000340)={0x77359400}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:18:54 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fsync(r1) ioctl(r1, 0x8912, &(0x7f0000000000)="025cc80700145f8f764070") syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x10000) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x3, 0x4, 0x100000001, 0x14, r0}, 0x2c) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x10000000bff, 0x0) write$P9_RMKNOD(r2, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x4, 0x3, 0x2}}, 0x14) [ 386.222114] device team0 entered promiscuous mode [ 386.227092] device team_slave_0 entered promiscuous mode [ 386.232930] device team_slave_1 entered promiscuous mode [ 386.260444] 8021q: adding VLAN 0 to HW filter on device team0 21:18:54 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x3, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 386.275858] device team0 left promiscuous mode [ 386.280648] device team_slave_0 left promiscuous mode [ 386.286275] device team_slave_1 left promiscuous mode [ 386.295288] device team0 entered promiscuous mode [ 386.300289] device team_slave_0 entered promiscuous mode [ 386.306174] device team_slave_1 entered promiscuous mode [ 386.334115] 8021q: adding VLAN 0 to HW filter on device team0 [ 386.345387] device team0 left promiscuous mode [ 386.350105] device team_slave_0 left promiscuous mode [ 386.355670] device team_slave_1 left promiscuous mode [ 386.593812] device team0 left promiscuous mode [ 386.598529] device team_slave_0 left promiscuous mode [ 386.604145] device team_slave_1 left promiscuous mode [ 386.804386] device team0 entered promiscuous mode [ 386.809376] device team_slave_0 entered promiscuous mode [ 386.815238] device team_slave_1 entered promiscuous mode [ 386.822978] 8021q: adding VLAN 0 to HW filter on device team0 [ 386.830724] device veth0_to_bridge left promiscuous mode [ 386.836780] device team0 entered promiscuous mode [ 386.841983] device team_slave_0 entered promiscuous mode [ 386.847787] device team_slave_1 entered promiscuous mode 21:18:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 386.861340] 8021q: adding VLAN 0 to HW filter on device team0 [ 386.875194] device team0 left promiscuous mode [ 386.880125] device team_slave_0 left promiscuous mode [ 386.885665] device team_slave_1 left promiscuous mode [ 386.943191] device team0 entered promiscuous mode [ 386.948344] device team_slave_0 entered promiscuous mode [ 386.954200] device team_slave_1 entered promiscuous mode 21:18:55 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x6, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000001c0)="2a541a8ccbf8c1705050536182f8199b49728f1fc3dacace4f6f870122576651ba0a14c2a0ffd69182ee25b6090f6baf58c435a713ccb544738d5ebb651ef210104ca8aae31b19da49fc10470a7f9ee4bc9e58b2ff7709f2432b1a19974d9df306d7bff28be220e12852bdaeaa2d463e050ad72626cd6240487dd306a4ae57b80a38c22da19fe2efe07fa0c1fe59eab6af90f36001889a09ca3043a32c524aecc33ca4a1ea2f67d78a5721be45601a450d8a149bd68cc87438efac07534b7ad57c456f76091e697f49fe517b2c49d71eaa55dc8dd1cb3148f1a547e0041c3b07dff71d4c013ce6c473", 0xe9, 0x3, 0x81}, {&(0x7f0000000140)="427149d85ada5cc51872b71452ba42034e4d89788923e774b85ab86153764236a3041657cf4d1d4aca97c41380f3c6a963", 0x31, 0x5, 0xbbf}, {&(0x7f00000002c0)="5c14f8a924efe6d65d68c0b053fe790cbb59c9545f4fd0ea8342653dfed9e75fed5236b8780614ddf1e7cdd4d5c61807c30128a6fafd4071b8aa462401650088", 0x40, 0x6, 0x5}, {&(0x7f0000000300)="02a65b49c570eb680814324697a181e047", 0x11, 0x5, 0x2b}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:55 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0xffffffffffffffd3, @remote}, 0x10) r2 = socket$netlink(0x10, 0x3, 0xd) r3 = dup3(r0, r0, 0x80000) bind$inet6(r3, &(0x7f0000000380)={0xa, 0x4e21, 0x1, @ipv4={[], [], @rand_addr=0x3}, 0x4}, 0x1c) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = add_key(&(0x7f0000000280)='big_key\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffff8) r5 = add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$unlink(0x9, r4, r5) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) r7 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000080)='user\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000001c0)="e4a00c21ee2db0d2bd388d67812107916276ae2f57e001388a3d33f1c2bd1d7054193b82721f0762d13ab29949b7551d0d5fff8dfc137477be085706aececab029e91775ba750dae5f66b3dcf1567b9f6a4db551ab4abe482e4826a4f5439719c6ebe001be309b8e7cfef12482e1a485213fa2a3", 0x74, r7) ioctl$KDGKBSENT(r6, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:55 executing program 6: r0 = syz_open_dev$usbmon(&(0x7f00000001c0)='/dev/usbmon#\x00', 0x0, 0x40) r1 = pkey_alloc(0x0, 0x1) pkey_free(r1) ioctl$SIOCSIFHWADDR(r0, 0x8924, &(0x7f0000000200)={'bcsh0\x00'}) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 386.993862] 8021q: adding VLAN 0 to HW filter on device team0 [ 387.037658] device team0 left promiscuous mode [ 387.042922] device team_slave_0 left promiscuous mode [ 387.048449] device team_slave_1 left promiscuous mode 21:18:55 executing program 4: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)={0x5, 0x100000001, 0x1000000000000005, 0x1}, 0x2c) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") socket$pppoe(0x18, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) socket$bt_rfcomm(0x1f, 0x3, 0x3) write$P9_RRENAMEAT(r0, &(0x7f0000000380)={0x7}, 0x7) 21:18:55 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x8800, 0x0) accept4$packet(0xffffffffffffff9c, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000340)=0x14, 0x80800) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f00000003c0)=[0xff, 0x9]) ioctl$TUNSETIFINDEX(r0, 0x400454da, &(0x7f0000000380)=r1) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000580)={0x2, 0x0, @broadcast}, &(0x7f0000000540)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) fstat(r2, &(0x7f0000000040)) r4 = accept$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000400)=0x1c) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000440)={r3, 0x10001}, &(0x7f0000000480)=0x8) r5 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000002c0)={'team0\x00'}) r6 = pkey_alloc(0x0, 0x2) pkey_free(r6) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:18:55 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000080)={@rand_addr}, &(0x7f00000000c0)=0xc) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:18:55 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000733000)={0x5, 0x5, 0x7, 0x9}, 0x2c) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fsync(r1) ioctl(r1, 0x8912, &(0x7f0000000000)="025cc80700145f8f764070") syz_open_dev$sndseq(&(0x7f0000000080)='/dev/snd/seq\x00', 0x0, 0x10000) bpf$MAP_CREATE(0x0, &(0x7f0000000100)={0xd, 0x3, 0x4, 0x100000001, 0x14, r0}, 0x2c) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x10000000bff, 0x0) write$P9_RMKNOD(r2, &(0x7f0000000040)={0x14, 0x13, 0x2, {0x4, 0x3, 0x2}}, 0x14) [ 387.659943] device team0 entered promiscuous mode [ 387.665085] device team_slave_0 entered promiscuous mode [ 387.670869] device team_slave_1 entered promiscuous mode [ 387.713573] 8021q: adding VLAN 0 to HW filter on device team0 [ 387.740432] device team0 entered promiscuous mode [ 387.745956] device team_slave_0 entered promiscuous mode [ 387.751772] device team_slave_1 entered promiscuous mode [ 387.762412] 8021q: adding VLAN 0 to HW filter on device team0 [ 387.772910] device team0 left promiscuous mode [ 387.777758] device team_slave_0 left promiscuous mode [ 387.783300] device team_slave_1 left promiscuous mode [ 387.825995] device team0 entered promiscuous mode [ 387.831178] device team_slave_0 entered promiscuous mode [ 387.837000] device team_slave_1 entered promiscuous mode [ 387.850446] 8021q: adding VLAN 0 to HW filter on device team0 21:18:55 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x2, &(0x7f00000005c0)=[{&(0x7f00000000c0)="08f05596b34234770e019ac8fce0deff7ef02936db7a5793abdcb845a46106b63f77a7121851094d49de9ff02aba13dfb45d863a1d5722188b851dffa9d2493391bd7c7f5df6d70423ff3e95f8ec316fdbdb5e786d4c", 0x56, 0x80000000, 0x8}, {&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 387.879333] device team0 left promiscuous mode [ 387.884172] device team_slave_0 left promiscuous mode [ 387.889718] device team_slave_1 left promiscuous mode 21:18:55 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x9) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x90000, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f00000000c0)={@broadcast}, &(0x7f0000000100)=0xc) sendmsg$nl_route(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f00000005c0)=@newlink={0x3c, 0x10, 0x601, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x1c, 0x12, @bond={{0xc, 0x1, 'bond\x00'}, {0xc, 0x2, [@IFLA_BOND_UPDELAY={0x8, 0x14, 0xf0ffffffffffff}]}}}]}, 0x3c}}, 0x0) [ 388.224121] device team0 left promiscuous mode [ 388.228901] device team_slave_0 left promiscuous mode [ 388.234486] device team_slave_1 left promiscuous mode 21:18:56 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000200)={0x0, @in6={{0xa, 0x4e23, 0x9dd000000000000, @local, 0x8f57}}, 0x8000000000000, 0x72, 0x91, 0x3, 0x4}, &(0x7f00000002c0)=0x98) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000004c0)=ANY=[@ANYRES32=r1, @ANYBLOB="498d897c11efeaa4660100060003004c0008000b9e14a0cb5d"], &(0x7f0000000380)=0x14) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000001c0)={"7465616d5f736c6176655f1d00"}) r3 = openat$vsock(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vsock\x00', 0x100, 0x0) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r3, 0x81785501, &(0x7f0000000400)=""/182) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:56 executing program 5: r0 = socket$pptp(0x18, 0x1, 0x2) write$binfmt_misc(r0, &(0x7f0000000000)={'syz1', "5d094a1338370c7c60a31234d51e3c5fb47392742ac787acd1fb1047d8fcc027a96e76909b3f8c34a4d4d1e1f1d801df365db96c4d679cfc296eba60982e62fe02a320572511e31ed909829d29a11fa664517e1c4ce9af81d596a84901fc3f5c526bc083d8041f"}, 0x6b) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000080), &(0x7f00000000c0)=0x8) r1 = syz_open_dev$vcsn(&(0x7f0000000100)='/dev/vcs#\x00', 0x3, 0x101000) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000140)={0x0, 0x14, "b58844f574c04f0f963a065640c6db6b3045dd5a"}, &(0x7f0000000180)=0x1c) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x1a, &(0x7f00000001c0)={r2, 0x99, "604e5106892eff7bdf9279fd1b279496f44f0e19a1714203c9f651d386cfe66f0bfaf205db602226bcf628387f39bf7165330e6ed1263c8939c98c9639bff732ba3a9145023ec472ebf4b76b063cd9ebbf454cde7725d0526af14ce77ce062f73e62cb92c2a1130d96e18fbefaceddf0f15632a8c36a45ff5d4e1c7eeca4254c9f8b8de4ae5cb520f79bab8de5077a964151dd1d73d51ce280"}, &(0x7f0000000280)=0xa1) flistxattr(r1, &(0x7f00000002c0)=""/19, 0x13) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000300), 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_dev$evdev(&(0x7f0000000340)='/dev/input/event#\x00', 0x5, 0x800) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000380), &(0x7f00000003c0)=0x4) r5 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer\x00', 0x80102, 0x0) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r4) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000440)={@in={{0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xe}}}, 0x0, 0x200, 0x100, "6b8143bdc8f72f36d28af8d724df2cd4a3e053a8355421d1305d15bb928abf0dbe5edb8908bf20cbc32dfface36a48d3fbf6737ca33b57f1b1a438c8baa3e40adb14b94d8f7e3b7741fc3c73cca90d11"}, 0xd8) setsockopt$IP_VS_SO_SET_DELDEST(r5, 0x0, 0x488, &(0x7f0000000540)={{0x5c, @empty, 0x4e23, 0x2, 'sh\x00', 0x2, 0x8000, 0x55}, {@local, 0x4e24, 0x3, 0x80, 0x8001, 0x76dab4a5}}, 0x44) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r5, 0x84, 0x13, &(0x7f00000005c0)=0xffffffffffffffe0, 0x4) connect$inet(r5, &(0x7f0000000600)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x17}}, 0x10) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0xa, 0x85810, r1, 0x0) socket$netlink(0x10, 0x3, 0x1) r6 = socket$netlink(0x10, 0x3, 0xd) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000640)={r3, 0x98, "2dc77d4ccdb9a3e54f30ba222757709ab86bf23f9e8dd780d4873833764bec577ce4732d80fac5e39b52f146912de310414a4f17539d769f6724571bb0f53a63d70b2804e730ccb201b3cf03c1f925d0b780ea936cd8850cda5d8bc4d3323c1073b11ba2a71559e91b414499b86ddd87babd09f53cbf681c094ea18df8573a32db8f8e64aa183dd93a80edcd9ed1fc592b40879f55eb511e"}, &(0x7f0000000700)=0xa0) r7 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000740)='/dev/vhost-net\x00', 0x2, 0x0) msync(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x5) ioctl$LOOP_CHANGE_FD(r1, 0x4c06, r6) socket$bt_hidp(0x1f, 0x3, 0x6) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f0000000780), &(0x7f00000007c0)=0x8) ioctl$TIOCSBRK(r7, 0x5427) mincore(&(0x7f0000ffb000/0x2000)=nil, 0x2000, &(0x7f0000000800)=""/107) getpeername$netlink(r0, &(0x7f0000000880), &(0x7f00000008c0)=0xc) sysinfo(&(0x7f0000000900)=""/4096) [ 388.452266] Unknown ioctl -2122820351 21:18:56 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) r1 = syz_open_dev$mice(&(0x7f0000000580)='/dev/input/mice\x00', 0x0, 0x400000) r2 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = getpgrp(0x0) capget(&(0x7f0000000700)={0x2007102a, r3}, &(0x7f0000000600)={0x3, 0x0, 0x8, 0x43d57117, 0x7, 0x103}) r4 = syz_open_procfs(0x0, &(0x7f00000001c0)='fdinfo/3\x00') r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r6 = shmget$private(0x0, 0x1000, 0x78000001, &(0x7f0000ffe000/0x1000)=nil) shmctl$IPC_STAT(r6, 0x2, &(0x7f00000004c0)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r7 = socket(0x10, 0xa, 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r7, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) r8 = request_key(&(0x7f0000000340)='trusted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000480)='wlan1trusted\x00', 0x0) add_key$user(&(0x7f0000000200)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000280)="46734743077406a9567d516c1da94fa1814bce77bff46acabf67e359590ba1e3e4292527ef59b211b539689a9b625682fee748a7e7eeac1625021876cf64", 0x3e, r8) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 388.617304] device team0 left promiscuous mode [ 388.622241] device team_slave_0 left promiscuous mode [ 388.627868] device team_slave_1 left promiscuous mode [ 388.672224] device team0 entered promiscuous mode [ 388.677254] device team_slave_0 entered promiscuous mode [ 388.683135] device team_slave_1 entered promiscuous mode 21:18:56 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = socket(0x0, 0x802, 0xf7f) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 388.727254] 8021q: adding VLAN 0 to HW filter on device team0 [ 388.745776] (unnamed net_device) (uninitialized): option packets_per_slave: invalid value (18446744073709551615) [ 388.756408] (unnamed net_device) (uninitialized): option packets_per_slave: allowed values 0 - 65535 21:18:56 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x3b) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r2 = socket(0x10, 0x802, 0x0) fstat(r0, &(0x7f0000000540)) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f00000005c0)={0x9, 0x80000000, 0x8, 0x5, 0x3, 0x6, 0x76a0d38f, 0x8, r1}, 0x20) rt_sigpending(&(0x7f00000001c0), 0x8) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x56c9c78bd139a5c5, 0x0) ioctl$RTC_WIE_OFF(r3, 0x7010) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) bind$alg(r2, &(0x7f0000000480)={0x26, 'hash\x00', 0x0, 0x0, 'crct10dif\x00'}, 0x58) getresgid(&(0x7f0000000300), &(0x7f0000000340)=0x0, &(0x7f0000000380)) stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(r4, r5) setsockopt$inet_sctp6_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000000040)={r1, 0x5aea751f, 0x7ff, 0xff, 0x1, 0x7fff}, 0x14) [ 388.793266] device team0 entered promiscuous mode [ 388.798340] device team_slave_0 entered promiscuous mode [ 388.804231] device team_slave_1 entered promiscuous mode 21:18:56 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000001c0)=0xfffffff8) setreuid(r1, 0x0) [ 388.928367] 8021q: adding VLAN 0 to HW filter on device team0 [ 388.971386] device team0 left promiscuous mode [ 388.976204] device team_slave_0 left promiscuous mode [ 388.981752] device team_slave_1 left promiscuous mode [ 389.043495] Unknown ioctl -2122820351 21:18:57 executing program 7: r0 = memfd_create(&(0x7f0000001fc1)='#vmnet1nodevem1\x00', 0x0) r1 = socket$key(0xf, 0x3, 0x2) write(r0, &(0x7f0000002000)='/', 0x1) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f0000000000)=0x8001) sendfile(r1, r1, &(0x7f0000000040), 0x5) 21:18:57 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)=0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000480)='/dev/rfkill\x00', 0x18100, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000004c0)='/dev/input/mouse#\x00', 0x7, 0x101800) ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r2 = syz_open_dev$audion(&(0x7f0000000340)='/dev/audio#\x00', 0xfff, 0x200) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r2, 0x6, 0x1d, &(0x7f0000000380)={0x39, 0xaa, 0x1d, 0x7, 0x8}, 0x14) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r3 = socket(0x10, 0x802, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0xef, 0x80000) fstat(r3, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$netlink_NETLINK_RX_RING(r1, 0x10e, 0x6, &(0x7f0000000600)={0x7, 0x8, 0xbf52, 0xbf5}, 0x10) write$FUSE_ENTRY(r4, &(0x7f0000000540)={0x90, 0x0, 0x5, {0x6, 0x2, 0x18922ec1, 0x4, 0x80000001, 0x1, {0x0, 0x3, 0x8, 0x3f, 0x608c, 0x3, 0x40, 0xffffffff, 0x1000, 0x9bc, 0x2, r0, r5, 0xffffffffffffffff, 0x10001}}}, 0x90) ioctl$BLKSECDISCARD(r4, 0x127d, &(0x7f0000000200)=0x2) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r4, 0xc0145401, &(0x7f0000000700)={0xffffffffffffffff, 0x2, 0x7e4a, 0x2, 0xff000000}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 389.075604] device team0 entered promiscuous mode [ 389.080650] device team_slave_0 entered promiscuous mode [ 389.086476] device team_slave_1 entered promiscuous mode 21:18:57 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) socket$netlink(0x10, 0x3, 0x4) r2 = syz_open_dev$dspn(&(0x7f00000000c0)='/dev/dsp#\x00', 0x3f, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000200)={0x0, @in={{0x2, 0x4e23, @rand_addr=0x5}}, [0x184, 0x100, 0x9, 0x1, 0x7fffffff, 0x0, 0x5, 0x3, 0x3, 0x1, 0x2, 0xffffffff, 0xffffffffffffffff, 0x4, 0x3]}, &(0x7f0000000300)=0x100) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x22, &(0x7f0000000340)={0x7, 0x8000, 0x9, 0x8, r3}, &(0x7f0000000380)=0x10) write(r0, &(0x7f0000000080)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)="6270726f75702e636f6e11b90e1a6c65727300", 0x0, 0x0) ioctl$TUNSETVNETBE(r4, 0x400454de, &(0x7f0000000100)) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) shmctl$SHM_LOCK(0x0, 0xb) setsockopt$inet6_tcp_TCP_ULP(r4, 0x6, 0x1f, &(0x7f00000001c0)='tls\x00', 0x4) [ 389.138985] 8021q: adding VLAN 0 to HW filter on device team0 21:18:57 executing program 5: r0 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x488000, 0x0) openat$cgroup_ro(r0, &(0x7f0000000100)='cgroup.stat\x00', 0x0, 0x0) write$FUSE_DIRENT(r0, &(0x7f00000003c0)={0x180, 0x0, 0x2, [{0x1, 0x3, 0x9, 0x7, '/dev/dsp\x00'}, {0x6, 0xffffffff7fffffff, 0xa, 0xe20, '/dev/nbd#\x00'}, {0x2, 0x7, 0x1c, 0x8, '[mime_typeem1#+@]-ppp0-wlan0'}, {0x2, 0x738, 0x4, 0x3f, 'GPL]'}, {0x0, 0x40, 0xb, 0x9, '/dev/vcsa#\x00'}, {0x2, 0x5401fefa, 0xb, 0x2000000000, '/dev/vcsa#\x00'}, {0x2, 0xfffffffffffffffd, 0xc, 0x100000001, 'cgroup.stat\x00'}, {0x0, 0x7, 0xa, 0x0, '/dev/nbd#\x00'}, {0x2, 0x0, 0xc, 0x2, 'cgroup.stat\x00'}]}, 0x180) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x7ff, 0x1) ioctl$RTC_WIE_OFF(r1, 0x7010) clock_adjtime(0x0, &(0x7f00000002c0)={0xc9e7, 0xfffffffffffffffc}) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00000001c0)=0x3e, 0x4) connect$vsock_dgram(r1, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @host}, 0x10) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x900000, @local, 0xb2a}], 0x1c) r2 = gettid() sched_setattr(r2, &(0x7f0000000180)={0x30, 0x7, 0x0, 0xc7, 0x6, 0x3c, 0x20, 0x1}, 0x0) syz_open_dev$ndb(&(0x7f0000000140)='/dev/nbd#\x00', 0x0, 0x400) [ 389.229417] device team0 left promiscuous mode [ 389.234199] device team_slave_0 left promiscuous mode [ 389.239750] device team_slave_1 left promiscuous mode 21:18:57 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = add_key(&(0x7f0000000240)='cifs.spnego\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000340)="2a176ec37e3ae811b4d54949cb7ea57c3c22808fc0e59026a6fedbce82b016f9ebb616c75886ac53e35986b1022308cb73c23bd02eadd7b22508c4f2a64ec8fb66713d10b327c329894d22f4595d839f9f8a4b59558b6aa3879a36f1d277b5f21f0a4bb2cb880b5f69b297092de4e0cb2b5242cc9401192e01ba0522dc6cfd05bdbb6160ceaea75d685225cdf4db1391497055379a7327f05610cb8eddeedd88f92a3fea7a883c70a9b55f49b99af153eff8ec7c0a3b94edd4945ccef643df46cdc5fff74970116ae902a5718d205d967d741afaec6701ff675e37d1b5d1fccc9502", 0xe2, 0xfffffffffffffffd) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r0) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r1 = syz_open_dev$dspn(&(0x7f0000000440)='/dev/dsp#\x00', 0x7, 0x10100) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r1, 0xc058534b, &(0x7f0000000480)={0x401, 0x8, 0x26b9, 0x100000000, 0xffffffffffffffff, 0x8}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:57 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:57 executing program 4: r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x8287f) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl$sock_bt_hidp_HIDPCONNADD(r0, 0x400448c8, &(0x7f0000000140)={r1, r0, 0x8, 0x7, &(0x7f0000000040)="82b8f8a354fcfb2dbd00112997af12c5acd6b593ab27a6a0337fff37bd99c22ea68a00729ee321fa2fa6d4eefc013a238c6a9cb91007e7a8a0b37383d4978beb678d053d27dd0098af3aa0c92abe5dc3624906d2c499df57a022fa23d7cfc73f7fcb2cead8bdff26fc2d21c15159f4cdb7413734741480f79d5d5dd38df9c0a53497f17e13a912e41a7c393f5af74719f093d479414ec0a644e20eed11bf6cd2dc58edff8d945c3caedb8932f677104b36a185fe010851bce5c78a7cbc5b9dea0580f43cf8870b9b", 0x100000000, 0x6, 0x20, 0x0, 0x400, 0x200, 0x2, "7e9c8390316bb44a5a1056f6"}) ioctl(r1, 0x8912, &(0x7f0000000180)="0a5cc80700315f85715070") close(r0) [ 389.374338] device veth0_to_bridge entered promiscuous mode [ 389.399955] device team0 entered promiscuous mode [ 389.405116] device team_slave_0 entered promiscuous mode [ 389.410946] device team_slave_1 entered promiscuous mode 21:18:57 executing program 7: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000080)="f1397eb033b52a24a9cf3285b617bca3", 0x10) dup3(r1, r0, 0x0) 21:18:57 executing program 5: r0 = perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) exit(0x0) read(r0, &(0x7f0000000040)=""/26, 0x1a) r1 = creat(&(0x7f0000000080)='./file0\x00', 0x2) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f00000000c0)={0x0, 0x1c, [0x8, 0x20, 0x9, 0x100, 0x2, 0x81, 0x6]}) setsockopt$inet_buf(r1, 0x0, 0x39, &(0x7f00000001c0)="98cee588761ebdcedf66d2d6f598d09839ce8936e017c889cfdc958ba5bc28abcf7324666b79b632a5afd61c697382ad077a05a101f0eafc7e512a33c8ee3ee1ba13e168e14415803de9c7e2fff030ceae396026913fc53f382bb001a7ce76056f1a86668ad8ad8aa3c0d94d8d18fe2c2273fb664897379b07093d1fb895148ef218f67c84930f08ea48fcb33d51817eae296b", 0x93) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000000)=0x3) [ 389.504974] 8021q: adding VLAN 0 to HW filter on device team0 [ 389.531447] device team0 entered promiscuous mode [ 389.536603] device team_slave_0 entered promiscuous mode [ 389.542423] device team_slave_1 entered promiscuous mode [ 389.559344] 8021q: adding VLAN 0 to HW filter on device team0 21:18:57 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000040)=""/84, &(0x7f00000001c0)=0x54) r1 = syz_open_dev$usbmon(&(0x7f0000000300)='/dev/usbmon#\x00', 0x2, 0x1) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) ioctl$KDMKTONE(r1, 0x4b30, 0xe) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 389.635220] device team0 left promiscuous mode [ 389.640085] device team_slave_0 left promiscuous mode [ 389.645668] device team_slave_1 left promiscuous mode 21:18:57 executing program 7: r0 = syz_open_dev$mouse(&(0x7f0000000000)='/dev/input/mouse#\x00', 0xc3, 0x100) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f00000000c0)={0xa, &(0x7f0000000040)=[{0x1, 0x3580000000, 0x1, 0x400}, {0x34da, 0xf5, 0x4, 0x3}, {0x8, 0x7443, 0xf3ed, 0x8}, {0x100000001, 0x1, 0x4, 0x7}, {0x6, 0x101, 0x20, 0x5}, {0x1, 0xe1, 0x2, 0x1}, {0x0, 0x1, 0xfff, 0x7}, {0x4, 0x81, 0x6, 0xffffffffffffffff}, {0xfffffffffffffffe, 0x5, 0x1, 0x6aa}, {0x4, 0x4, 0x0, 0x3713}]}, 0x10) getsockname$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x1c) getdents(r0, &(0x7f0000000180)=""/251, 0xfb) ioctl$BLKGETSIZE64(r0, 0x80081272, &(0x7f0000000280)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/sequencer\x00', 0x20001, 0x0) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000300)={0x0, 0x7f8}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000380)={r2}, 0x8) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f00000003c0)) getsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x8, &(0x7f0000000400), &(0x7f0000000440)=0x4) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x18, &(0x7f0000000480)={r2, 0x785}, &(0x7f00000004c0)=0x8) accept4$alg(r0, 0x0, 0x0, 0x80000) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f0000000540)={0x3, &(0x7f0000000500)=[{0x6, 0x1f, 0x9ca, 0x4}, {0x9, 0xb15, 0x5, 0x9}, {0x10001, 0x7f, 0x401, 0xfc91}]}, 0x10) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000005c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000680)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000640)={&(0x7f0000000600)={0x30, r4, 0x20, 0x70bd2b, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x14, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x3ff}]}, 0x30}, 0x1, 0x0, 0x0, 0x20008014}, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000006c0)={0x0, {{0x2, 0x4e23, @multicast1}}, 0x0, 0x4, [{{0x2, 0x4e23, @loopback}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xe}}}, {{0x2, 0x4e21, @loopback}}, {{0x2, 0x4e22, @broadcast}}]}, 0x290) sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f0000000ac0)={&(0x7f0000000980)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000a80)={&(0x7f00000009c0)={0x8c, r4, 0x100, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x100000000}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x7fff}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x2}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x80000001}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'sit0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bond_slave_1\x00'}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x40}, 0x4004) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000b00)={r3, 0x61}, &(0x7f0000000b40)=0x8) getxattr(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000bc0)=@known='system.posix_acl_access\x00', &(0x7f0000000c00)=""/59, 0x3b) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000c40)={r3, 0x7ff, 0x30}, &(0x7f0000000c80)=0xc) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f0000000cc0)) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000d00)=0x1) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000d40)={r5, 0x6}, &(0x7f0000000d80)=0x8) ioctl$SG_GET_REQUEST_TABLE(r1, 0x2286, &(0x7f0000000dc0)) r6 = accept4$alg(r0, 0x0, 0x0, 0x800) ioctl$PIO_FONTRESET(r1, 0x4b6d, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c02, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x4, 0x3, 0x20, 0x1, "4fc47c4110e188640748dc26d957790636f3df9cc91588fec7a8b91821facece466a13bc2c98e9bab0ab84a12c55c44670445c215cd66f01e21ce7ed93f1e210", "0d51cd6620614cd4ca209662766f66d93260577f57120410131390aacf4e71b9", [0x24f7, 0x86]}) ioctl$TUNSETSNDBUF(r6, 0x400454d4, &(0x7f0000001000)=0x4) userfaultfd(0x800) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f0000001040)={r2, 0x38, 0x22, "2b4857fe621435c0a6f8e78151b207f88dc2adfcfb1a195fc3a8f920c467b083f8ac"}, 0x2a) 21:18:57 executing program 7: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000000)=0x3ff, 0x4) mmap(&(0x7f0000000000/0xef9000)=nil, 0xef9000, 0x4, 0x4000000000032, 0xffffffffffffffff, 0x0) getsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000080), &(0x7f00000000c0)=0x4) 21:18:58 executing program 7: mmap(&(0x7f0000000000/0xfda000)=nil, 0xfda000, 0x0, 0x31, 0xffffffffffffffff, 0x0) membarrier(0x40, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x8200, 0x0) ioctl$RTC_WIE_ON(r0, 0x700f) syslog(0x3, &(0x7f0000000000)=""/20, 0x40000014) [ 390.103330] device veth0_to_bridge left promiscuous mode [ 390.109889] device team0 entered promiscuous mode [ 390.115342] device team_slave_0 entered promiscuous mode [ 390.121187] device team_slave_1 entered promiscuous mode 21:18:58 executing program 4: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x2, &(0x7f000039a000)=[{0x20, 0x0, 0x0, 0xfffff014}, {0x6}]}, 0x10) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000000)={r0}) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f0000000040)='tls\x00', 0x4) r2 = socket$inet_tcp(0x2, 0x1, 0x0) sendmmsg(r2, &(0x7f0000001ec0)=[{{0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f00000000c0)="f5721a97626deb3541d4ff0f54e6ea6a07708d55a7c83ecf9ad16553450fe0f83ad3aae988880955a874be133a0526904dc5dd07c942fc3ea6c48098342594af004f600766bc4595cb3a7306118d494a60d26d9f3fac1b5afccd67513511a2b925ba1b097d24a4ff807fb7eeebdeb6149f76458368ff9a3544557b15e6c2cc4f1ce7078c7462d38f6a3b4366bf9e3364bc0ee86ac6d04a72dbd76b7d10e4fb6ca3dfaf4790100c9b3e8f62e0f93ab5ea24f03099284a0ab57baacabddadd4ba776171609aa739e9fb12e0aa119305043681b645ab4271622e36a93f3a6ffeacfa75a32023a4928", 0xe7}, {&(0x7f00000001c0)="7731b7fb72c47dec40ef10fcc17fc4fde632b75b91767fbd9bf9204a4a6fb5eddd804a2c23803cc399b1aa494d73b637c79cbab7534f5ad3b04a83ad7e5d075152c909a7410b0eb63ae4d480379bcf027f2951bf61acc7c3cdc415c563042be431c5f23718468edea7244e0468f6682135d72d171875f2ea1445f173d63806c28ad3a57813123b69605ae5343c816862c9858ab284bd0eb4c271685b38c6d9b5108265eea3c1f24b4909c8ddce56a047ac7378dbd41e2a02196cbbf7c091efa673c8e991baf7df861f19eea18757258bd164dc2248fb5c2f07ff1eabe7b6dc91d397ca4a6e3a875552a048ff2284", 0xee}, {&(0x7f00000002c0)="52b308a222810d292fa5e11610c50028635fd0ec2d0b86fffd937a7f530f48ca153686af80a1a5c7086502c2c791b3c6c182217e69fb470675c19fc957c90b397d0eecfe777d9093ba929d635a795d52ed87df9e9b9fa5d98b607e89736db2903571b941c59b9eda74b907e0400bdec5a71a4d1505ddd79abfbcb2dd69a848cde48af23ba0ff3c00f93f86bbf09d373c21452c1401837c637869edb9b2a5d2d728dd18b4590c4d0e1349e36d3e9229dc20dcc08fd9150bd392c93aab57776d9e35a8b78a8353c242ab506f85236322dbbab3840625", 0xd5}, {&(0x7f00000003c0)="fc70b8ac68131a8ebd0ec4fefb33731c99a22997124687d8a443bf50bad95c9bd2748a681d451cfa320de97d8d16be566f5dde15aad2b2ef2519b972a7d5873e1b119a6cb16182a1d893e16fb5e79aae65ae44248b8cef4ed82cf530c0656bc696f8a28d4dcc7d0c5d917e5dffc911715f1c7e6b1367f67a39441f271d4fbb", 0x7f}, {&(0x7f0000000440)="f81446c5797c5dc8e6e02edf896a47000c8d9bc8b14f5c29c2ec6d2c054388deca84b6c9600409c4f75e75df8c849b7294df07fd4c1f96254e2eb615bbddc3d5b1a489d42fa7d5fed8dbfc7f635c562daefb166b17b9f724a131845abf67c387f2e8ca1a080e95a806729c223ba1d8d897a78e9daf825c9e6328dfcfd111326a67fa55d77b8b8557b3e8ca9d7b17099342622c82a019dd1891b33d120e6edc7df4875ed494aeeaa12acd72d5", 0xac}, {&(0x7f0000000500)="105d44dde5a0e41fd20bb472d8214e090aa07825bce40173f99c98919546c600895788cd922c43512915a07d7229acc621ce7f9de6ace3b17a203c091878bcc19bcd95164d7403a90fe0f45cc9cc395167c400657d8e9851cccdec4dc1499f5ce41552d92b578a79a5c027b6cd5ceb0f6a4494860deed7fa1a7160489ceecdaa0a9143cc477d5a13cbca4719dddedbd38a103334a95ec6575814333a2c2d934c717d684e07e34e8df9c286b87a971f0935e28d2c858ad9c94a2d965a734af65e423741fac90a26e6d33cc35488a100133c97954a85f746f74f4028556480cf0d112caaedb64574", 0xe7}, {&(0x7f0000000600)="a69cdffccc20f87a81fd2f1cde2872f105f5aa68961e5b7cf0c6d7f59c66bd8b0a7eeb5d4bea83baa3277e883d1851bd07b36cfc5b74114cb6f0e7abe048234fb44f1d98ba6545fcfa0f3435a547d20f37d99f79a59cc960c4f716b02c34bb56bee08dc3f1d457941058fe349391fedb1cca72e9e08b90c0c4a2160f50408777e5865ff497d0dd78f5afbe8b8dd92c5239a1966bb4f79a751989b81199dd26d347679009015994410233d11914fb67715c49a418a7ef4c33a78f9f47105540919c335a587ce979f9", 0xc8}, {&(0x7f0000000700)="ae138060ab56dfa3b5980302660a416f28f537da35f30c190386788d7e3c0cbcf7c3290f2fabcb9b383414269b86d0779c47d116dd1c9d6edf6b205e92e3c3d033c1e6ec4ab2a182995e60287726297d139b3397209692367a0428fee1e36fd890f2fdaafc66927d1a0d99edc25b524bb61c38c074ef2130923cce6ca67bb3b146bf276bce7b029d19ba14d26ed93f5c3cb7", 0x92}], 0x8, &(0x7f0000000840)=[{0xa0, 0x11f, 0xcb9, "52623bd8e5b5d8ed3e9f18b36309908ea29337e9953038ea5ffa11c43a2310771ca6ba975a3401c341eacfdf0241f2b614bf187b1868f4b76f65f54b584610507f08c5c3f562d61881461dbd0a4766b8137051f85710330c0d2de062210e7deaf5a4f7d8cd8e4b42be059efa056c7d96701183136dab9fc87c17cd32f5a75355b6f15423981080d903751d"}, {0xf8, 0x10b, 0x8, "b1acb90420fb0e296ff14fd89a0dff6dcf104b12d8161074e60c3959fc317d6a5d59b355039e74fce24d2dedaac5fb8641192469a19b19e47e3829e605bc0eac295af09cd0ad632f10b4187694130bdc7ed226a0678c34da347518e299e6db0c4df0d66f781ae048b129e04b53aed0e3916a0d2c41f251026729db6ce99e4cbe9389dc57767bb769716bbdfc8bfe0749354c2120953f433514ef732d10d70b0094544436f8e731a1ef3a1b912fb95ce2dcdc600b679c99b0a217269d1470dd1d5705bad54c14d81c982711d8a1f3fbe2b81bb3491c5e6e67da0795ddde8c75d450c33e09cd4bdfcb"}, {0xf0, 0x11f, 0xdd, "16f5f3053c0ee35eb74be8649a4352f3187084ae374497fc1f075c1b583c594c31504fba0c25aa3016f6786638a2fa255977bbcac6afeef20034e4759fc8dc4b3b79aaf0ef67307422537ac34ed61b2ccbaa488f49d4621b1ae2a932f9d28ce4a2c4404cad22f7e2b5719ec042a359624e797e8dd5f7b241fa0e5232766eea0aabb200df44605b507bacb2c600439e1f3e9d4d69f9a6f67a828b0f19e5d49374ae3b2b59929c4f385a6aaec5e9fd67dfbcab11b0168c8de824a97ad9d3b181edcea7558b90253343b7cdd6283028b5f6ac77b70d23a278ff4f49"}, {0x50, 0x104, 0x5, "2629b5b46bd9dd9112f10513442d22a88bea7fb1839823cf09528680f49c2be20d3ff522d41ba021867d3da4bdcf624e39158d8eec247a414b3bb2c4"}, {0x28, 0x10f, 0x4, "5e6d4e6549862c94725d38f61a4f27efc307b17b6000c454"}], 0x300, 0x20000040}, 0x4}, {{&(0x7f0000000b40)=@nl=@unspec, 0x80, &(0x7f0000000e00)=[{&(0x7f0000000bc0)="5143441d22c946eb8a4427d9914a078542822d4c7a2a029456ecfdf288f2cc34319c86bd04e12240ae0b547b7072c25f8ac72ff4e3bf656cabe6cc71887fa8944d0c310a204b02eecbeb6ae53938231b8692e0acb3882fb46a0a82a541d7dd4be0720931624436e981eb8a65f313", 0x6e}, {&(0x7f0000000c40)="86c9f92673c331f76aaf422a9bce17587f6cdc79e1139a5e40365d69a847aedee0e9908c174c0edc4bb08768742cce38a7e32541b2732312dd34119a5387633697ff178f888f99b7244e887f67253d1a1c28d125db30fd7dfde788a540567f04655fb2a1ffc942d2460511ffd9702e6ea2deed924a0430d079219881a7f4946e7af216d5a6c4fc408745bb48abe08fa0bc355b5f4408949c27c56c415cea0c73aa6027a3d46eb2ab86cd961bf201cfb6bd87192a6c82861eec92454924d84187415747b7d4fa59887950067ad4e72e8c263ab521f417a3da0b74c317ac012a", 0xdf}, {&(0x7f0000000d40)="b53ca62d74c5c53ca10797b0e480b2655af5fbc6963262ae3c97664705172af90369ebe6d4e2f62b2445ecb36d9125b57e7b3a208116646dd8994dd54dcff69cdfc72cf48ec5615f83d47ca8459517d886e00a0ea25c28c22043fb17b05728cb44335e9b1d22e8fcdb9cf157ff99134d238cffb43209728bd6cf764e0e7bc9aa425c14", 0x83}], 0x3, &(0x7f0000000e40)=[{0x18, 0x10d, 0x990, "d8b2f0488c160239"}, {0x1010, 0x100, 0xffffffffffffffc1, "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"}, {0x30, 0x11f, 0xfffffffffffffffb, "79ea49e8e11fbbdca9dd962777b924ca3be075cc744f97c1f8a6fa539bad4cbd"}, {0x20, 0xff, 0x3, "4b77f268c8d5c619cdc2414b85"}], 0x1078, 0x40000}, 0x36}], 0x2, 0x8000) 21:18:58 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f00000000c0)=0x1) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f0000000100)) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000001c0)={0x3, 0x3, 0x57d}) r3 = socket$netlink(0x10, 0x3, 0x4) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000200)) write(r3, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) [ 390.218550] 8021q: adding VLAN 0 to HW filter on device team0 21:18:58 executing program 7: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x500, 0x0) getdents64(r2, &(0x7f00000001c0)=""/251, 0xfb) [ 390.268158] device team0 left promiscuous mode [ 390.273100] device team_slave_0 left promiscuous mode [ 390.278698] device team_slave_1 left promiscuous mode 21:18:58 executing program 5: r0 = memfd_create(&(0x7f0000001fc1)='#vmnet1nodevem1\x00', 0x0) write(r0, &(0x7f0000000180)="8d70eef5f79d042dc42ce3095090753e83a2e6592f256a22ee558a62f8f28db781b36c0f94ae64f39ddd7213d9a16b430d31dea9", 0x34) stat(&(0x7f0000000040)='./file0\x00', &(0x7f00000002c0)) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = fcntl$getown(r0, 0x9) kcmp(r1, r2, 0x0, r0, r0) [ 390.782316] device team0 entered promiscuous mode [ 390.787355] device team_slave_0 entered promiscuous mode [ 390.793229] device team_slave_1 entered promiscuous mode [ 390.801743] 8021q: adding VLAN 0 to HW filter on device team0 [ 390.810563] device team0 left promiscuous mode [ 390.815424] device team_slave_0 left promiscuous mode [ 390.821052] device team_slave_1 left promiscuous mode 21:18:58 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) socketpair$inet6_tcp(0xa, 0x1, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000280)="cfbfd7818e04610aac4d91c070edd4e2", 0x10) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r1 = syz_open_dev$vcsa(&(0x7f00000001c0)='/dev/vcsa#\x00', 0xef8f, 0xa4000) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x0) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:58 executing program 4: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@loopback, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@remote}}, &(0x7f0000000100)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6}}, &(0x7f0000000140)=0xe8) setreuid(r0, r1) socketpair$inet6_icmp_raw(0xa, 0x3, 0x3a, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP6T_SO_GET_INFO(r3, 0x29, 0x40, &(0x7f0000000380)={'nat\x00'}, &(0x7f0000000400)=0x54) open(&(0x7f0000000300)='./file0\x00', 0x100, 0x1) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000180)={{0x2, 0x0, @multicast2}, {0x0, @dev}, 0x0, {0x2, 0x0, @remote}, 'vcan0\x00'}) setsockopt$inet6_icmp_ICMP_FILTER(r2, 0x1, 0x1, &(0x7f0000000440)={0x7}, 0x4) [ 390.846545] device team0 entered promiscuous mode [ 390.851686] device team_slave_0 entered promiscuous mode [ 390.857465] device team_slave_1 entered promiscuous mode [ 390.920950] 8021q: adding VLAN 0 to HW filter on device team0 [ 390.951538] device team0 left promiscuous mode [ 390.956326] device team_slave_0 left promiscuous mode [ 390.961883] device team_slave_1 left promiscuous mode [ 391.198626] device team0 entered promiscuous mode [ 391.203696] device team_slave_0 entered promiscuous mode [ 391.209490] device team_slave_1 entered promiscuous mode [ 391.218774] 8021q: adding VLAN 0 to HW filter on device team0 [ 391.228093] device veth0_to_bridge entered promiscuous mode [ 391.236568] device team0 left promiscuous mode [ 391.241307] device team_slave_0 left promiscuous mode 21:18:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0), &(0x7f0000000200)=0xc) r1 = socket(0x10, 0xa, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:18:59 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x5, 0x32, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0x0, 0x0) ioctl$VT_WAITACTIVE(r1, 0x5607) r2 = syz_open_dev$admmidi(&(0x7f00000000c0)='/dev/admmidi#\x00', 0xfffffffffffffff7, 0x8400) ioctl$SG_EMULATED_HOST(r2, 0x2203, &(0x7f0000000100)) r3 = userfaultfd(0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000340)={0x0, 0x1}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r0, 0x84, 0x79, &(0x7f00000003c0)={r4, 0x7, 0xffffffff}, 0x8) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$binfmt_elf64(r3, &(0x7f0000000180)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x6, 0x62, 0x100000001, 0xfffffffffffff4fd, 0x3, 0x3f, 0x3, 0x27e, 0x40, 0x232, 0x71, 0x1, 0x38, 0x2, 0x7f, 0x1, 0x3}, [{0x7, 0xfffffffffffffffb, 0x6, 0xffffffff, 0x4, 0x7, 0x8000, 0x1}], "d444481bfa9bd8ec82c874cd3b42e827275fc6745415a9e354416cbc51", [[]]}, 0x195) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r5, 0x84, 0x8, &(0x7f0000013e95), 0x4) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="1d"]}) ioctl$void(r5, 0x5451) bpf$MAP_CREATE(0x0, &(0x7f0000346fd4)={0x0, 0x0, 0x0, 0x8dd}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000ba000)={0x1, 0x5, &(0x7f0000346fc8)=@framed={{}, [@alu={0x8000000201a7f19, 0x0, 0x201a7fa6, 0x0, 0x1}]}, &(0x7f0000000000)='GPL\x00', 0x1, 0xfb, &(0x7f00001a7f05)=""/251}, 0x48) close(r5) close(r3) [ 391.246824] device team_slave_1 left promiscuous mode [ 391.256149] device team0 entered promiscuous mode [ 391.261249] device team_slave_0 entered promiscuous mode [ 391.267065] device team_slave_1 entered promiscuous mode [ 391.278105] 8021q: adding VLAN 0 to HW filter on device team0 [ 391.315651] device team0 left promiscuous mode [ 391.320990] device team_slave_0 left promiscuous mode [ 391.328518] device team_slave_1 left promiscuous mode 21:18:59 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) fsetxattr(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="f3ce2361ee21"], &(0x7f0000000580)="ed195ab5ee5a99917c06211cdb25a10d8adb327247ca3ba1353b1683dc338689c1e0c60e320f3cf8400cfe210e8191b5429ff522741d30e65425bcb69a6867e1299bf45102e6987fc5e86383f89106348b9ff2379e0794e42c73b40b45", 0x5d, 0x1) r3 = socket(0x10, 0x802, 0x0) r4 = request_key(&(0x7f00000001c0)='.dead\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000240)='posix_acl_accesslo\x00', 0xffffffffffffffff) keyctl$negate(0xd, r1, 0x6, r4) r5 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vsock\x00', 0x20000, 0x0) ioctl$SG_SET_RESERVED_SIZE(r5, 0x2275, &(0x7f0000000340)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) getsockopt$inet_dccp_int(r2, 0x21, 0x0, &(0x7f0000000400), &(0x7f0000000440)=0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$packet_int(r5, 0x107, 0xa, &(0x7f0000000380), &(0x7f00000003c0)=0x4) ioctl$sock_SIOCOUTQNSD(r3, 0x894b, &(0x7f0000000280)) 21:18:59 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:18:59 executing program 1: sched_setattr(0x0, &(0x7f0000000000)={0x2000000000}, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 391.573772] Unknown ioctl 8821 [ 392.008881] device team0 entered promiscuous mode [ 392.014227] device team_slave_0 entered promiscuous mode [ 392.020070] device team_slave_1 entered promiscuous mode [ 392.028173] 8021q: adding VLAN 0 to HW filter on device team0 [ 392.038232] device veth0_to_bridge left promiscuous mode [ 392.046604] device team0 left promiscuous mode [ 392.051489] device team_slave_0 left promiscuous mode 21:19:00 executing program 7: r0 = socket(0x80000000000010, 0x802, 0x0) r1 = socket(0x1, 0x7, 0x3) write(r0, &(0x7f00000001c0)="240000001a0025f00410a13cbf31404f040b49ff00000000800000000800040001000000", 0x24) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000002c40)={{{@in6=@mcast2, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in6=@dev}}, &(0x7f0000002d40)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0x7) sched_getscheduler(r3) bind(r0, &(0x7f0000000000)=@hci={0x1f, r2}, 0x80) [ 392.057148] device team_slave_1 left promiscuous mode [ 392.076289] device team0 left promiscuous mode [ 392.081084] device team_slave_0 left promiscuous mode [ 392.086641] device team_slave_1 left promiscuous mode 21:19:00 executing program 0: r0 = socket$packet(0x11, 0x102, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000000040)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$userio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/userio\x00', 0x450080, 0x0) r4 = openat$cgroup_ro(r3, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:00 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r2, 0x227b, &(0x7f00000000c0)=0x1) ioctl$SNDRV_RAWMIDI_IOCTL_PVERSION(r2, 0x80045700, &(0x7f0000000100)) ioctl$KDGKBENT(r2, 0x4b46, &(0x7f00000001c0)={0x3, 0x3, 0x57d}) r3 = socket$netlink(0x10, 0x3, 0x4) ioctl$sock_SIOCOUTQ(r2, 0x5411, &(0x7f0000000200)) write(r3, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:00 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) fcntl$notify(r0, 0x402, 0x10) getpeername$packet(r0, &(0x7f0000000080)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', r1}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @local}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x4) lseek(r0, 0x0, 0x0) semget$private(0x0, 0x3, 0x204) write(r3, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) [ 392.327774] Unknown ioctl 8821 [ 392.520712] device team0 entered promiscuous mode [ 392.525894] device team_slave_0 entered promiscuous mode [ 392.531660] device team_slave_1 entered promiscuous mode [ 392.539112] 8021q: adding VLAN 0 to HW filter on device team0 [ 392.546534] device team0 entered promiscuous mode [ 392.551545] device team_slave_0 entered promiscuous mode [ 392.557342] device team_slave_1 entered promiscuous mode [ 392.565338] 8021q: adding VLAN 0 to HW filter on device team0 [ 392.574642] device team0 left promiscuous mode [ 392.579394] device team_slave_0 left promiscuous mode [ 392.585138] device team_slave_1 left promiscuous mode 21:19:00 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 392.823552] device team0 entered promiscuous mode [ 392.828750] device team_slave_0 entered promiscuous mode [ 392.834506] device team_slave_1 entered promiscuous mode [ 392.842168] 8021q: adding VLAN 0 to HW filter on device team0 [ 392.857557] device team0 left promiscuous mode [ 392.862387] device team_slave_0 left promiscuous mode [ 392.867946] device team_slave_1 left promiscuous mode 21:19:00 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000200)='/dev/audio#\x00', 0x0, 0x40040) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xd, &(0x7f0000000240)=@assoc_id=0x0, &(0x7f0000000280)=0x4) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000340)={r1, 0x264, 0x1ff, 0x40}, 0x10) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) setsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r2, 0x84, 0xc, &(0x7f00000001c0)=0x7, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 392.891149] device team0 left promiscuous mode [ 392.895877] device team_slave_0 left promiscuous mode [ 392.901417] device team_slave_1 left promiscuous mode 21:19:00 executing program 5: r0 = fcntl$getown(0xffffffffffffffff, 0x9) r1 = syz_open_procfs(r0, &(0x7f0000000040)='io\x00') writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="b3", 0xff73}], 0x1) 21:19:00 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) pipe2(&(0x7f0000000040), 0x80800) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:01 executing program 5: socket(0x5, 0x2, 0x8) r0 = socket$inet(0x2, 0x3, 0x5) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)={'team0\x00', 0x0}) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000080)={r1, @multicast2, @multicast1}, 0xc) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) getpgrp(r2) socketpair$packet(0x11, 0x0, 0x300, &(0x7f0000000100)) r3 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0x0, 0x2200) getsockopt$inet_int(r3, 0x0, 0x1f, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_emit_ethernet(0x2a, &(0x7f00000000c0)=ANY=[@ANYBLOB="ff1effffffffaaaaaaaaaa0008004500001c0000000000019078ac14ffaaffffffff0000000000089078"], 0x0) 21:19:01 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x1, 0x0) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x400, 0x3235, 0xb0, 0x7, 0x6b, 0x1, 0xfc50, 0x521, 0x3, 0x1, 0x8000, 0x880}) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f00000000c0)=0x100000001, 0x1d4) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mount$fuseblk(&(0x7f0000000140)='/dev/loop0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)='fuseblk\x00', 0x20, &(0x7f0000000540)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r1, @ANYBLOB="2c726f6f746d6f64653d303030303030302c759490645e7365725f69643d00000000000000000000000000000000814764a56926c215bc6f2ba27e5f8c31", @ANYRESDEC=r2, @ANYBLOB=',group_id=', @ANYRESDEC=r3, @ANYBLOB=',default_permissions,default_permissions,\x00']) close(r0) ioctl$sock_kcm_SIOCKCMUNATTACH(r1, 0x89e1, &(0x7f0000000440)={r0}) connect$inet6(r0, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000280)='tls\x00', 0x4) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f0000000100), 0x28) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r1, 0x84, 0x21, &(0x7f0000000500)=0x3, 0x4) setsockopt(r0, 0x100000001, 0x7, &(0x7f0000000180)="bee685d8554562cb0be61bab8587352a39a99ac11210f54eeef0ac96bf264668c008e472a3fc0d11bb09b2b9d9c580c4dda70b71ccfda08852f3b40f1329933e374c624d44dd9efb5456a53f3a911224955caaabf46b278f8c80efd450f3eb20b24e196668ab992abee073192e35937b44523d95d3b71612407633e92044cd48ef3e8b2f734f407c336c4f51489cefff03a058303ba496672106ddbaec8511f107cfa0668215bd3a75e3cb42bb07f9348b76308da3fe6aad9ff35af46b5e", 0xbe) [ 393.357886] device veth0_to_bridge entered promiscuous mode [ 393.364401] device veth0_to_bridge entered promiscuous mode [ 393.371867] device veth0_to_bridge left promiscuous mode [ 393.383736] device team0 entered promiscuous mode [ 393.388769] device team_slave_0 entered promiscuous mode [ 393.394579] device team_slave_1 entered promiscuous mode [ 393.405684] 8021q: adding VLAN 0 to HW filter on device team0 [ 393.415541] device veth0_to_bridge left promiscuous mode [ 393.425572] device team0 left promiscuous mode [ 393.430580] device team_slave_0 left promiscuous mode [ 393.437681] device team_slave_1 left promiscuous mode [ 393.469753] Unknown ioctl 21507 21:19:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/amemthresh\x00', 0x2, 0x0) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000000340)={0x7, 0x4}) r1 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0xfa, 0x50000) getsockopt$IPT_SO_GET_REVISION_TARGET(r1, 0x0, 0x43, &(0x7f0000000200)={'ah\x00'}, &(0x7f0000000240)=0x1e) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) keyctl$set_reqkey_keyring(0xe, 0x7) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) open(&(0x7f0000000380)='./file0\x00', 0x400, 0x5) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 393.508106] Unknown ioctl 35297 21:19:01 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0xffffffffffff7567, &(0x7f0000000000)="1e01c03d4ba7f55e69a1e0f545027f73") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vcs\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x9, 0x7, 0xfff, 0x3f, 0x3, 0x100000000, 0x80, {0x0, @in={{0x2, 0x4e22, @local}}, 0x2c5, 0x80000001, 0x9, 0x4, 0xfff}}, &(0x7f0000000140)=0xb0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000180)={r2, 0xfde}, &(0x7f0000000200)=0x8) listen(r0, 0x180000000) readv(r1, &(0x7f0000000640)=[{&(0x7f00000001c0)=""/26, 0x1a}, {&(0x7f00000002c0)=""/138, 0x8a}], 0x2) [ 393.539831] Unknown ioctl 21507 21:19:01 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$sock_buf(r0, 0x1, 0x28, &(0x7f0000000080)=""/75, &(0x7f0000000000)=0x4b) r1 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0xffffffff, 0x101000) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x117, 0x1007}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r1, &(0x7f0000000180)={0x8, 0x120, 0xfa00, {0x4, {0x3, 0x4, "f13255f15443e1f592e31ffb183cc02647a80f1eea32556d66ba38a09991f3e2a5ecbaa69cd8e6304bc38b40b914238964010b7ed47c14f806fc324f254c0f139ec235d5d39fe034cf8e14e0bb2d9a90172d297cf7df4508c41e98ee9bc2039c14d91dd64e803efd6344f2b5bbd2eb9244ee8ffc73a86073e10526e01bf781ab4618a9afada6be6f5b78902e3dc8f77b49d586c350f6cd388c0cc7d54df25f9cde009994f011feba30582d9b81a20a1fefc32912b901f07625a7ffb4fefaf39031a64228bda6d34cb717b03aefe4c7ae067c318f3df8bab3c2648c11c2c8635892a33393112588732f8f86ea776f0bc21c9af3d8fcdb85bb58a1cca66a22cd2a", 0x66, 0x8, 0x0, 0x1, 0x7, 0x7, 0x800, 0x1}, r2}}, 0x128) [ 393.578189] Unknown ioctl 35297 21:19:01 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000000008912, &(0x7f0000000080)="0a5cc80700315f85715070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$intptr(0x2c, 0x0) 21:19:01 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000040)="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") r1 = memfd_create(&(0x7f00000000c0)="00000400000000", 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) ioctl$SG_GET_NUM_WAITING(r0, 0x40086604, &(0x7f0000000000)) fcntl$setstatus(r0, 0x4, 0x40800) setsockopt$XDP_TX_RING(r1, 0x11b, 0x3, &(0x7f0000000200)=0x80, 0x4) mmap$xdp(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x0, 0x8010, r1, 0x180000000) r2 = fcntl$getown(r0, 0x9) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000240)=0x0) kcmp(r2, r3, 0x2, r0, r1) 21:19:01 executing program 4: r0 = socket(0x10, 0x1, 0xa) ioctl$int_in(0xffffffffffffffff, 0x5452, &(0x7f0000000040)) r1 = fcntl$getown(r0, 0x9) r2 = syz_open_procfs(r1, &(0x7f0000000180)="2f657865000000d400040c004bddd9de91be10eebf00f5e94aae22e89bb36cc7457accc3320c67a90f79805843e901d2da75af1f0000000000000000b66bb7a96d8d6c24921a5c957a2fae722ccc48ce41c0274d85db3746a844b7bd6b3d4d71c1a0127012b8819a940ed67505e899b2734bb8f0bdda4699586b21d4d69d2b8f5d359bc8f69ca90a35d2767c7b88f70fa88d320a10df36abe24f4d3231ff539bb247986ee57dd557b1ac6612c1123e9c69bc964c670d") sendfile(r0, r2, &(0x7f0000000000), 0x80000002) 21:19:01 executing program 7: r0 = memfd_create(&(0x7f00003ce000)='}\x00', 0x0) shmget(0x0, 0x1000, 0x40, &(0x7f0000525000/0x1000)=nil) r1 = socket$inet6(0xa, 0x5000000000006, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") ftruncate(r0, 0x8) mmap(&(0x7f000070d000/0x2000)=nil, 0x2000, 0x9, 0xc013, r0, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4, 0x2012, r0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x7f, 0x4) set_robust_list(&(0x7f0000000240)={0x0, 0x6, &(0x7f0000000200)={&(0x7f00000001c0)}}, 0x18) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r0, 0xc10c5541, &(0x7f0000000040)={0x103, 0x9, 0x0, 0x0, 0x0, [], [], [], 0x10000, 0x1}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) socketpair(0x9, 0x0, 0x0, &(0x7f0000000180)) ioctl$SNDRV_CTL_IOCTL_POWER_STATE(r0, 0x800455d1, &(0x7f00000002c0)) 21:19:02 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00004c0000)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) listen(r0, 0x4000000043) r1 = socket$inet6_sctp(0xa, 0x4000000000000001, 0x84) sendto$inet6(r1, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) shutdown(r1, 0x2) shutdown(r1, 0xffffffffffffffff) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in6, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x98) [ 394.337604] device team0 entered promiscuous mode [ 394.342765] device team_slave_0 entered promiscuous mode [ 394.348680] device team_slave_1 entered promiscuous mode [ 394.362713] 8021q: adding VLAN 0 to HW filter on device team0 [ 394.372299] device veth0_to_bridge entered promiscuous mode [ 394.382542] device team0 entered promiscuous mode 21:19:02 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0x8, 0x10000) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000840)={0x3, 0xffffffffffffff9c}) mkdir(&(0x7f0000000240)='./file0\x00', 0x1) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000380)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, 0x80, &(0x7f0000002880)=[{&(0x7f0000000680)="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", 0x1aa}], 0x1, &(0x7f0000002900)}, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000900)={0xff, 0xfffffffffffffff8, 0x0, 0x401, 0x3ff, 0x6, 0x6, 0x10001, 0x7fff, 0x2, 0x3f, 0x97}) mount(&(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000200)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000100)=0x3) getsockopt$inet6_dccp_int(r0, 0x21, 0x3, &(0x7f0000000980), &(0x7f00000009c0)=0x4) openat$random(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/urandom\x00', 0x101002, 0x0) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000000)={0x0, 0x0, 0x8000}) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10000, 0x100) syz_open_pts(0xffffffffffffffff, 0x0) r3 = dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f0000000880)=0x0) ptrace$setsig(0x4203, r4, 0x9, &(0x7f0000000940)={0x2b, 0x5, 0xfffffffffffffff8, 0x2}) mkdir(&(0x7f0000000a00)='./file0\x00', 0x80) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f0000000140)) sendmsg(0xffffffffffffffff, &(0x7f0000001640)={0x0, 0x0, &(0x7f0000001540)=[{&(0x7f00000002c0)="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", 0x48a}], 0x1, &(0x7f0000001580)}, 0x0) openat$cgroup_subtree(r3, &(0x7f0000000a40)='cgroup.subtree_control\x00', 0x2, 0x0) mount(&(0x7f0000000280)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='securityfs\x00', 0x100021, &(0x7f0000000480)) syz_open_pts(r3, 0x400) [ 394.387656] device team_slave_0 entered promiscuous mode [ 394.393435] device team_slave_1 entered promiscuous mode [ 394.430224] 8021q: adding VLAN 0 to HW filter on device team0 [ 394.460200] device team0 left promiscuous mode [ 394.465118] device team_slave_0 left promiscuous mode [ 394.470668] device team_slave_1 left promiscuous mode [ 394.508947] proc: unrecognized mount option "¬LDʺÇz×aî €Qî›)c@Øê{ó£î Áe©ÇÁ ܼ”è>?K‘|ãØdÄ1”û8<³Êê2b&çE‚Ñ*"4ü€HÁû•Ö‰aÀtx[ž¾ØýžD‰fC šméÚ¥”Ðl0¢”Ÿ±Ù!í‹5«#JŒäèX~= [†ßt6nâ”"IúœåØ[r•‘ßÌx§!Œ y'¬§ê%"&²Ï„ px•ˆrÙX Ä2oëS¥lNi)B;á‘[D†v[_–uç©'0ýedLFÉV‰w̪Ó¾F4¹kùµÏÕ'É]Ò Œ¥*DQ [ 394.508947] l&It¸?/’GjJÍ–…ãÖxQÇÕcWŽëZØèí:ºHµÍœgÖLÎúMÍŠÙ—ËtL¡ŠÖåg–4„¿0\»ï4ìã±nZOLÉ2œ7ûìKùp úž–‰êæÆ fZU& [ 394.741409] device team0 entered promiscuous mode [ 394.746381] device team_slave_0 entered promiscuous mode [ 394.752245] device team_slave_1 entered promiscuous mode [ 394.760246] 8021q: adding VLAN 0 to HW filter on device team0 [ 394.768696] device team0 left promiscuous mode [ 394.773516] device team_slave_0 left promiscuous mode [ 394.779044] device team_slave_1 left promiscuous mode [ 394.963893] device team0 left promiscuous mode [ 394.968639] device team_slave_0 left promiscuous mode [ 394.974267] device team_slave_1 left promiscuous mode [ 394.983302] device team0 entered promiscuous mode [ 394.988538] device team_slave_0 entered promiscuous mode [ 394.994338] device team_slave_1 entered promiscuous mode [ 395.002289] 8021q: adding VLAN 0 to HW filter on device team0 [ 395.010901] device team0 entered promiscuous mode [ 395.016078] device team_slave_0 entered promiscuous mode [ 395.021888] device team_slave_1 entered promiscuous mode [ 395.032630] 8021q: adding VLAN 0 to HW filter on device team0 [ 395.046716] device veth0_to_bridge left promiscuous mode [ 395.054469] device team0 left promiscuous mode [ 395.059286] device team_slave_0 left promiscuous mode [ 395.064882] device team_slave_1 left promiscuous mode 21:19:03 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) syz_open_dev$amidi(&(0x7f00000003c0)='/dev/amidi#\x00', 0x9, 0x0) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='cgroup.controllers\x00', 0xffffffffffffff9c}, 0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000340)={0x0, 0x10000, 0x1, [0x8c6, 0x7, 0x2, 0x8, 0xffff, 0x1, 0x200, 0x3]}, &(0x7f0000000380)=0x18) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000001c0)={r4, 0xf6, "3142d8a353879e60c1822150182d2e498d9b5c5519712160454ed9efa5fbd641600a3a4be5fceb6f03d959e499142218611e0b9019d2425640140bcf167d404aa1132d1310f21cb93fc5972477152304817832e1ecba16a91b3e5c39152d4b684c5442c6d2afb7ec66a95456b9e98a4319da19dc10538915242755490d34ef779af6d2a3818f7a488f86a0026cd14abef88250dc7f0d9d084d25221afa354383afcf075cf2a61c96b7395b8ef64817709c6efe621fc2a2aaada913222584b9ada96af231e2a4582f8bda05a4ffc1d801fbb1eefda119abbc91eeaa3f75f0438385654f8471c5558c1203ce3b867f8def33e9e494205a"}, &(0x7f0000000100)=0xfe) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r3, 0x84, 0x66, &(0x7f00000002c0)={r5, 0x1}, &(0x7f0000000300)=0x8) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$sock_FIOGETOWN(r3, 0x8903, &(0x7f0000000400)) ioctl$KDGKBSENT(r6, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:19:03 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000240), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") ioctl$FICLONE(r0, 0x40049409, r0) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) utime(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x3, 0x436}) 21:19:03 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x0, 0x80009, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 395.248684] proc: unrecognized mount option "¬LDʺÇz×aî €Qî›)c@Øê{ó£î Áe©ÇÁ ܼ”è>?K‘|ãØdÄ1”û8<³Êê2b&çE‚Ñ*"4ü€HÁû•Ö‰aÀtx[ž¾ØýžD‰fC šméÚ¥”Ðl0¢”Ÿ±Ù!í‹5«#JŒäèX~= [†ßt6nâ”"IúœåØ[r•‘ßÌx§!Œ y'¬§ê%"&²Ï„ px•ˆrÙX Ä2oëS¥lNi)B;á‘[D†v[_–uç©'0ýedLFÉV‰w̪Ó¾F4¹kùµÏÕ'É]Ò Œ¥*DQ [ 395.248684] l&It¸?/’GjJÍ–…ãÖxQÇÕcWŽëZØèí:ºHµÍœgÖLÎúMÍŠÙ—ËtL¡ŠÖåg–4„¿0\»ï4ìã±nZOLÉ2œ7ûìKùp úž–‰êæÆ fZU& 21:19:03 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x4, &(0x7f0000000040)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 395.432487] device team0 entered promiscuous mode [ 395.437694] device team_slave_0 entered promiscuous mode [ 395.443503] device team_slave_1 entered promiscuous mode [ 395.463819] 8021q: adding VLAN 0 to HW filter on device team0 [ 395.505790] device team0 left promiscuous mode [ 395.511050] device team_slave_0 left promiscuous mode [ 395.518358] device team_slave_1 left promiscuous mode 21:19:03 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040)='/dev/sg#\x00', 0x0, 0x2) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000180)='/dev/userio\x00', 0x400, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f00000001c0)={0x101, 0x9, 0x46cc, {0x77359400}, 0x100, 0x9}) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, &(0x7f0000000280)=0x40000000001) readv(r0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/33, 0x202}], 0x1) ioctl$EVIOCGPROP(r1, 0x80404509, &(0x7f0000000300)=""/4096) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7f, 0x200000) ioctl$EVIOCSMASK(r2, 0x40104593, &(0x7f0000000100)={0x17, 0x40, &(0x7f00000000c0)="8fb4e03a370be285155747e942132f7f8a4cd823bf5004fdfde1ad8a5951f8699fb3fb068c9aa37908645857f988e81001b28eff8054ba375362b2a92711fb70"}) write$binfmt_aout(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000000000000000001000000000000000000000000000000009e7f743f0e6a165d57119693873b3110000"], 0x2e) 21:19:03 executing program 5: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp\x00') process_vm_writev(0x0, &(0x7f0000000180), 0x0, &(0x7f00000023c0)=[{&(0x7f0000000000)=""/236, 0xec}], 0x1, 0x0) getsockopt$ARPT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000100)=ANY=[], &(0x7f0000000180)) preadv(r0, &(0x7f00000017c0), 0x1fe, 0x0) pwritev(r0, &(0x7f0000000100)=[{&(0x7f00000001c0)="96e15586e42a9653dcb8e9f4a6cdb8167082dc18a9911b979d2f23f43f0608424a764ed27d8fb82d9c7a74c96bd1acb228f18a30173a87cad682804c123456c6943506ed5f9fefd36aef01380a63bfa5d4841f8b11b008d464d880037a7d5785c67a0108a8f97c65c4d074f34c1a8e327a6b7bcdd981f7171849c7fb", 0x7c}, {&(0x7f0000000240)="6d5c3440f1115ff258cdecdb6d94068fd27e3765b4155536142108ae3220e08ac9ca1b9e28521b9f7718909bc8e30ea8c329bf7721e9474be8f0c89a7c1b062528a6bb5090153008449b4d45052ebc1a7725d099bee1b6abee7fe2a4b2a5e8e7099e787b3f64bf77", 0x68}], 0x2, 0x0) 21:19:03 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r1 = perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = dup3(r0, r1, 0x80000) setsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f00000001c0)=0x5, 0x4) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:03 executing program 7: r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) preadv(r0, &(0x7f0000001480)=[{&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/122, 0x7a}, {&(0x7f00000012c0)=""/213, 0xd5}, {&(0x7f00000013c0)=""/148, 0x94}, {&(0x7f0000000000)=""/14, 0xe}, {&(0x7f00000001c0)=""/10, 0xa}], 0x6, 0x0) ioctl(r1, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") setsockopt$netlink_NETLINK_CAP_ACK(r0, 0x10e, 0xa, &(0x7f0000000180)=0x80000001, 0x4) r2 = syz_open_procfs(0x0, &(0x7f0000000040)="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") sendfile(r0, r2, &(0x7f0000000200), 0xfffffffe) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001540)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DAEMON(r0, &(0x7f0000001600)={&(0x7f0000001500)={0x10, 0x0, 0x0, 0x90200080}, 0xc, &(0x7f00000015c0)={&(0x7f0000001580)={0x38, r3, 0x300, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1ff}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000001}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x20}]}, 0x38}, 0x1, 0x0, 0x0, 0x8040}, 0x20000000) 21:19:03 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(0xffffffffffffffff, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:19:03 executing program 4: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DEST(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x4c, r1, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1}}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}]}, 0x4c}}, 0x4000000) r2 = socket$inet6(0xa, 0x10000002, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r2, 0x29, 0x20, &(0x7f0000f5ffe0)={@loopback={0xfc00000000000000}, 0x0, 0x0, 0xff, 0x1}, 0x20) 21:19:04 executing program 4: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x10800, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x100) openat(r0, &(0x7f0000000040)='./file0\x00', 0x58080, 0x40000040) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) 21:19:04 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x9, 0x200) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f00000002c0), &(0x7f0000000300)=0x4) r1 = epoll_create1(0x0) r2 = epoll_create1(0x0) close(r2) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4}}, &(0x7f0000000240)=0xe8) ioprio_set$uid(0x3, r3, 0x7) r4 = dup(r2) setsockopt$IP_VS_SO_SET_FLUSH(r4, 0x0, 0x485, 0x0, 0x0) r5 = fcntl$getown(r2, 0x9) ioctl$sock_FIOSETOWN(r4, 0x8901, &(0x7f0000000080)=r5) r6 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x3) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r6, &(0x7f0000000280)={0x40000000}) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r1, &(0x7f0000000040)={0x20000000fffd}) poll(&(0x7f0000000200)=[{r2}], 0x1, 0x0) 21:19:04 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x40000000000005, 0x10, 0x1, 0x4}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000080)='0', &(0x7f0000000040)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000140)={r1, 0x28, &(0x7f0000000040)}, 0x10) bpf$MAP_UPDATE_ELEM(0x4, &(0x7f0000000000)={r1, &(0x7f0000fc5000), &(0x7f0000950000)}, 0x20) [ 396.556252] device veth0_to_bridge entered promiscuous mode [ 396.562629] device team0 entered promiscuous mode [ 396.568063] device team_slave_0 entered promiscuous mode [ 396.573874] device team_slave_1 entered promiscuous mode [ 396.639503] 8021q: adding VLAN 0 to HW filter on device team0 [ 396.654482] device team0 left promiscuous mode [ 396.659212] device team_slave_0 left promiscuous mode [ 396.664886] device team_slave_1 left promiscuous mode 21:19:04 executing program 5: r0 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x1, 0x2) chmod(&(0x7f0000000040)='./file0\x00', 0x101) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x101000, 0x0) fcntl$dupfd(r0, 0x406, r1) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f0000000180)={0x400, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xc}}}, 0x1, 0x8, [{{0x2, 0x4e22}}, {{0x2, 0x4e22}}, {{0x2, 0xffff, @multicast2}}, {{0x2, 0x4e24, @rand_addr=0x40}}, {{0x2, 0x4e22}}, {{0x2, 0x4e21, @dev}}, {{0x2, 0x4e21, @multicast2}}, {{0x2, 0x4e20}}]}, 0x490) setsockopt$packet_int(r0, 0x107, 0x0, &(0x7f0000000140)=0x53, 0x4) socket$netlink(0x10, 0x3, 0xc) sendmsg$nl_route(r0, &(0x7f0000004fc8)={&(0x7f0000016000)={0x10, 0x0, 0x0, 0xfffffffffffffffd}, 0xc, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c0000000007000700eaff00eafaf975aa1dd6917e8a0ba5a03c4d7d336a590c9f164c7fbd2c960bc279d2e5000000000000"], 0x1c}}, 0x0) [ 396.688807] device team0 entered promiscuous mode [ 396.693894] device team_slave_0 entered promiscuous mode [ 396.699808] device team_slave_1 entered promiscuous mode [ 396.710171] 8021q: adding VLAN 0 to HW filter on device team0 [ 396.725675] device team0 left promiscuous mode [ 396.730536] device team_slave_0 left promiscuous mode 21:19:04 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 396.736133] device team_slave_1 left promiscuous mode [ 396.814180] FAULT_INJECTION: forcing a failure. [ 396.814180] name failslab, interval 1, probability 0, space 0, times 0 [ 396.825667] CPU: 0 PID: 14696 Comm: syz-executor2 Not tainted 4.18.0-rc8+ #34 [ 396.832983] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.842378] Call Trace: [ 396.845031] dump_stack+0x17c/0x1c0 [ 396.848723] should_fail+0x867/0xaa0 [ 396.852509] __should_failslab+0x278/0x2a0 [ 396.856848] should_failslab+0x29/0x70 [ 396.860829] __kmalloc_node+0x22a/0x1220 [ 396.864942] ? kmsan_set_origin_inline+0x6b/0x120 [ 396.869838] ? kvmalloc_node+0x19d/0x370 [ 396.873953] ? __msan_poison_alloca+0x173/0x200 [ 396.878693] kvmalloc_node+0x19d/0x370 [ 396.882644] alloc_netdev_mqs+0x197/0x1680 [ 396.886940] ? br_netpoll_disable+0xe0/0xe0 [ 396.891313] br_add_bridge+0x94/0x230 [ 396.895200] br_ioctl_deviceless_stub+0x5dc/0xc70 [ 396.900140] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 396.905547] ? br_netif_receive_skb+0x230/0x230 [ 396.910326] ? br_netif_receive_skb+0x230/0x230 [ 396.915082] sock_ioctl+0x95e/0xd70 [ 396.918771] ? sock_poll+0x540/0x540 [ 396.922557] do_vfs_ioctl+0xc77/0x2670 [ 396.926530] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 396.931951] ? __fget_light+0x6a3/0x700 [ 396.936016] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 396.941481] __x64_sys_ioctl+0x280/0x320 [ 396.945606] ? ksys_ioctl+0x260/0x260 [ 396.949454] do_syscall_64+0x15b/0x220 [ 396.953399] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 396.958622] RIP: 0033:0x457089 [ 396.961837] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 396.981571] RSP: 002b:00007f319feb4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 396.989353] RAX: ffffffffffffffda RBX: 00007f319feb56d4 RCX: 0000000000457089 [ 396.996669] RDX: 0000000020000000 RSI: 00000000000089a0 RDI: 0000000000000003 [ 397.003980] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 397.011298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 397.018607] R13: 00000000004d1910 R14: 00000000004c72cb R15: 0000000000000000 [ 397.117821] device team0 entered promiscuous mode [ 397.122911] device team_slave_0 entered promiscuous mode [ 397.128711] device team_slave_1 entered promiscuous mode [ 397.137697] 8021q: adding VLAN 0 to HW filter on device team0 [ 397.145614] device team0 left promiscuous mode [ 397.150497] device team_slave_0 left promiscuous mode [ 397.156091] device team_slave_1 left promiscuous mode [ 397.341786] device team0 entered promiscuous mode [ 397.346992] device team_slave_0 entered promiscuous mode [ 397.352834] device team_slave_1 entered promiscuous mode [ 397.360430] 8021q: adding VLAN 0 to HW filter on device team0 [ 397.368356] device veth0_to_bridge left promiscuous mode [ 397.378324] device team0 left promiscuous mode [ 397.383104] device team_slave_0 left promiscuous mode [ 397.388624] device team_slave_1 left promiscuous mode 21:19:05 executing program 0: r0 = socket$packet(0x11, 0x100000000000002, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000002b00)='/dev/vcs\x00', 0x60001, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, &(0x7f0000002b40)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}, &(0x7f0000002b80)=0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000300)={r1, 0x1, 0x6, @local}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x1d) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='eth1\'%),\x00', 0xffffffffffffff9c}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000000)={0xffffffffffffffff}, 0x113, 0x3}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r4, &(0x7f0000000380)={0xf, 0x8, 0xfa00, {r5, 0xf}}, 0x10) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000200)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2280000}, 0xc, &(0x7f0000000280)={&(0x7f0000000740)=ANY=[@ANYBLOB="7e00000040139c39d815c793a4977d47ac5fe80417080099b6fdbf57d170a8517006cca571781883c21ac493b75a2735bac5d28d7d0a07f7b1db6f7c82ffe867dbfa9785274c4dac6097d6c2c811906eaf1e2924e7421d4a58721e75c92ce93f769a46f100376f587985a3511add91ca63cadb2bf3efdbfe3296a6de4f8ee8d359278b2e8c2ba332a3b437d926aaa1ae6d35fced0cde9af998d5ea5c6771942f", @ANYRES16=r6, @ANYBLOB="090225bd7000ffdbdf250500000014000200080006000101000008000b00dd0900000c0001000800050000000000"], 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x4) write$FUSE_LSEEK(r4, &(0x7f0000000600)={0x18, 0xfffffffffffffff5, 0x1, {0xd2}}, 0x18) ioctl$TIOCGSID(r4, 0x5429, &(0x7f0000000100)) write(r3, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0xb) write$RDMA_USER_CM_CMD_QUERY(r4, &(0x7f00000005c0)={0x13, 0x10, 0xfa00, {&(0x7f00000003c0), r5}}, 0x18) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r7, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:05 executing program 5: perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) prctl$intptr(0x2f, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x6000, 0x0) getdents(r1, &(0x7f0000000080)=""/125, 0x7d) 21:19:05 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0)=0x0, &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r1 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f00000001c0)=0x0) ptrace$peek(0x3, r3, &(0x7f0000000200)) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000340)={r3, r0, r4}, 0xc) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 397.414531] device team0 entered promiscuous mode [ 397.419511] device team_slave_0 entered promiscuous mode [ 397.425301] device team_slave_1 entered promiscuous mode [ 397.475304] 8021q: adding VLAN 0 to HW filter on device team0 [ 397.503377] device team0 left promiscuous mode [ 397.508238] device team_slave_0 left promiscuous mode [ 397.513784] device team_slave_1 left promiscuous mode 21:19:05 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x82) socketpair$inet_icmp_raw(0x2, 0x3, 0x1, &(0x7f0000000340)={0xffffffffffffffff}) getsockname$inet(r1, &(0x7f0000000380)={0x2, 0x0, @remote}, &(0x7f00000003c0)=0x10) r2 = memfd_create(&(0x7f00000000c0)='nodev\x00', 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f00000002c0)=0xffffffff) ioctl$TCSETS(r2, 0x5402, &(0x7f0000000300)={0x20, 0x100000001, 0x9, 0x200, 0x3, 0x6d6, 0x6, 0x1, 0x7, 0xe7, 0x7fffffff, 0x78451651}) getsockopt$bt_rfcomm_RFCOMM_LM(r2, 0x12, 0x3, &(0x7f0000000240), &(0x7f0000000280)=0x4) getsockopt$bt_BT_POWER(r2, 0x112, 0x9, &(0x7f0000000080)=0x10001, &(0x7f0000000200)=0x1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r2) unshare(0x24000800) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x17, 0x0, "10dec303415fe113b503cf1ae125cffac7e0f30f657e036d8beab09fd20f016238cbff4c48bedba30ba1508f70d88ebe0a077b1bb29ee38b71b3515ce4ec8200", "c3174cfe994a2869e5662e1e2a72e0fb4aee0a7df2df380b95e5b25a31c8f999938bfe8bf214ff8e583ea7b0e03ff510bcddd4757451a798594da287af21450c", "a2b98fba2b259731fba7132ce30a6db82958009e4ff06da85422d63bc7d0db26"}) r3 = socket$inet6(0xa, 0x80003, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x9}, 0x8) listen(r3, 0x0) 21:19:05 executing program 1: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x4}, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r2 = socket(0x10, 0x802, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r0, 0x6, 0x21, &(0x7f0000000040)="c7ed9b14f4bc3cf6189bdc3190ffa822", 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000340)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x800, 0x0) ioctl$LOOP_CLR_FD(r3, 0x4c01) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000080)={r1, 0x101}, &(0x7f00000001c0)=0x8) 21:19:05 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer2\x00', 0x80000, 0x0) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000100)=0x12dc, 0x1) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000200)=0x4) r1 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140)='/dev/hwrng\x00', 0x400000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x2, &(0x7f0000000180), &(0x7f00000001c0)=0x8) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r1, 0xc0505405, &(0x7f0000000000)={{0x3, 0x1, 0x1, 0x1, 0xfffffffffffffffc}, 0xfffffffffffffffc, 0x0, 0xfffffffffffffc00}) 21:19:06 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8000008912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) r2 = syz_open_dev$sndctrl(&(0x7f0000000200)='/dev/snd/controlC#\x00', 0x4, 0x400000) fcntl$getownex(r1, 0x10, &(0x7f0000000240)={0x0, 0x0}) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r2, 0xc1105517, &(0x7f00000002c0)={{0x3, 0x0, 0xfffffffffffffffd, 0x1, 'syz0\x00', 0x3}, 0x1, 0x200, 0x7fff, r3, 0x2, 0x9, 'syz1\x00', &(0x7f0000000280)=['aegis128l-generic\x00', 'aegis128l-generic\x00'], 0x24, [], [0x100000000, 0x81, 0x4, 0x3]}) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000000080)="ab553fec94248c32e27d04000000288a", 0x10) r4 = accept$alg(r1, 0x0, 0x0) sendmsg$alg(r4, &(0x7f0000001380)={0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f00000004c0)=[@op={0x18, 0x117, 0x3, 0x1}, @assoc={0x18, 0x117, 0x4, 0x2f5}], 0x30}, 0x0) write$binfmt_script(r4, &(0x7f0000000300)=ANY=[], 0xffffffaa) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000140)=[@in={0x2, 0x4e20, @local}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x4e22, @rand_addr=0x277d}, @in6={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, [], 0x11}, 0x80}, @in6={0xa, 0x4e24, 0x6, @mcast2, 0x1643}, @in={0x2, 0x4e24, @multicast2}, @in={0x2, 0x0, @remote}, @in={0x2, 0x4e21, @local}, @in={0x2, 0x4e20, @multicast2}], 0xa8) recvmmsg(r4, &(0x7f0000005800)=[{{&(0x7f00000000c0)=@nfc, 0x80, &(0x7f00000009c0)=[{&(0x7f00000007c0)=""/228, 0xe4}, {&(0x7f00000013c0)=""/4096, 0x1000}], 0x2, &(0x7f0000000d40)=""/183, 0xb7}}], 0x4000000000003d6, 0x0, 0x0) [ 398.262380] device team0 entered promiscuous mode [ 398.267599] device team_slave_0 entered promiscuous mode [ 398.273494] device team_slave_1 entered promiscuous mode [ 398.291218] 8021q: adding VLAN 0 to HW filter on device team0 21:19:06 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"746561ffffff8000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 398.324525] device veth0_to_bridge entered promiscuous mode [ 398.338700] device team0 left promiscuous mode [ 398.344049] device team_slave_0 left promiscuous mode [ 398.351227] device team_slave_1 left promiscuous mode 21:19:06 executing program 4: getpid() fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000000300)={0x0, 0x0}) r1 = syz_open_procfs(r0, &(0x7f00000002c0)='personality\x00') getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000000), 0x4) readv(r1, &(0x7f00000005c0)=[{&(0x7f00000000c0)=""/107, 0x6b}, {&(0x7f0000000140)=""/67, 0x43}, {&(0x7f0000000040)=""/35, 0x23}, {&(0x7f00000001c0)=""/121, 0x79}], 0x4) 21:19:06 executing program 4: r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x4000)=nil, 0x84000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cuse\x00', 0xbea7510a036fbb18, 0x0) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_GET_DAEMON(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x94, r3, 0xf00, 0x70bd28, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DEST={0x3c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7ff}, @IPVS_DEST_ATTR_WEIGHT={0x8}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x49}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x4}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xe0}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xfffffffffffff000}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x400}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xdf}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfe}, @IPVS_CMD_ATTR_SERVICE={0x18, 0x1, [@IPVS_SVC_ATTR_ADDR={0x14}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x4000}, 0x80) [ 398.749305] device team0 entered promiscuous mode [ 398.754610] device team_slave_0 entered promiscuous mode [ 398.760402] device team_slave_1 entered promiscuous mode [ 398.768650] 8021q: adding VLAN 0 to HW filter on device team0 [ 398.777285] device team0 left promiscuous mode [ 398.782125] device team_slave_0 left promiscuous mode [ 398.787668] device team_slave_1 left promiscuous mode [ 398.795581] device team0 entered promiscuous mode [ 398.800565] device team_slave_0 entered promiscuous mode [ 398.806388] device team_slave_1 entered promiscuous mode [ 398.814149] 8021q: adding VLAN 0 to HW filter on device team0 [ 398.827856] device team0 left promiscuous mode [ 398.832624] device team_slave_0 left promiscuous mode [ 398.838240] device team_slave_1 left promiscuous mode 21:19:06 executing program 5: r0 = memfd_create(&(0x7f0000000000)='\x00', 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x800) write$P9_RLCREATE(0xffffffffffffffff, &(0x7f00000000c0)={0x18}, 0x18) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000e53fe8)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) readv(r0, &(0x7f0000000040)=[{&(0x7f0000001fb2)=""/1}], 0x2ca) ioctl$UFFDIO_UNREGISTER(r1, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000002000/0x1000)=nil, 0x1000}) 21:19:06 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 399.037337] FAULT_INJECTION: forcing a failure. [ 399.037337] name failslab, interval 1, probability 0, space 0, times 0 [ 399.048714] CPU: 0 PID: 14763 Comm: syz-executor2 Not tainted 4.18.0-rc8+ #34 [ 399.056046] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.065469] Call Trace: [ 399.068140] dump_stack+0x17c/0x1c0 [ 399.071850] should_fail+0x867/0xaa0 [ 399.075673] __should_failslab+0x278/0x2a0 [ 399.080012] should_failslab+0x29/0x70 [ 399.083963] __kmalloc+0xbe/0x350 [ 399.087509] ? dev_addr_init+0x11c/0x690 [ 399.091627] dev_addr_init+0x11c/0x690 [ 399.095584] alloc_netdev_mqs+0x2d6/0x1680 [ 399.099893] ? br_netpoll_disable+0xe0/0xe0 [ 399.104285] br_add_bridge+0x94/0x230 [ 399.108185] br_ioctl_deviceless_stub+0x5dc/0xc70 [ 399.113137] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 399.118579] ? br_netif_receive_skb+0x230/0x230 [ 399.123296] ? br_netif_receive_skb+0x230/0x230 [ 399.128058] sock_ioctl+0x95e/0xd70 [ 399.131738] ? sock_poll+0x540/0x540 [ 399.135514] do_vfs_ioctl+0xc77/0x2670 [ 399.139485] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 399.144924] ? __fget_light+0x6a3/0x700 [ 399.148989] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 399.154454] __x64_sys_ioctl+0x280/0x320 [ 399.158604] ? ksys_ioctl+0x260/0x260 [ 399.162455] do_syscall_64+0x15b/0x220 [ 399.166400] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 399.171650] RIP: 0033:0x457089 [ 399.174860] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 399.194608] RSP: 002b:00007f319feb4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 399.202371] RAX: ffffffffffffffda RBX: 00007f319feb56d4 RCX: 0000000000457089 [ 399.209681] RDX: 0000000020000000 RSI: 00000000000089a0 RDI: 0000000000000003 [ 399.217014] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 399.224332] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 399.231633] R13: 00000000004d1910 R14: 00000000004c72cb R15: 0000000000000001 [ 399.321815] device team0 entered promiscuous mode [ 399.326970] device team_slave_0 entered promiscuous mode [ 399.332792] device team_slave_1 entered promiscuous mode [ 399.340497] 8021q: adding VLAN 0 to HW filter on device team0 [ 399.348202] device team0 left promiscuous mode [ 399.352911] device team_slave_0 left promiscuous mode [ 399.358434] device team_slave_1 left promiscuous mode 21:19:07 executing program 6: getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f00000001c0)={0x7, 0x70, 0x4, 0x2, 0x20, 0x7, 0x0, 0xfff, 0x0, 0x4, 0x7, 0x4, 0x0, 0x400000000000000, 0x6, 0x1ff, 0x7bc, 0x101, 0x5, 0x4, 0x80000001, 0xad, 0x8, 0xcd28, 0x5, 0x9, 0x3, 0x1, 0x7, 0x67e, 0x5, 0x40, 0x5, 0x1ff, 0x93f9, 0x2, 0x0, 0x8, 0x0, 0x200, 0x0, @perf_config_ext={0x6, 0x800}, 0x20000, 0x100000001, 0x7fffffff, 0x2, 0x32, 0x4, 0xc62}, r1, 0x2, 0xffffffffffffffff, 0x3) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 399.629942] device team0 left promiscuous mode [ 399.634726] device team_slave_0 left promiscuous mode [ 399.640314] device team_slave_1 left promiscuous mode [ 399.649156] device team0 entered promiscuous mode [ 399.654121] device team_slave_0 entered promiscuous mode [ 399.659901] device team_slave_1 entered promiscuous mode [ 399.669211] 8021q: adding VLAN 0 to HW filter on device team0 [ 399.684210] device veth0_to_bridge left promiscuous mode [ 399.696250] device team0 left promiscuous mode [ 399.701180] device team_slave_0 left promiscuous mode [ 399.706695] device team_slave_1 left promiscuous mode 21:19:07 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x80202, 0x0) ioctl$KDSETKEYCODE(r3, 0x4b4d, &(0x7f00000000c0)={0x20, 0x7}) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:07 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:19:07 executing program 4: r0 = socket(0x11, 0x3, 0x0) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) setsockopt(r0, 0x107, 0xd, &(0x7f0000001000), 0xc5) sendto$inet6(r0, &(0x7f0000000040), 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x1, @ipv4={[], [], @dev}}, 0x1c) 21:19:07 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'team_slave_0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20100040}, 0xc, &(0x7f0000000040)={&(0x7f0000000400)=@setlink={0x28, 0x13, 0x407, 0x0, 0x0, {0x0, 0x0, 0x0, r1}, [@IFLA_NET_NS_FD={0x8}]}, 0x28}, 0x1, 0x0, 0x0, 0xffffffffffffffff}, 0x0) 21:19:07 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) ioctl$TUNSETPERSIST(r0, 0x400454cb, 0x1) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:07 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r0 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x414800, 0x0) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl$BLKIOMIN(r0, 0x1278, &(0x7f00000001c0)) r1 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x7, 0x2040) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000300)={0x0, 0x2}, &(0x7f0000000340)=0x8) write$P9_RSTAT(r0, &(0x7f0000000540)=ANY=[@ANYBLOB="7d0000007d010000007600090002000000200200000004000000000000000000088209000000ff0f0000ffffff7f000000000c00262a7573657275736572295e16001f2547000000000000000161636c5f616363657373192100292773797374656d6b657972696e67766d6e65743176626f786e657431707070310000"], 0x7d) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000380)={r2, @in6={{0xa, 0x4e23, 0xffffffffffffffe1, @local, 0x5}}}, 0x84) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r3 = socket(0x10, 0x802, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000440)=[@in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e21, 0x3, @local, 0x8}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e23, @multicast1}, @in6={0xa, 0x4e20, 0x3, @mcast1, 0x2}, @in6={0xa, 0x4e22, 0xea4a, @remote, 0x9}, @in={0x2, 0x4e24, @multicast1}], 0x94) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 399.950917] FAULT_INJECTION: forcing a failure. [ 399.950917] name failslab, interval 1, probability 0, space 0, times 0 [ 399.962404] CPU: 1 PID: 14786 Comm: syz-executor2 Not tainted 4.18.0-rc8+ #34 [ 399.969726] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.979134] Call Trace: [ 399.981809] dump_stack+0x17c/0x1c0 [ 399.985499] should_fail+0x867/0xaa0 [ 399.989313] __should_failslab+0x278/0x2a0 [ 399.993647] should_failslab+0x29/0x70 21:19:08 executing program 5: socket$inet6(0xa, 0x2, 0x700000) r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000cfefee)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000001400)='/dev/net/tun\x00', 0x0, 0x0) recvmmsg(r0, &(0x7f0000004980)=[{{&(0x7f0000000340)=@l2, 0x80, &(0x7f0000000800)=[{&(0x7f00000003c0)=""/220, 0xdc}, {&(0x7f00000004c0)=""/25, 0x19}, {&(0x7f0000000500)=""/235, 0xeb}, {&(0x7f0000000600)=""/97, 0x61}, {&(0x7f0000000680)=""/70, 0x46}, {&(0x7f0000000700)=""/208, 0xd0}, {&(0x7f0000001440)=""/4096, 0x1000}], 0x7, &(0x7f0000000880)=""/138, 0x8a, 0x7b7}, 0x80}, {{&(0x7f0000000940)=@sco, 0x80, &(0x7f0000000f00)=[{&(0x7f00000009c0)=""/106, 0x6a}, {&(0x7f0000000a40)=""/204, 0xcc}, {&(0x7f0000000b40)=""/142, 0x8e}, {&(0x7f0000000c00)=""/74, 0x4a}, {&(0x7f0000002440)=""/4096, 0x1000}, {&(0x7f0000000c80)=""/130, 0x82}, {&(0x7f0000000d40)=""/154, 0x9a}, {&(0x7f0000003800)=""/4096, 0x1000}, {&(0x7f0000000e00)=""/212, 0xd4}], 0x9, 0x0, 0x0, 0x1ff}, 0x6}, {{&(0x7f00000011c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000001240), 0x0, &(0x7f0000001280)=""/124, 0x7c}}, {{&(0x7f0000004800)=@vsock, 0x80, &(0x7f0000004880), 0x0, &(0x7f00000048c0)=""/142, 0x8e}}], 0x4, 0x40000000, &(0x7f0000004b00)={0x77359400}) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'nr0\x00', 0x2}) recvmmsg(r0, &(0x7f00000037c0)=[{{&(0x7f0000003440)=@l2, 0x80, &(0x7f0000003680), 0x0, &(0x7f00000036c0)=""/64, 0x40}, 0x1000000000}], 0x1, 0x8, &(0x7f0000003700)={0x77359400}) [ 399.997637] __kmalloc_node+0x22a/0x1220 [ 400.001797] ? __msan_poison_alloca+0x173/0x200 [ 400.006537] ? kvmalloc_node+0x19d/0x370 [ 400.010690] ? __msan_metadata_ptr_for_store_4+0x13/0x20 [ 400.016191] ? init_timer_key+0x2c1/0x330 [ 400.020400] kvmalloc_node+0x19d/0x370 [ 400.024352] alloc_netdev_mqs+0xd88/0x1680 [ 400.028640] br_add_bridge+0x94/0x230 [ 400.032525] br_ioctl_deviceless_stub+0x5dc/0xc70 [ 400.037466] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 400.042906] ? br_netif_receive_skb+0x230/0x230 [ 400.047615] ? br_netif_receive_skb+0x230/0x230 [ 400.052368] sock_ioctl+0x95e/0xd70 [ 400.056049] ? sock_poll+0x540/0x540 [ 400.059826] do_vfs_ioctl+0xc77/0x2670 [ 400.063806] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 400.069213] ? __fget_light+0x6a3/0x700 [ 400.073278] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 400.078743] __x64_sys_ioctl+0x280/0x320 [ 400.082869] ? ksys_ioctl+0x260/0x260 [ 400.086711] do_syscall_64+0x15b/0x220 [ 400.090667] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 400.095893] RIP: 0033:0x457089 [ 400.099108] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 400.118867] RSP: 002b:00007f319feb4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 400.126635] RAX: ffffffffffffffda RBX: 00007f319feb56d4 RCX: 0000000000457089 [ 400.133947] RDX: 0000000020000000 RSI: 00000000000089a0 RDI: 0000000000000003 [ 400.141256] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 400.148575] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 400.155888] R13: 00000000004d1910 R14: 00000000004c72cb R15: 0000000000000002 21:19:08 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1f, 0x0, "8c0eb7912a86ff3e23764a3c01af55410c3d3f813a4513a691be997c7ee1235982875b8ae5c27fc73eb383beca956b51a34191ad3a9f70ebee5f1d003dcd4427c273be993dd363cc8f36cc7f609a2371"}, 0xd8) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet6(r0, &(0x7f0000000200)="0c8b3067916534274b324c65e2809afb6d02d29fbf640f1922e7b1879936dd6dc8f95ed326309fa99908dd05093eee8af40aada4a750303eb6e5190a43539554a2302ac3e7b06b55aa9534609e0abf385851c460738031ba7e952d7fabfa018605f4a214", 0x64, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="12", 0x1, 0x80, &(0x7f0000000140)={0xa, 0x0, 0x7fffffff, @loopback, 0x1000000}, 0x1c) ioctl$RTC_PIE_OFF(r1, 0x7006) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendfile(r0, r2, &(0x7f0000000040), 0x8000ffffffee) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000380)=""/248, &(0x7f0000000080)=0xf8) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x100, 0x22) ioctl$UI_DEV_DESTROY(r3, 0x5502) [ 400.394607] device team0 entered promiscuous mode [ 400.399728] device team_slave_0 entered promiscuous mode [ 400.405549] device team_slave_1 entered promiscuous mode [ 400.418576] 8021q: adding VLAN 0 to HW filter on device team0 [ 400.430934] device team0 entered promiscuous mode [ 400.435956] device team_slave_0 entered promiscuous mode [ 400.441789] device team_slave_1 entered promiscuous mode [ 400.460988] 8021q: adding VLAN 0 to HW filter on device team0 [ 400.472346] device veth0_to_bridge entered promiscuous mode [ 400.489735] device team0 left promiscuous mode [ 400.494561] device team_slave_0 left promiscuous mode [ 400.500155] device team_slave_1 left promiscuous mode [ 400.509444] device team0 entered promiscuous mode [ 400.514520] device team_slave_0 entered promiscuous mode [ 400.520326] device team_slave_1 entered promiscuous mode [ 400.531412] 8021q: adding VLAN 0 to HW filter on device team0 21:19:08 executing program 2 (fault-call:1 fault-nth:3): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 400.544628] device team0 left promiscuous mode [ 400.549352] device team_slave_0 left promiscuous mode [ 400.554907] device team_slave_1 left promiscuous mode [ 400.575632] IPVS: length: 248 != 8 [ 400.639823] FAULT_INJECTION: forcing a failure. [ 400.639823] name failslab, interval 1, probability 0, space 0, times 0 [ 400.651261] CPU: 1 PID: 14821 Comm: syz-executor2 Not tainted 4.18.0-rc8+ #34 [ 400.658580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.667966] Call Trace: [ 400.670624] dump_stack+0x17c/0x1c0 [ 400.674782] should_fail+0x867/0xaa0 [ 400.678607] __should_failslab+0x278/0x2a0 [ 400.682976] should_failslab+0x29/0x70 [ 400.686955] __kmalloc_node+0x22a/0x1220 [ 400.691090] ? __msan_poison_alloca+0x173/0x200 [ 400.695835] ? kvmalloc_node+0x19d/0x370 [ 400.699964] kvmalloc_node+0x19d/0x370 [ 400.703907] alloc_netdev_mqs+0x116e/0x1680 [ 400.708285] br_add_bridge+0x94/0x230 [ 400.712172] br_ioctl_deviceless_stub+0x5dc/0xc70 [ 400.717104] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 400.722549] ? br_netif_receive_skb+0x230/0x230 [ 400.727269] ? br_netif_receive_skb+0x230/0x230 [ 400.732037] sock_ioctl+0x95e/0xd70 [ 400.735719] ? sock_poll+0x540/0x540 [ 400.739491] do_vfs_ioctl+0xc77/0x2670 [ 400.743475] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 400.748895] ? __fget_light+0x6a3/0x700 [ 400.752954] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 400.758417] __x64_sys_ioctl+0x280/0x320 [ 400.762544] ? ksys_ioctl+0x260/0x260 [ 400.766391] do_syscall_64+0x15b/0x220 [ 400.770338] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 400.775574] RIP: 0033:0x457089 [ 400.778790] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 400.798541] RSP: 002b:00007f319feb4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 400.806312] RAX: ffffffffffffffda RBX: 00007f319feb56d4 RCX: 0000000000457089 [ 400.813617] RDX: 0000000020000000 RSI: 00000000000089a0 RDI: 0000000000000003 [ 400.820922] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 400.828239] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 400.835556] R13: 00000000004d1910 R14: 00000000004c72cb R15: 0000000000000003 [ 400.941695] device team0 entered promiscuous mode [ 400.946707] device team_slave_0 entered promiscuous mode [ 400.952493] device team_slave_1 entered promiscuous mode [ 400.960635] 8021q: adding VLAN 0 to HW filter on device team0 [ 400.975566] device team0 left promiscuous mode [ 400.980322] device team_slave_0 left promiscuous mode [ 400.985863] device team_slave_1 left promiscuous mode 21:19:09 executing program 7: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000240)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_procs(r0, &(0x7f0000000180)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000100), 0x12) r2 = socket$inet6(0xa, 0x1, 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000080)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000001000)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_mreqsrc(r4, 0x0, 0x2000000000000004, &(0x7f0000013ff4)={@local, @rand_addr}, 0xc) ioctl$sock_SIOCINQ(r4, 0x541b, &(0x7f0000000140)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000000)={{&(0x7f0000010000/0x2000)=nil, 0x2000}, 0x3}) dup3(r2, r3, 0x0) 21:19:09 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='cramfs\x00', 0x800, &(0x7f0000000540)="e422e6b3583ff5515418fee2b03c1c8f6a0a40cf0d2308773d0ab21930a781a2c0e0a0e9859c21cf2f7c4447016dd750eb40fe4666d707cb59dc4242551e2035f4a7791147e18facecbf2854c4d339bc71e8749d24e57c28dd1a4f53899e30969785554ccf4b668253dfe8dbdf8179fe74ce1ae4cf8bbbea5e5ccfa7446b43aa8e916d8707e15da99bc979aa50ba04cc2194a6d109ae65f01dfaaca53727db18dd5ee80d95ec4535b74ad92117116ca64af91da2a971563c8f5cac97a2c8c40370936a1d11fdd5cb12228517c401407fc15518996a097c12d59da8476685db4ee02a4541cd3c09dd56ceaf60") sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x4, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='io.stat\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0xd930, 0x8240) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x6, 0x2000) openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000700)='/dev/sequencer2\x00', 0x200000, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000740)='/dev/hwrng\x00', 0x42080, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'team0\x00', 0x1002}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:09 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1f, 0x0, "8c0eb7912a86ff3e23764a3c01af55410c3d3f813a4513a691be997c7ee1235982875b8ae5c27fc73eb383beca956b51a34191ad3a9f70ebee5f1d003dcd4427c273be993dd363cc8f36cc7f609a2371"}, 0xd8) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet6(r0, &(0x7f0000000200)="0c8b3067916534274b324c65e2809afb6d02d29fbf640f1922e7b1879936dd6dc8f95ed326309fa99908dd05093eee8af40aada4a750303eb6e5190a43539554a2302ac3e7b06b55aa9534609e0abf385851c460738031ba7e952d7fabfa018605f4a214", 0x64, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="12", 0x1, 0x80, &(0x7f0000000140)={0xa, 0x0, 0x7fffffff, @loopback, 0x1000000}, 0x1c) ioctl$RTC_PIE_OFF(r1, 0x7006) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendfile(r0, r2, &(0x7f0000000040), 0x8000ffffffee) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000380)=""/248, &(0x7f0000000080)=0xf8) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x100, 0x22) ioctl$UI_DEV_DESTROY(r3, 0x5502) [ 401.333865] IPVS: length: 248 != 8 21:19:09 executing program 7: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00003e0000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00003b9fdc)) r3 = syz_open_pts(r2, 0x0) r4 = signalfd4(0xffffffffffffffff, &(0x7f00000001c0), 0x8, 0x0) ppoll(&(0x7f0000000000)=[{r4}, {r3, 0x1301}], 0x2, &(0x7f0000000040)={0x77359400}, &(0x7f0000000080), 0x8) fadvise64(r0, 0x0, 0x1, 0x5) [ 401.536566] device team0 entered promiscuous mode [ 401.541689] device team_slave_0 entered promiscuous mode [ 401.547514] device team_slave_1 entered promiscuous mode [ 401.556200] 8021q: adding VLAN 0 to HW filter on device team0 21:19:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r1 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000001c0)=0x10) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200)='/dev/hwrng\x00', 0x200000, 0x0) getsockopt$inet6_tcp_buf(r2, 0x6, 0x18, &(0x7f0000000700)=""/60, &(0x7f00000006c0)=0xfffffcdd) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) keyctl$dh_compute(0x17, &(0x7f0000000340)={r0, r0, r0}, &(0x7f0000000380)=""/232, 0xe8, &(0x7f00000004c0)={&(0x7f0000000480)={'tgr160\x00'}, &(0x7f0000000540)="04205c8be41049e372e27cd8ee2a5d260c741a75520a0da8b147d3d973404f7801002299049b0c2d7a9a7c197a8b0fc4326b19f66cb5d7a225640bc9311d85e76ffd316879f1ef38924869720218a6bc9cd23c39571d75dec417d73c0eea8fd850f8564c39ef60cb90288a747e9eff4bc54a4bb197dec7705118f2d09ab99225646a64ae7d5357de4a9c7452611e178dbbe06d0cf5b1ceec89fc1d35be18e5147982873e63d9657be143c2e6e5ec2834ab1512430efedd7fd2b646fc09642f92cb07e3c741dd57bf972cfacbd8e8caa1d7929383802ca3da711c85af9641b6de48f6", 0xe2}) mkdir(&(0x7f0000000640)='./file0\x00', 0x1) [ 401.585412] device team0 left promiscuous mode [ 401.590200] device team_slave_0 left promiscuous mode [ 401.595740] device team_slave_1 left promiscuous mode [ 401.629840] device team0 entered promiscuous mode [ 401.634929] device team_slave_0 entered promiscuous mode [ 401.640698] device team_slave_1 entered promiscuous mode 21:19:09 executing program 2 (fault-call:1 fault-nth:4): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 401.675193] 8021q: adding VLAN 0 to HW filter on device team0 [ 401.697477] device team0 left promiscuous mode [ 401.702474] device team_slave_0 left promiscuous mode [ 401.709593] device team_slave_1 left promiscuous mode 21:19:09 executing program 4: r0 = socket$inet6(0xa, 0x400000000001, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x1f, 0x0, "8c0eb7912a86ff3e23764a3c01af55410c3d3f813a4513a691be997c7ee1235982875b8ae5c27fc73eb383beca956b51a34191ad3a9f70ebee5f1d003dcd4427c273be993dd363cc8f36cc7f609a2371"}, 0xd8) r1 = dup(r0) setsockopt$inet6_tcp_int(r1, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20}, 0x1c) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) sendto$inet6(r0, &(0x7f0000000200)="0c8b3067916534274b324c65e2809afb6d02d29fbf640f1922e7b1879936dd6dc8f95ed326309fa99908dd05093eee8af40aada4a750303eb6e5190a43539554a2302ac3e7b06b55aa9534609e0abf385851c460738031ba7e952d7fabfa018605f4a214", 0x64, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback, 0x4}, 0x1c) sendto$inet6(r0, &(0x7f0000000100)="12", 0x1, 0x80, &(0x7f0000000140)={0xa, 0x0, 0x7fffffff, @loopback, 0x1000000}, 0x1c) ioctl$RTC_PIE_OFF(r1, 0x7006) r2 = open(&(0x7f00000001c0)='./bus\x00', 0x141042, 0x0) ftruncate(r2, 0x7fff) sendfile(r0, r2, &(0x7f0000000040), 0x8000ffffffee) getsockopt$IP_VS_SO_GET_SERVICES(r0, 0x0, 0x482, &(0x7f0000000380)=""/248, &(0x7f0000000080)=0xf8) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x100, 0x22) ioctl$UI_DEV_DESTROY(r3, 0x5502) [ 402.024753] IPVS: length: 248 != 8 [ 402.318999] device team0 entered promiscuous mode [ 402.324304] device team_slave_0 entered promiscuous mode [ 402.330160] device team_slave_1 entered promiscuous mode [ 402.337786] 8021q: adding VLAN 0 to HW filter on device team0 [ 402.348446] device team0 left promiscuous mode [ 402.353237] device team_slave_0 left promiscuous mode [ 402.358800] device team_slave_1 left promiscuous mode [ 402.526511] device team0 entered promiscuous mode [ 402.531438] device team_slave_0 entered promiscuous mode [ 402.537261] device team_slave_1 entered promiscuous mode [ 402.545291] 8021q: adding VLAN 0 to HW filter on device team0 [ 402.552684] FAULT_INJECTION: forcing a failure. [ 402.552684] name failslab, interval 1, probability 0, space 0, times 0 [ 402.564153] CPU: 0 PID: 14850 Comm: syz-executor2 Not tainted 4.18.0-rc8+ #34 [ 402.571464] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.580846] Call Trace: [ 402.583501] dump_stack+0x17c/0x1c0 [ 402.587194] should_fail+0x867/0xaa0 [ 402.590947] __should_failslab+0x278/0x2a0 [ 402.595291] should_failslab+0x29/0x70 [ 402.599242] __kmalloc_node+0x22a/0x1220 [ 402.603403] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 402.608853] ? kvmalloc_node+0x19d/0x370 [ 402.612992] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 402.618414] ? find_next_bit+0x25b/0x2a0 [ 402.622537] kvmalloc_node+0x19d/0x370 [ 402.626467] bucket_table_alloc+0xdb/0xb20 [ 402.630792] rhashtable_init+0x9d2/0xc30 [ 402.634911] ? find_next_bit+0x25b/0x2a0 [ 402.639033] br_fdb_hash_init+0x54/0x60 [ 402.643075] br_dev_init+0x194/0x470 [ 402.646823] ? br_dev_setup+0xaa0/0xaa0 [ 402.650818] register_netdevice+0x2d6/0x2690 [ 402.655264] ? __mutex_lock_killable_slowpath+0x2c/0x30 [ 402.660701] register_netdev+0x93/0xd0 [ 402.664600] br_add_bridge+0x13e/0x230 [ 402.668586] br_ioctl_deviceless_stub+0x5dc/0xc70 [ 402.673747] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 402.679184] ? br_netif_receive_skb+0x230/0x230 [ 402.683903] ? br_netif_receive_skb+0x230/0x230 [ 402.688659] sock_ioctl+0x95e/0xd70 [ 402.692322] ? sock_poll+0x540/0x540 [ 402.696076] do_vfs_ioctl+0xc77/0x2670 [ 402.700051] ? __msan_metadata_ptr_for_load_1+0x10/0x20 [ 402.705486] ? __fget_light+0x6a3/0x700 [ 402.709556] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 402.715021] __x64_sys_ioctl+0x280/0x320 [ 402.719151] ? ksys_ioctl+0x260/0x260 [ 402.723002] do_syscall_64+0x15b/0x220 [ 402.726955] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 402.732167] RIP: 0033:0x457089 [ 402.735373] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 402.754965] RSP: 002b:00007f319feb4c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 402.762727] RAX: ffffffffffffffda RBX: 00007f319feb56d4 RCX: 0000000000457089 [ 402.770037] RDX: 0000000020000000 RSI: 00000000000089a0 RDI: 0000000000000003 [ 402.777351] RBP: 00000000009300a0 R08: 0000000000000000 R09: 0000000000000000 [ 402.784647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000004 [ 402.791988] R13: 00000000004d1910 R14: 00000000004c72cb R15: 0000000000000004 [ 402.800881] device team0 left promiscuous mode [ 402.805567] device team_slave_0 left promiscuous mode [ 402.811144] device team_slave_1 left promiscuous mode [ 402.980268] device veth0_to_bridge left promiscuous mode [ 402.988550] device team0 left promiscuous mode [ 402.993313] device team_slave_0 left promiscuous mode [ 402.998886] device team_slave_1 left promiscuous mode 21:19:11 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x284000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r1, 0x80045400, &(0x7f00000001c0)) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @local}, 0x10) getsockopt$packet_int(r0, 0x107, 0x3, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r3 = socket$netlink(0x10, 0x3, 0x4) write(r3, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) write$FUSE_POLL(r4, &(0x7f0000000200)={0x18, 0x0, 0x8, {0x6}}, 0x18) 21:19:11 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cuse\x00', 0x4802, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r0, 0xc0305710, &(0x7f0000000080)={0x1, 0x7f4c, 0x2, 0x400}) r1 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r2 = socket(0x1, 0x80005, 0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f00000001c0)={0xaa, 0x21}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000380)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) getsockopt$inet_int(r1, 0x0, 0x22, &(0x7f0000000300), &(0x7f0000000340)=0x4) 21:19:11 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000)='/dev/input/event#\x00', 0x8, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x101000, 0x0) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f0000000040)) r1 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r1, 0x10e, 0x5, &(0x7f0000000080), 0x0) 21:19:11 executing program 7: socketpair(0x1e, 0x5, 0x0, &(0x7f0000001400)={0x0, 0x0}) recvmsg$kcm(r1, &(0x7f0000000100)={&(0x7f0000000000)=@vsock, 0x80, &(0x7f00000014c0)=[{&(0x7f00000002c0)=""/4096, 0x1000}], 0x1, &(0x7f0000000240)=""/105, 0x69}, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x8000, 0x0) r2 = memfd_create(&(0x7f00000000c0)='#em1#+\x00', 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r2, 0x0) close(r0) r3 = getpgrp(0xffffffffffffffff) ptrace$getenv(0x4201, r3, 0xb1e, &(0x7f0000000180)) syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x0, 0x101000) 21:19:11 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) delete_module(&(0x7f00000001c0)=':nodevself!mime_type,vmnet0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:11 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) mount(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='cramfs\x00', 0x800, &(0x7f0000000540)="e422e6b3583ff5515418fee2b03c1c8f6a0a40cf0d2308773d0ab21930a781a2c0e0a0e9859c21cf2f7c4447016dd750eb40fe4666d707cb59dc4242551e2035f4a7791147e18facecbf2854c4d339bc71e8749d24e57c28dd1a4f53899e30969785554ccf4b668253dfe8dbdf8179fe74ce1ae4cf8bbbea5e5ccfa7446b43aa8e916d8707e15da99bc979aa50ba04cc2194a6d109ae65f01dfaaca53727db18dd5ee80d95ec4535b74ad92117116ca64af91da2a971563c8f5cac97a2c8c40370936a1d11fdd5cb12228517c401407fc15518996a097c12d59da8476685db4ee02a4541cd3c09dd56ceaf60") sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) syz_open_dev$midi(&(0x7f00000002c0)='/dev/midi#\x00', 0x4, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='io.stat\x00', 0x0, 0x0) syz_open_dev$vcsn(&(0x7f0000000380)='/dev/vcs#\x00', 0xd930, 0x8240) syz_open_dev$sndpcmp(&(0x7f0000000480)='/dev/snd/pcmC#D#p\x00', 0x6, 0x2000) openat$full(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/full\x00', 0x0, 0x0) openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000700)='/dev/sequencer2\x00', 0x200000, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000740)='/dev/hwrng\x00', 0x42080, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'team0\x00', 0x1002}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 403.387832] device team0 entered promiscuous mode [ 403.392949] device team_slave_0 entered promiscuous mode [ 403.398744] device team_slave_1 entered promiscuous mode [ 403.409341] 8021q: adding VLAN 0 to HW filter on device team0 [ 403.424387] device team0 left promiscuous mode [ 403.429156] device team_slave_0 left promiscuous mode [ 403.434745] device team_slave_1 left promiscuous mode 21:19:11 executing program 5: sched_setattr(0x0, &(0x7f0000000080), 0x0) mmap(&(0x7f0000000000/0x19000)=nil, 0x19000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e53fe8)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000007fe0)={{&(0x7f0000000000/0x4000)=nil, 0x4000}, 0x1}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000cd8ff4)) r3 = epoll_create1(0x0) r4 = accept4(r1, &(0x7f0000000100)=@nl, &(0x7f0000000040)=0x80, 0x800) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000180)={0x0, 0xed, "21ad457397303b7b2cd0b6d6ce94da6a2fa5c461cc56e8eb62bc4af81633fface00e95b93c07d46fe9d16e1e8552a20d10a9dda1ee753d3c8545851f670681585ae01dd199c0b9f278d3b82e86b43a1f743952a3389304b6d55218c3b43e26ed5707cb66a58ef0813725aa5a43e6c0a81c07a2106d48326c1b3d19d354955f43b1609396f19a45c138cf3a3216a4ad02da839cceeea0b9377e2e24aee5a9b353b837da8101a88ffcbcadea4975064364fce978ed05b9612379a2343ce728ed8e4b0f989ef639918a021b1ceb8e84d12fc2256ff91f2b9cfab0d0685f82d28937269a7cba42ad0e0f0f630d37fa"}, &(0x7f0000000280)=0xf5) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f00000002c0)={r5, 0xfffffffffffffffc, 0x30}, &(0x7f0000000300)=0xc) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r2, &(0x7f0000007000)={0xffffffffc0000001}) epoll_wait(r2, &(0x7f00000000c0)=[{}], 0x15f60b4, 0x0) epoll_wait(r3, &(0x7f0000000000)=[{}], 0x136e, 0x0) ioctl$UFFDIO_UNREGISTER(r0, 0xc020aa04, &(0x7f0000007ffc)={&(0x7f0000000000/0x2000)=nil, 0x2000}) 21:19:11 executing program 7: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socketpair(0xa6fa68c98754537a, 0x2, 0x80000000, &(0x7f0000000000)={0xffffffffffffffff}) syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1, 0x200) socketpair$unix(0x1, 0x7, 0x0, &(0x7f00000000c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) r2 = timerfd_create(0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) close(r2) [ 403.474218] device veth0_to_bridge entered promiscuous mode [ 403.482823] device team0 entered promiscuous mode [ 403.487940] device team_slave_0 entered promiscuous mode [ 403.493804] device team_slave_1 entered promiscuous mode [ 403.514252] 8021q: adding VLAN 0 to HW filter on device team0 21:19:11 executing program 2: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_sock_size\x00', 0x2, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x0, 0x0) connect$bt_rfcomm(r0, &(0x7f00000000c0)={0x1f, {0x9, 0x40, 0x2, 0x9, 0x3}, 0x7ff}, 0xa) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmmsg(r1, &(0x7f00000074c0)=[{{&(0x7f0000000200)=@ax25={0x3, {"500f3810110a11"}, 0x5}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000280)="7346465e315b6930de646b090e4b8b270d75083efcddcda3c70770a340c5291298e07d705097c1faf38e88dc2a7c0b5483fbe1f2ed619dfa1c9fde94a67c4ea0dc29dceaa02e978379d6866f0e433d049504967b2b6148c62a4f8f317f627774bf539ec3ad7750fc17", 0x69}, {&(0x7f0000000300)="833a0d282fff54832dc84064370f1abf1c328a2c8ac7334b9d1c3e886edec7da6c1bc6c6638dbc4623257ed09aff92bd33557d38caf40fddd6a72006331521b99c336e7f8c4f809b5bd9238ff47cc333c107a9c428a5351fc080c69bf9231d771250ce6a", 0x64}, {&(0x7f0000000380)="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", 0xff}, {&(0x7f0000000480)="e698ecbb8de905a0b9d0bd7864d7c3d0de1bc839bf199811284c7da6d9fb8fbbc78e7e8dd44fe31aa46dea44d276bbc1084943281a97b5680c8fbb0a6cf6e771c2370ca8dca9d97e2048c8a83dc6b928cecc674ec0ab6785ab52926ade7c27afe16d4fa130abd25f238e3a2ad31ce00d5c0d91bf19fc", 0x76}], 0x4, &(0x7f0000000600)=[{0xe8, 0x0, 0x104ec00000, "fc72df3e40ec7d99bc53df19b137e32c2eb158d61bcf672682a6dbcbf1d6a09cf796039faaf389d52a35ac4ba02545314aed9d133e48c96b0ef47e30a7283a5ee826927eff17ff76a6ad84dbbb4e810975eec775bd863da08eb89864352153ed145b10f8c040fcb5e97c39f462c0194b0ac01edf6a23c6e81a5cca700be709cc8cfb40751150f48eb11303d775296bb0df0dd59783dcf1930af4039a98d4bfab56447dc9b570cd0b6c926eae84c1e9709cb7d7db69d021f7561de16cd31c965ae82a14387f32112c073243fda8a100c65191701632"}, {0x108, 0x13f, 0x67b43d6a, "cef2daf975c118a1135eeb22c72a44c5c8ebbfeac1120d626d5da5c909f512d8ee4e8bcc39f46fd5a260d6f0b00b388f2babb9ec8fc413b8a54635c1676c6f224ead445b316db1c12a4659b50d020119db29b5e75036032a87eecc53200651de275eecb77f93810a7ac2791589538df42465f58be083112954017e6ecf6d00a57f7bdbcb3ec9a946b0eddbf2e9b6eec1119d5b644605812abfa1f31325da50c879e966f88ecaf29bb88eacb7995e1bb8725e36cddfa918ea69118c573e1ed42e010de05fc33659e83cec8e4a0718bb8697e8a432b0b86727556ef9cba2fe6850f986c4916785e97568d30fda65da9888129f"}], 0x1f0, 0x44000}, 0x200000000}, {{&(0x7f0000000500)=@nl=@proc={0x10, 0x0, 0x25dfdbfc, 0x40}, 0x80, &(0x7f0000001a00)=[{&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000001800)="d3b2fbcc15cbff8067a96338ecda1ef7981ba150535bee9c813fb82873946b07aee044f056521ad9286167b8f1faec20c20e796c0842dfb18fe4bd4229cbda01850b530784551f9896edeb08c25aba6ed1224fa26880e2e3a7fb640ee7aa70a3bddc8c21765f1271522055ca365e20de097e04502518694bbd13c9cdb747303e150c4a990983900ccf82f6f6efb9ad84e248b2bfb9f2ab605c45d1bded5527cde2b3aa2127f84e2131be34081d3de6cf9a687b5e86d889061e702d9cc9e408af3e9fe94759edde6a0e12af4a1540016023118699c32e14e51419d0f8dd3b78955db4415bf8b6b58a0a0a", 0xea}, {&(0x7f0000000580)="6ec65c131e297df3cb8854525a86fc8cd59639e9a2f56a6a2ae741c0384fd7a629d0587b0cb7d5e2fa6eb428546a72c45f", 0x31}, {&(0x7f0000001900)="c1d1acbd50892abb76eacab74d184ab9d1193a445142d21c4914cfc3fad772addb62a1ac063df129c8292aee50a284c48e020d1fd093e2ec2a0cfd98222a6000a7a221109e1572cf78d48ba1ddf3236fe9a36661acd888a5c7201fcecbb09ba924b026a8f8300df5f95ef1b99b2ee25b9ca48b149718150d7e269c8b644954386c3fddc862609e66c32f4c21142ae02e64e2fff350cab4953556bc5afedd9241fb1134fe2116ddbf73e662b463825d527a306102492041d4e810e4a9b044fd30ce773bae4943", 0xc6}], 0x4, 0x0, 0x0, 0x44}, 0x85}, {{&(0x7f0000001a40)=@llc={0x1a, 0x30f, 0xb6, 0x5, 0x6, 0x10001}, 0x80, &(0x7f0000001d40)=[{&(0x7f0000001ac0)="e505224916bc19628d633045fd2bbbe3162cea074e9b4a1e85c5d5ca4383ebb4026a29c2947b0e055c34ad484f689fce2924054909dd27fcbb2ab06c0c8b092c9c60982ac5ed4866cb3a186f9841fed9349b936354d3703585fc495798c2437264f9040f50b78cb315715e2a1ecae857", 0x70}, {&(0x7f0000001b40)="f361cd2887d8bfc69cbb6c322993b03a10bf85de1b33e26609e3e0a8f79299ec38aea46c12a44ebf04c2098f8f8031e343820ebf945a09bf9a84ec416f216ab0dc26e756ac86915dfe704b7a1584243a7f287d86b02f6baab39b68867bfb0bccb14da46a06da986af281131629fb683bee121a9cab8fba9e7b2a3c1b59ac67bd5d0ffcd1cf447d36f39be1614dc1ba959180fe31ffc0afdc108d00ae4fecc9d2e48c58286c6477cd6590680eb155a64441d01c686c42fcc03e6a28f7c547acb920b3cc9e8140732291c06778e59399b27958a38fdab4d252649a0e01f5735684a1586215c5ef909c92937b5017e0d3a350bcb8be463595b2c30a29458093", 0xfe}, {&(0x7f0000001c40)="b57bfa1a6fdacc5f2a3044580f399a8a1b3c759deb82af3273781e0dde2fd0a264d8e8b0cd6cd6672b97e6eec8c8267cd862bba10534cfaebfab642b9f2d96a4b2bb569961714e2d2f832753a31cf9f255a346072477362c06222071220eb5313079866e404b5d4e06503ff39b121421da2f7340f56a24eda25fc1f1df8c5c06a2b24166bdc0b99bcde00d3c0fa9", 0x8e}, {&(0x7f0000001d00)="539366b82bce210f78eeac16606ed79754046760e662430c2f8abd", 0x1b}], 0x4, &(0x7f0000001d80)=[{0x30, 0x102, 0x4, "a874fe3407a4bdfb98580297aaee35b596591ba61ab3388b569b84334e"}, {0xb8, 0x102, 0x80, "9b13923a2ac775d2bbaf147200b372db7979cdb8157c775253c0e190bf37332d0dbeaa9f5702ddccfa6b7d068e15f982fe255049f60920cc0e7aa87999e427385e9fd3241a9d9aa7ac609e7f0327397a9068cd29c6311698a7eed7c3d9e4c7fd64b9df2d362cd78a301806576ea89d03279ab30373e34d77e2ad584d4e10aa5b1aed5422cccddfe33ed3e872554904d349c6f0b557a2a223b26631e6f9378634ff4c"}, {0x100, 0x103, 0x1, "5071106f9f89b072d5c1c77f531fb9217c5d795a53413be9133fbd2b207fc369c29b84a857c0d18b1790520df7a89711385dbc65be584b37a3176a879bf6124a31a02537876a1c33557df053118357c1735f9f48b4ab81051d4d7bb13fdb4bebdf8b66372d94906c298824afcc3d15214f9f3bad5d0625e181e0ef20b9504a9f718cda724e8fc607c445d98c38d6a5fe535ca63c1ed91de7774994ee9f3b0ff27f77c0ead7f876b4f4516cf911faad81f99b90fe32c1303e8b20a7343a825214f1c59ba0b57597eb7c616d3cf3232f9cee3b9992dc15ad1de2bd1ad60dde9ca65d4944e5362acac0b84f8f15b14b"}, {0xd8, 0x11f, 0x8001, "ffacb0d8af8b20a1b9b4f2e8d415d78e7d07b5225adf4ad44610f5aed7470dc498576caff787420d8a75e931429f358bd150b5d9d0473fcc62eda01347e88bad4b71de40eecb8c2d0d3b582afbb70429bdfc2cd93aab82f116378b21f19193d01dd6bb9c48113a31eb6f8a2a2e88614b4d63fe8c32fbf1528ccc31de57fa77d1e8ac46552aa362b39f89631eed58ee5c6c253274e539b43d79db32a8dff05836deb341c1522726e5f196d45829cdda9e2113d47c12223e29c70d1c0e84fa60f3d4"}], 0x2c0, 0x40000}, 0x4}, {{&(0x7f0000002040)=@rc={0x1f, {0x3, 0x9, 0x3, 0x10000, 0x5, 0x7fff}, 0x1}, 0x80, &(0x7f00000024c0)=[{&(0x7f00000020c0)="7780cd96a8e4b85b45675a60fcefb4314f2eb9ae0a3e43d6650a7dbdb56662a1d8fc9cbe64669005e5b7f82ceacdf84042bd7592a5a26825cdc2984b29bd4dfc2657b71fb344c0d2c45522f1c849d2a497e8395f1a17a68e27e9e1ef1554d2fa401f12e14abeaebf8a517171376308d6ea08753a2d9bb589ad8144b9958babda120df04a772a", 0x86}, {&(0x7f0000002180)="312479ee168f09ed974bfdcff6babe5dbe1281a599c3d9766933d48e4e6b9ea16146791e26255a3138898e81a3ad9d90198f322dcdecb6ffa064b8d62767ec4357457461a2d5afa415ac65045941680d7e4cc64d76d95923a549002f827210f2cc588da5fe2db85f6ab316229121e9105c91dea2d594ae5ff906a13dae5897010d8300d19d6bd08f78f7f88e8180dd2e0f39b9c7590ee961b248c94aad3dff7315f02b24f1f0e9b4b5c9c2385e19dc27f162186568def128dd31f90f2581b81643b080b322369beaa284a1fc04e96f8b927da5b2077a94", 0xd7}, {&(0x7f0000002280)="cb620fd5c7b67ff54cf85a7af353eace011fbf92226e39df2c0a26631f371dae78857def", 0x24}, {&(0x7f00000022c0)="95d382c754ae4463f2e8d7a648b62722841a3fafefd848d1a823231c4d85cf8a059d8a756f45ad0ac102167e466c8e5a6a2d8e54b4765020113561478bad7de849130aa569b8eedd479371828f91c4b0fe7d8831e3ebcc04380660fac902e57463fed1d9927e5431549a7732ad75d79cb45480f717091d1b114ec6203b55050722c5990bb9d57d739eb730e5547f70aabf28f37496a5f6959d6917190c62fe92ff6d3800c6e36892e4c2a61cde547a28d620cccea08b07ba2b3efde99592a96ea9c1baab743d22d9a36d74a333cd08a7c3cd805f4c48a1bd136a701a4ae1bd45b4f2eddda2a1bbabe407de796d4d199e1b8a7209ae", 0xf5}, {&(0x7f00000023c0)="952be66bc08325222753f1d758f5f35c607ada230b2b205875c2586ccdf112fb40894aa0f6598c77f9e6da3c317838aaed69915d8236642b5eb2ef7f798bc417a74be014f7c8051a4de4bb9f008b187f270a19ab9c7426630695ca57c33af563c8f05584bbfaba8e9be223f7764872f4ba9b830330f083c14332768076735657cb9a886f0580191478fefbce9f1e3c634e539bdd48c4e8f29520b1f8c6d8a68c7d140270060cbc6cb301049c54176c559aaa49cf1b724eca0c114c338576a03c8b372ec2d59f50656cf42eae71cdcd446625df54207ab67cb9ca3ba05d", 0xdd}], 0x5, &(0x7f0000002540)=[{0xe0, 0x11a, 0x80000001, "52fdb81830360a63fe9ccabeeb54eeacb437b08b1d5e2cd02827aa4c8db40cb597fb9eaa924af5a9a31e9c014a18b6093dc1d3e4853dacd33230add86eb973d81fef27ade5e30dec9cfb43fc028b6380ee39f3cd831134f46c58fe1aab54ffe7d9f47e1701764d00d38aea73542d10c6c663ab4f9cd5839f298cc41cf8da1792ab727f5856b1c8fbcc7221dc12b521d2e64e90449ddebe9f51b6c00ec7e0bcecefbc206019cdb006b6710e737ea68c4f82156f5d7584b5e268f641d13ca82b57617ec684d3118684ff98d06c6a"}, {0x58, 0x113, 0x1f, "981e58c22e0ae325c604cbd19126ae60704b76ed19c17526c57aeae855b5eb0090767fbe9f7f63465a33fe7d8939038e6230c2362531a8bb64f8f34db69a4d2470619b"}, {0x58, 0x0, 0x3, "6fdf0449ae7da1d222ae80db55230259d6d048de3e36c70aab0bd2617e7ae3ad88f2b150060038549c3c3ad2246791e4c1505428367eb888b0f579402290f59eb18a"}, {0xd8, 0x0, 0x9, "09959ad11343e8e10d83f9ac12c7450569bbbac00bca77f88ecb49e53adf5046e583bd6dc0e1a051be5459e91ac2edf1534b1ff97ead2e3b41d6b5e11fc1b6603677b3d4c8acfae2a8cfbb8c5c5839468cdb9a9596688f2f51578e5947670600ee9157e28f742895417fb9266c4e8d28007ef2349f0c11a33b341ce09bf4a58a5a981c5c976b1995b4e18a5fefeb148f144401de383cf09234c4796915de5177291e00bf7c928ca90a9b1e9d76382acefdd3d04e8ef8ff696996be2ca76e0b8c126512d42a7a"}, {0x10, 0x109, 0x1}], 0x278, 0x20000040}, 0x10001}, {{&(0x7f00000027c0)=@nl=@kern={0x10, 0x0, 0x0, 0x4000}, 0x80, &(0x7f0000002c00)=[{&(0x7f0000002840)="80310163a292664209e3098ccfdd7fc21accb453c4003ca4dd9fa12e77d21b12fddd5a18d50b06ff5042ea5e043445635e3991852b20fbf62a7d4f422a8f9e4549764a2bbe782254f3522965d5ab6b53a3ee8deeba9855eca6256de08d3eec7c90e222a79a", 0x65}, {&(0x7f00000028c0)="8c73c09e392bf6cad63ff9fab632ba2ee08969ff0cf086ea316beb2f59de1cab51227f98ab6011af38403c2462b4a095382170600f4f0f37d17dcbb1f4f2f52aa77bb1917a16b97d75641b204b26f0fddd957864122ab35e53bdf1d3fa2a054aa5bd09a8d9a8e584938d1811a9a26c8b07a7c2604e3db841db2f03430187ee805ab15130531631e4655029ff12255febfcd03c77216c920cbc1e69b6b6dfd8b35201382e0563e006ef9e84bf639365c88c74b29f6d85c32a355c68f024b45f5dfbfd698e14c517158bf10227099577de", 0xd0}, {&(0x7f00000029c0)="d01e4081078d1c34a718d0bbf32ba702fddecdbc0d3c2738fac7512cf7ccbe902d254ecc678f2ca4f816c36c732106e11f668f7182dd9e07809084610c7107c23ac933d4fd0a0ebe20067dafdeccf5258fd2bbc6b192b5a8647afaa3c3578aa268641c69ced190d991fb79bb9dba582613c4ac2e488de500b80d87aad314eb5ddce8092deb82296f46c4ef07b24c5517dc043facbf4ac7e3ed422a89834db1abbdf83a308b74f9bc225a9063c8", 0xad}, {&(0x7f0000002a80)="95cfc3de4172574eedd33f781d688a75ff3cabc97073c84f7ee6dde09c844ed7115f51bb234bcb48adb19d7a2f48ed92a378614d06225c987c488f5b8231db00b642b0723ed3522235c5d187e2e006cb068a7cf4279a41902993dc10087885a67909c2c664e8700bd25a1071c56e75008ead2dc0562273bd58395d69e49339d6a299baf42b4c29aaf8584bdbc4a918fea5834ede628c95da7c61986690670bc24aad98ce671a61694750a5329eabd5f77275d1fc4a65f7db2cf3903972c5174addcbce3ac7d522757f667fb6111189617e93f451ea1bc51dc7", 0xd9}, {&(0x7f0000002b80)="a75b7b6087acfb151400f8c1c12269fdf6aa3593d6bf17e8f5c697f0b6b21246214634d570304469594bdfc3b536e0840e30f901f949f6de13ed7943d51a9ec8316d480f052791b6c283eee82d6b9e3103d09a62e44f75717b6f829e893980ab", 0x60}], 0x5, &(0x7f0000002c80)=[{0x1010, 0x117, 0xd1b7, "c70e3882c31691ed2a80af812679c65876633bb81c37de93250bff92b928a6026ff37455e3f12b2e5970a58f758910f04a78c07638bdb390a15c121241189df1cfac1fae89410740b855828612e97c003a21a41668349713f5781887dca36b2edd6e8fb99268ed19d5f53795105f206125c952d7f451428e0a878c2fd5f345bd313f84a778021a9ba15602c66d962aec2932186b81e42365d4c8b9cc9d58a7c1b3cd8223c1762fea110a067fe129e7acd5762bb96591d2afa6584c991a2d0ce9e49dbf78d89560d3281d709d46325940aceb51280d0da20d5b7b5e448e2725720581336de2109be4ad05185874308e38b61cf07ac053b51e3aba4982767cab354bce2b996894868295a785710c0b1d55faa0e7ce5286f5d25f82ce9c5465f1e4c000d93bf4c8014f06ee5b7e7996094387becb86b534ad4e7a25b8534013033f38370a64ee9a0abab3fdf58e5bd0731f22aaadd5f139b446130a78b84be4705fe141edaba0e528beae3608421bb9b373a7631509c3552f520246010aef21d0e6cf9acae185221199b17e44e568335d29506b16264133f745e8cb01fb1eb972ee954231beeecfc285f16aa2362e36be3728bf8fccd05a44970572734ed0875b8658ab6e9e2e378e1d149d33798cab677eaffce89c43a7cf27a94a92f003c6e96a51354ccfbb015f8d2821982667eece81ee6609df69f8249bdd6ec63bc27127386e49f3af91a9497bb62b70fc94bc9df16a213e5cddd2eed262595cbc52911a4e4efc9a30c53199e34ca357e83a1c975f2cd00601cdab8a843def1bc71dab9ad9deeaa21afc27af1cd018aef2d3ecdb83b927e3a6b140a53d4569e7a61b4d023b2d5b2d70ec8227dfc7c28c9f32123de6c31cf90ae27f784dcaaec9c26bc2bc23671bb9f8fbee8488c2a7d6769300111a5e9010029e39b3b2f5c39086fd05252cd570199f674973af9b6b5114e49bb9ad10395899f285e3b7fd0af17fd999649ca6b8792235be731a8d3c0884aef0e88150aa8263ef71c598a5a1cd096cd26898be33a4619e5d42717eab1100872eb2139d6aa0cdb4de663356e2ed367e0eb0824e7189cb5599e236a6e4eea864aa1efcaf9a0358406458f0d303c48b29a0a6828f299917f13ea617efd2f6a2eeabd2c63aa024a73e673ef55eaae8e510608f9ce1603de81168903789554790f7ace450f6ce64636eb146e9d71a9a246e7e212751e5c04c3b37c23be4cbdaf4b239a2fddb15297ff7e2558761955fe00424f6fee69c58eed2e3ce7f3c252d4259740543e132a26f2ca83dfeae7bfb178a963f4a5269f5ff9da9f366b0eb51eb57712547d683460ad91b9087ba13239df855fb9aeefde5f97f1a4491ee064c0d398d0c0b00bcc23c77641075618e47f8a57ed7b81c1a8c0885010a7716e986353dc9fbb903d459e59595a32a3c80a730b9f91c4755cf288f9c7764589df8181c6c3d46d842de3e59259a30e8a81a32be2fc03076a81d38318fce826c8e077c5136911f557e78c5ddbec1654f6282c3fa69d81624fc8670e0a89df56716f7d14fd4dee27e02ea40a7e036046ea550900a011ee4529ae97df60cb72dfd1547162fe10c708b4990429e1e2a0a259440872c86cc88f1fa7546eeb090c5a12bb87e9afd9b8323ceec9e259a5c680b6f58ec4aedf34ee32d844c9e96dcc50e175d6ece04661af9713510a63f43e639cf98916d3959ac53a303f3338d00fa574a47b355af353bbeb7e807c778f7680e3fb8c8b8cff5b17327b9b4bd2bfcedd31d3804daf8b69935482d1d2b4138b4003aa770833b62f6d1291d73c02f09453e958e948bcb72a62d81ad691a157f2e62628f78f2b5d1d9ed91bb00731799b5be25b19ee0af184180212b8128a25567270d5b11e9239f29dd8822da643b0132e4fa73824b291bebb48e9d5424be0fd14b4a042e4f5e846131ef8bb69540c36cab5293f8f5b4201b94ec9d41be5a64a80100d9d240cf878e00b5e2a733ddc441faf88be376d85992c2911e1c8456ef86244c139e8efb8c3865830cd4b08d2b94f261b6e8e4f6d14444b292e8ba4fddc69c28b281dd4d268d6cdf32814bde027eca04aa8d43a7db578768cd83eb15e2875cecaa27b77aa633225b0fd7daab4677a4346cfb212dd53993a5c929e16569fa9b4e194f8f703701ec9f3e2cbad4349e65eb8b93c7f560aacc5470274cdcbf900052b92b8de0c60d952a66a6e83459111d68af9cb280c2ddd9aa53f878d8280f164c6ca9445f86d05e9aad33062aadcc7e1194914eb31f582db1e10870f9de2c6f64a1a33b4445634083b62cf09b22676e4463219b8da55da30f2de5dc3071ab15c5855228b5e496c3b225cfd18ddcd136087d2a09d1eedc0d797bc065f54313a37cbb864c4eee7d8f4901ffc5224c579d1c1d62726ddd0a3b50c3b3b5e692993a42f2c1ea03db24df2d2f88f4717ddadbe33fe162e9beb2d7fc21d0a076e827120b8bd713102fcd51fcafbc347bdb83b3156b442553fdca020ef93471371452e6fd21b7e8157bb96717f268bfbe2b7711f9bce753f58b317222afe46cfebb6e6efd7df9cc21a1b44dd048a3b44dd716db47050fdbc21c85c47d322e1fe09c6851d631686ba7313504935e112474c5fb2d4e5146a1fbf9bc198bb7d9753fdeae07258118ccb0a9f0824a25a137793e1dc1fef92d6faeeb72e5eeecd14270ca84cafdbd55d66c6793ee5f10a1fd75e52fd1c664660140f764b8ee334e7227f404df9219664ea8fbcc643053dffb6628270e16fe06af6839a20c2c9d26bdd4f398a1a24b6dc1f6cf0efac60659f478533debce3be7750a1e6f117d6feee3591a7edbb5b680b1e978be67b9a355ad65b7e21f9eef01af6da3f25e701934132402ffcfc6b3fa3fb18c624d0ee3a9c29dcb06b39de505aeba5abf6bf9ffacb89d84c7a0c47a9a357a83f810a4a3fbc26f7c8672188ac1a0a878281d1b5433b897d53303856ebd8982f63ee0d3540dda6557419cbdd1529541e1c4dbcebc40778d6f614a469ee0b7d9fce65b57b772adaade439a93b8490d2d5b7644f272727ef70a3f6f7b29860e36bb809d4c95d5059c82e8ed799a6fd69949413d425889792584fc7b3d6fa9c6881155ff652239781ff472157323671a6d00297e4538c3d9da92978cb0ba3a4bf5cc7a26c2598dc2e03c62dd04c3e6fa6654731d27ace28a652369027120639d59a1e221374c417bc02a508658e0bf529fc68637e27a094af1785b5fdb253b4f9dea323b606fdf565f7b9f1cec2926681cbcc7b211c2999054360648a55ed00889df39ed9b82f41e357760abe0a5dd83f32c5af432754472ab968e91fdef9ed1d075ca25ccd789af931a88486ec99311874cf94dd907c644eeb73e3ebe75ba6810fa48dccd377cfea205815a072ef2d5420a6f080b3b247069184c41178c846baee1a8468d9627c0550de586758b04492abb7ffdd07bb4b5a204d3be1ee1051707ce4ed49b547cfe3f21b14acc8411a4bf442ae0b73f977957cefb98978cef18c35d8374a4e7703d18f7549585dd2ae93668b16912939bfe8c65065f9a5a9a5261f942d32ec9a9586f94f52f67d722a494be59d05485bf6870c40ae2a0bf2e674e6c2ab68bc2766f721887725ee2d4a48940f65fd8872db34af81d416759ea1c372bb78eb96bb611e49122d4838dd3da27f8f0b75c89654d38b35215616056c7fcb29314988723a9298eb62d80ff9e0b75c2d43a3f00eaadb193ea4ffc6909459dea9a083083ca6310f46adb24c32375c2cf6541dc7aef1a836aa645d5a1636c593a1b13ac07fe93edef8a64ccd82d2de4d7ffc39bc14fbe9588116bf432148740689c5352dd551a0ce4a19090717646f8ccaa1d91dccb0a6da06bf8e9ad3beaa1a6a082982aec41579b688e51e1991d7339a276e7166568485767d0bf0beb61a4b706fdfee7993780755380f90a30339ca236852bb742cfdd6b10329f109daab6eabebff38efddf5de3da7e0608d99c6877eb70ef4f9b50020aa4372c982dca700366b9b866490df0acd521054d545170ab48df3a9cf51c354d9493f4e72a2d7b091927039e042578883aabf521b3f68d82ea768ea1d1142284ed9252bc4e3cf6a7fe35a91e574a2951b0d77822d12602649dabcac9141e99163d103af4ccac54fcbd00c4d0982491e31586ebb2255798b32f4e88f079aa2a7c8088546baafda2aefdcc9b2470e2d91dd1803588439cd339b5765a182144d14b225f064ada874141a978540eda6e0feffb7226db837ef510aeacbebc9b5559a3dc7f1bd64c48ff1c80300c0ed6bb762ddddd5bc455161c24b5d678b39d3c3c53337262ff213802eb77d2d9a7b581f08fb6ddb6b0b55defe0cb75fe8a0754ad587b710af6219dfaebec8f57608db348579f2a1557826433226c794d5365d573f60b6f7b9fa0b54ab37e77a8e4f464b12a7dfc6b168cbeecd4da6eacc30774ea826bdb6a23890163b83975380411442da9f74c742761d77dec06d6bcd6d1a14246931831633e0951b9f2561681dbf9b0bbeac19d0dcef3a445b31a8a291dd0d8e4f877e7427a21092cc8c8d5ac9aa338e1a90187f3761fc076e83ccd86d12276c46dcde93ecee0866d41e6f9247b32393c26472329bf9d57a68385f244285dd8b634d0138948dcb911245ab4bd508845e408a8584803301ffee01bf15bcd6c448799d20f704b957fb97707b3cecdaa20dde4c3e3d9461a05ad0809afa5b223225c879f8af29b56038f6363a0ebcc5eef15e7cc52a31394d79d61d3a6bdc8d50ab0275f3501b8271b391f6b61e68ae54bc7760579acd23d588138a92feab4d1d0c15d1c0c08c142a9aa93cdfdaaa26457c40072e344c0f1784e2828c5d355144ed1e123e5a1f1d2dbe3a6bf3c05e4c14d1767986685b4afb49a982df20b9d1047454fdfa9c73b4afcbe6cb7b88e4f95591290ed999a3808a4f3a2576aa7c0bc282673fbbed52f6dc7beab915a24d0fa74269ce5efbb64d04523190cb00e431548764d603cefd5149914a747558b69ba41ee3d208338e0e190e95fad4b2e677a04c66c5c130346a5df1cca7b40623ea78a1507ce5a530c1fce352fd21fd5129ff5433deb0ebe60875bae255d178913c1121dcead7b0d719066b23c21203c402502cc9502a29feb12b157cd6ee27d783f03e78d82238b17d54bd00f981efe22c7397e39d8059be4d528d0541251e56ca461869f13cdc166b0237420925704ff4fbdd3360a6805e1badc65dd7f8952879e6beefcf67b670624f4485df312a1db58b85987e337063bff6333114011e7704f3ac441baf63586271fd62d197abf033918c5edfb11229b9bc0dd69db5c7bebed651f72e7231fadad5acd9567682cc61340073ecd482ec5b68a3779308d8b08f3d13338ea6e0be37a594d2e3270735b419e39652462fe5aea0d59b13559e5d2a05baec7f3508a23071cc75997011184b46cf7e3f10c2934928c101b28f79b084bdb1b8a6114ce5bb72ede3318a240e7ec7747eee237c4ea2aa28a0df0de70c485090b74ee4ba5d00b119173bec9b0e9bcc69cb99df26e20968ec3d7c366eca843a41e421db24bb5e98231d903b703088e00e82629066818693f86d7c07d2463ee65a49f88ae7b9ab8573e38833d5227914e924d32f7338e215e13b3bed99d87261f2f5f018f0a4494809cdd402bc5b9401197e14dc3b7772fd1b3a32ac41c245bfe1837d13fd21314eae8052eaeb1903abf4743578914f28890008dd16d4cee132ba89fa453fdde7a5023646c3c2b9c4f392012e1b2a955df39c604e7"}], 0x1010, 0x4080}, 0x513}, {{&(0x7f0000003cc0)=@l2={0x1f, 0x4, {0x3f, 0x3, 0x1, 0x15, 0xe3d1, 0x218b}, 0x8000, 0x4}, 0x80, &(0x7f0000004100)=[{&(0x7f0000003d40)="dab468721b18a57a130137581f46ebc94b756888f1924baf28db0db321075773d2cd6a14f0fe8defcb", 0x29}, {&(0x7f0000003d80)="f799788b9d86e20951db12d31097a78ff18dcbc51baccf96a23777f87e1b7ca8f8fcbe4966bafaa742289a8e4b1024ac1b00b6912a79dc1570bd0f09daf16dabd2bcfc64c1a55808649c73df6c64d5ae2e25976a1ac7b0abae0f29679aa3f245fb2ec36ce12e34239fd6218cf079c7688e80364ffb28bb3ebfbf8f39e6d1eef39f7348a4a66db28bd7ab8ffc41ad62637653ac7bd713", 0x96}, {&(0x7f0000003e40)="081638d074b666e07ea6c4f9217a422a39215b37c6db468b0c97c807071a39b6cda6762d52b85b30c2e082e54d001ad62501712884b12fd6aa583f2f8284fa13ead134643b41fa0796fdfe4d996340d9ca707502b3d3c437903ef1e646771369b8131499687782730fc5a6bcc46bb5be773d25911affe7e68d93a1c467b911431d1f36ca01efcbbf313175b83d639bb1cd6621a29b09286c8669c14353712fe8f3e8f8a59fdd83e375cbe97357c6337907dfdda6979dc93112bf654009dfe875bab0525d619e3ed866322e266b02eed9b2162793a7207bb2c21f92", 0xdb}, {&(0x7f0000003f40)="86cebdd11b70dae42eb24ba5e1a7c79e8e76ed36f24db097fa84accd3dfb6ec3d6ccb31ae2ef247cde8aa38f3b0ced8c6ff4c89fc08d68a2285a90a49bca1ff83ab214690b347021aee1743abe2703c64f5e913fe298ffbd52452c9d0ece9610f5a0bf2a22dfec78a7159c12d6f48e68a396dcc59427149e0146e1c85606b4a1c88a3f99657673df6384e014aae0ecad15219932380bff5f31d1352fe1d29f98cc48886be8379e47c11cb31dc945f2869035d89408012b95d71555633d2c9e92f1cb0dcde50c9cb59d41818ccd548b8fc9", 0xd1}, {&(0x7f0000004040)="da8634a7ce7bea37047d235d452530486a066dcd725533c1cb8a4a02c6ece93951cc8362f4092e306632f74ad23a989111290fa6af23c873af8069f86dcb2e11e56caabceb08dacd4b5c72d1417aa3e7ab45fc27a205a65769caa2bc131cde31508ec25c89528db9c926a526b43c1ba2d7c827270c946d56bf6707ac4e2d5e51ea8b9824e9e81770f4700d232b828d1d50cf1c7ed1ac45e5a0e6b37503c381786ab91f2199da0b8befbf52cba2e27f9ff2fe649cca04e1c4", 0xb8}], 0x5, &(0x7f0000004180)=[{0x1010, 0x184, 0x8, "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"}, {0xa8, 0x10d, 0x0, "1651c9aacc28a081b39c6f01c57533cc9cdb7edea04ff3b305b3679cd713655986efe526295229174d71bdb9300a2ef15e286bebe6f1cb8842e4781da8da424dc90e9b9e794fadb6c9944ddbcf4ce17282d9613d443448ea83ce9d1f760f1befacbd66f52fbc155050ebd69533c72304fd3f564510925e938d20f06d589463d860d749c4daf1378522f91e39106b08b21eb1d300815c"}, {0xb0, 0x102, 0x5, "463ba4f33c67c8b5a2c5fb8f13798d538014532b112874215218317ba3f0ca31473ed7743d252ae02385bb37d3da4cba99e96f79194c6b09caea448611f194640aa17686645f8fc3c3641f32dfd06355a62fdfe3f7f09023b5bbc0ce758c2915f157c523c0ebcc01bf27520e24136396262947190e8ee39bab782f1430b7bdbb50ec57709daa652f34e27efabe98355fb74af38793b633eb92b8c537774b5a"}, {0xb8, 0x116, 0x10001, "eda43802977e36d64c57a0eccc87894a0b9097c62118fb74ef033e042fd66d17ec40c27659e96a41a7458afd1478307bfe8707edeb5f617809faf16ffe98e22cbcb239a592d95325fc3dc92badfb677f11357731b9e65403d14cc71c99fb213e2f66f461c5673cf824f46f85ecef9dbe6319f6891504843db689f5d844a54e81bc809c8a15d465421a2fa2aa2d935eb9933fcd67164f0bf6a910ec55d910cc70d610bb6b73be73b9"}, {0x1010, 0x110, 0x4, "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"}, {0x1010, 0x88, 0xfffffffffffeffff, "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"}, {0xe8, 0x10d, 0x7ea, "e0c2277f67c45f9f8c42d1ca07497941cac8865502871ebea77d9525b6f88f25a68b1a320f2e8fc32c72e28fa89252662900e4742b53fabc4f6a45b408332725f6f62a3e2ccf7293456c0eb1a2cc022541405ae057983df3e67bc92b7d964e7df21c792b5e38ced895dc50c522d85ed5288ea500b1a8000673aead6df90e87c2ab4ab9c43e1f34f2f17c05456b573e1003743644c06974b319f05435d624265ff67ac69cb731957dfd83b7479a35f61d0fe2fad6f01d4e7e1d374ddde0d47ec4bcc4bacaf856297e072c7ee68971b4c4f5ca"}], 0x3328, 0x4000000}, 0x2}], 0x6, 0x8001) ioctl$sock_SIOCBRADDBR(r2, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) getsockopt$bt_hci(r0, 0x0, 0x2, &(0x7f0000000140), &(0x7f00000001c0)) fcntl$addseals(r2, 0x409, 0xd) ioctl$sock_SIOCBRDELBR(r2, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0x2db) [ 403.527990] device team0 entered promiscuous mode [ 403.533094] device team_slave_0 entered promiscuous mode [ 403.538874] device team_slave_1 entered promiscuous mode 21:19:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000340)='/dev/full\x00', 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000380)=0x6463f9df, 0x4) ioctl(r0, 0x20, &(0x7f00000001c0)="1525fc362dbf036d0cb60460c47acc9f0f4c138dc30538c2c285be074d816fe0e83d1fc5cbf42f27f172404e19d85e56334317eb3c622b1d5fc4bc99695f2aa32de482980836f2539ae4aa7a0e7adc8b5f19b3134c42f54055a5699cf31494b983027eedaa37cd957d105a5eca7b6f2c7ac9237b4423e02fde7d5c7639f2d4be2e8681b6a4a8d4402446b0eb88a271813b237b1690fd67de862dccda01c9f84c4961cb0396c8386b2473fdea4bfd583cc87601701c63ed7d91b4630a5a7e4f678a5930319ab969b0cf602698be6ca27d0c10cbd6149dfc97e0cc3ba2d67c41b9aba67e3ef249") mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 403.621629] 8021q: adding VLAN 0 to HW filter on device team0 [ 403.657075] device team0 left promiscuous mode [ 403.661943] device team_slave_0 left promiscuous mode [ 403.668608] device team_slave_1 left promiscuous mode [ 404.396497] device team0 entered promiscuous mode [ 404.401491] device team_slave_0 entered promiscuous mode [ 404.407324] device team_slave_1 entered promiscuous mode [ 404.414823] 8021q: adding VLAN 0 to HW filter on device team0 [ 404.424394] device team0 left promiscuous mode [ 404.429095] device team_slave_0 left promiscuous mode [ 404.434601] device team_slave_1 left promiscuous mode 21:19:12 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f00004c6f8b)='mounts\x00') unlink(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f0000000300)='ramfs\x00', 0x1, &(0x7f00000007c0)) preadv(r0, &(0x7f00000023c0)=[{&(0x7f00000012c0)=""/4096, 0x1000}], 0x1, 0x0) [ 404.456356] device team0 entered promiscuous mode [ 404.461317] device team_slave_0 entered promiscuous mode [ 404.467183] device team_slave_1 entered promiscuous mode [ 404.494424] 8021q: adding VLAN 0 to HW filter on device team0 [ 404.505531] device veth0_to_bridge left promiscuous mode [ 404.517420] device team0 left promiscuous mode [ 404.522232] device team_slave_0 left promiscuous mode [ 404.527819] device team_slave_1 left promiscuous mode 21:19:12 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:12 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) socket$netlink(0x10, 0x3, 0x4) write(r0, &(0x7f0000000080)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0xfffffffffffffdc8) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r2, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:12 executing program 4: recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000)=@generic, 0x80, &(0x7f0000000240), 0x0, &(0x7f0000000400)=""/4096, 0x1000}}], 0x1, 0x0, &(0x7f0000003280)) readahead(0xffffffffffffffff, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/if_inet6\x00') preadv(r0, &(0x7f00000017c0), 0x0, 0x0) fcntl$addseals(r0, 0x409, 0x9) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x10040, 0x0) 21:19:12 executing program 4: unshare(0x20400) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000000)=""/44, &(0x7f0000000040)=0x2c) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) write$P9_RATTACH(r1, &(0x7f00000000c0)={0x14, 0x69, 0x1, {0x80, 0x3, 0x5}}, 0x14) [ 404.952542] device team0 entered promiscuous mode [ 404.957631] device team_slave_0 entered promiscuous mode [ 404.963427] device team_slave_1 entered promiscuous mode [ 404.974279] 8021q: adding VLAN 0 to HW filter on device team0 [ 404.991501] device team0 left promiscuous mode [ 404.996335] device team_slave_0 left promiscuous mode [ 405.001867] device team_slave_1 left promiscuous mode 21:19:13 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = userfaultfd(0x0) ioctl$UFFDIO_API(r3, 0xc018aa3f, &(0x7f0000000580)) ioctl$UFFDIO_REGISTER(r3, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r2, &(0x7f0000011fd2), 0xffffffee) ioctl$SG_GET_LOW_DMA(r2, 0x227a, &(0x7f0000000000)) fcntl$getflags(r2, 0x408) dup2(r1, r3) 21:19:13 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x7, 0x0, 0x0, 0x0, 0x4, 0x0, 0x81, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x1, 0xffffffffffffffff, 0x0, 0x8, 0xffff, 0x2}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0xfffffffffffffe46) r0 = socket(0x10, 0x802, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/loop-control\x00', 0x438100, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ppp\x00', 0x80, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000280)={0xffffffffffffffff}, 0x13f, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000380)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e22, 0x0, @mcast1, 0x80000001}, r2}}, 0x30) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 405.310250] device team0 entered promiscuous mode [ 405.315283] device team_slave_0 entered promiscuous mode [ 405.321193] device team_slave_1 entered promiscuous mode [ 405.328943] 8021q: adding VLAN 0 to HW filter on device team0 [ 405.348887] device team0 left promiscuous mode [ 405.353821] device team_slave_0 left promiscuous mode 21:19:13 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6(0xa, 0x805, 0x10001) ioctl(r0, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x3, 0x84) connect$inet6(r1, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x9}, 0x1c) sendmsg(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000300)="bac0466bbe25556e9de99f7b0700c2f2", 0x10}], 0x1, &(0x7f0000000100)}, 0x0) pkey_alloc(0x0, 0x1) [ 405.359331] device team_slave_1 left promiscuous mode [ 405.632878] device team0 entered promiscuous mode [ 405.638146] device team_slave_0 entered promiscuous mode [ 405.643942] device team_slave_1 entered promiscuous mode [ 405.651468] 8021q: adding VLAN 0 to HW filter on device team0 [ 405.659388] device veth0_to_bridge entered promiscuous mode [ 405.667208] device team0 left promiscuous mode [ 405.671982] device team_slave_0 left promiscuous mode [ 405.677548] device team_slave_1 left promiscuous mode 21:19:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/ppp\x00', 0x80000, 0x0) bind$vsock_dgram(r0, &(0x7f0000000200), 0x10) r1 = request_key(&(0x7f0000000280)='syzkaller\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000380)='\x00', 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000700)="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", 0x21b, r1) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_bt_hidp_HIDPCONNDEL(r2, 0x400448c9, &(0x7f0000000240)={{0x81, 0x0, 0x7a, 0xfffffffffffffff9, 0x7f, 0x10000}, 0x6}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 405.690137] device team0 entered promiscuous mode [ 405.695169] device team_slave_0 entered promiscuous mode [ 405.700984] device team_slave_1 entered promiscuous mode [ 405.711141] 8021q: adding VLAN 0 to HW filter on device team0 [ 405.722065] device team0 left promiscuous mode [ 405.727214] device team_slave_0 left promiscuous mode [ 405.734376] device team_slave_1 left promiscuous mode [ 406.174112] device team0 entered promiscuous mode [ 406.179294] device team_slave_0 entered promiscuous mode [ 406.185145] device team_slave_1 entered promiscuous mode [ 406.192739] 8021q: adding VLAN 0 to HW filter on device team0 [ 406.210180] device team0 left promiscuous mode [ 406.214944] device team_slave_0 left promiscuous mode [ 406.220453] device team_slave_1 left promiscuous mode [ 406.228251] device team0 entered promiscuous mode [ 406.233408] device team_slave_0 entered promiscuous mode [ 406.239231] device team_slave_1 entered promiscuous mode [ 406.247822] 8021q: adding VLAN 0 to HW filter on device team0 [ 406.259970] device veth0_to_bridge left promiscuous mode [ 406.266794] device team0 left promiscuous mode 21:19:14 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x100000}}, 0xa0) [ 406.271533] device team_slave_0 left promiscuous mode [ 406.277082] device team_slave_1 left promiscuous mode 21:19:14 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) poll(&(0x7f0000000080)=[{r0, 0x22b0}, {r0, 0x400}, {r0, 0x2000}, {r0, 0x2000}, {r0, 0x2000}], 0x5, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8000000004) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) [ 406.573613] device team0 entered promiscuous mode [ 406.578629] device team_slave_0 entered promiscuous mode [ 406.584449] device team_slave_1 entered promiscuous mode [ 406.592385] 8021q: adding VLAN 0 to HW filter on device team0 [ 406.607463] device team0 left promiscuous mode [ 406.612220] device team_slave_0 left promiscuous mode [ 406.617764] device team_slave_1 left promiscuous mode 21:19:14 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x2, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x181000, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f00000000c0)={r0, r1, 0x97a3d6c89ea04218, 0x1}, 0x10) perf_event_open$cgroup(&(0x7f0000000240)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) 21:19:14 executing program 5: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x3, &(0x7f0000001000)=ANY=[@ANYBLOB="7b1af8ff0000000069a2f8ff00000000bf2000000000000095"], &(0x7f0000000100)='GPL\x00'}, 0x48) setsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000001000)={0x10000, 0x4, 0x100, 0x400}, 0x6) r1 = socket(0x11, 0x80002, 0x0) setsockopt$packet_int(r1, 0x107, 0xa, &(0x7f0000788000)=0x2, 0x4) bind$packet(r1, &(0x7f0000000480)={0x11, 0x3, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) setsockopt(r1, 0x107, 0x5, &(0x7f0000001000), 0xc5) accept4$packet(r0, &(0x7f00000000c0)={0x11, 0x0, 0x0}, &(0x7f00000001c0)=0x14, 0x80800) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000200)={@local, 0x34, r2}) syz_emit_ethernet(0x66, &(0x7f0000000140)=ANY=[@ANYBLOB="2b0000f1ff001b207f5c5e0100004500c731768ea1d6080d9078ac1814aaac1414aa342081000000000086dd080088be0000000022a28b3e10561ceb001c00002000000b0b00ecffffffffffffe2000000000800655800bfae31"], &(0x7f0000000000)) setsockopt$bt_BT_RCVMTU(r1, 0x112, 0xd, &(0x7f0000000080)=0x9, 0x2) 21:19:14 executing program 4: r0 = syz_open_dev$admmidi(&(0x7f0000000000)='/dev/admmidi#\x00', 0xe4, 0x8000) recvmsg(r0, &(0x7f0000000280)={&(0x7f0000000040)=@ethernet, 0x80, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/56, 0x38}, {&(0x7f0000000100)=""/86, 0x56}, {&(0x7f0000000180)=""/183, 0xb7}], 0x3, 0x0, 0x0, 0x685}, 0x1) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f00000002c0)=""/98) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000340)=""/4096) r1 = accept$packet(r0, &(0x7f0000001340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001380)=0x14) ioctl$EVIOCGKEY(r0, 0x80404518, &(0x7f00000013c0)=""/54) write$P9_RUNLINKAT(r0, &(0x7f0000001400)={0x7, 0x4d, 0x2}, 0x7) getsockopt$packet_buf(r0, 0x107, 0xd, &(0x7f0000001440)=""/182, &(0x7f0000001500)=0xb6) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001540)={0x0, 0x6d, "750a056c2a0354b58db9c762ce693d8c6216aa04275d3595b1816525c1c66b08ce35aed75ad58a3354e965a6dfa492cbd5d981ba9666c524998d60d33086509912781b3a39dc38efbd50984037b54ca25c47d975e3440ffc4b6a7c98b7094a2483d1f4321f8511eff5f37a0540"}, &(0x7f00000015c0)=0x75) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(r0, 0x84, 0x70, &(0x7f0000001600)={r2, @in6={{0xa, 0x4e22, 0x9, @dev={0xfe, 0x80, [], 0xd}, 0x7ff}}, [0x5c0, 0x7, 0x1, 0x8, 0x3f, 0x6, 0x0, 0x0, 0x9, 0x1, 0xb0, 0x5, 0x48, 0xfffffffffffffffa, 0x8]}, &(0x7f0000001700)=0x100) ioctl$LOOP_CHANGE_FD(r0, 0x4c06, r0) r4 = semget(0x2, 0x3, 0x21) semop(r4, &(0x7f0000001740)=[{0x0, 0x5, 0x1800}, {0x4, 0x20}, {0x3, 0x4e00b845, 0x800}, {0x2, 0x9, 0x800}], 0x4) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f0000001780)=""/39) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f00000017c0)=""/59) recvmsg$kcm(r0, &(0x7f0000001cc0)={&(0x7f0000001800)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @rand_addr}}}, 0x80, &(0x7f0000001c00)=[{&(0x7f0000001880)=""/224, 0xe0}, {&(0x7f0000001980)=""/96, 0x60}, {&(0x7f0000001a00)=""/7, 0x7}, {&(0x7f0000001a40)=""/182, 0xb6}, {&(0x7f0000001b00)=""/231, 0xe7}], 0x5, &(0x7f0000001c80)=""/40, 0x28, 0x1f}, 0x40000002) r6 = syz_open_dev$admmidi(&(0x7f0000001d00)='/dev/admmidi#\x00', 0x5, 0x80) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r1) ioctl$SCSI_IOCTL_DOORLOCK(r6, 0x5380) setsockopt$inet_sctp6_SCTP_CONTEXT(r5, 0x84, 0x11, &(0x7f0000001d40)={r3, 0x3}, 0x8) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000001dc0)={r0, 0x3, 0x1, 0xb2, &(0x7f0000001d80)}, 0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000001e00)={r2, 0xbb, "7308146f21b82a545434a8eab12e8bec412207e5c6be9cb74dfe3ad46c3e6404317e1f89bd2c21bb9be8ed73f9c3c0d0013a3a01785665665c44b6e0fa2f43b12fe6ea896bd036027df7c007d9ae6fb1ba73c8fad37fce96ea31be3db3413b5949c063c981433420bdbd0d9fa2657c11e9d8baa57fc2cf5bfae7362c5ada9a65c57d84df08e3876684c1b8a62995e67dd18fc061f280c000ae14675de05ed633f7fe013480e27b2360f1507853d5d6dd73e19e78e21036906c76ea"}, &(0x7f0000001f00)=0xc3) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) ioctl$sock_inet_SIOCGIFDSTADDR(r5, 0x8917, &(0x7f0000001f40)={'syz_tun\x00', {0x2, 0x4e20}}) ioctl$IOC_PR_RESERVE(r6, 0x401070c9, &(0x7f0000001f80)={0xffff, 0x4}) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000001fc0)={r3, 0xffffffffffff2969, 0x30}, &(0x7f0000002000)=0xc) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000002040)={{0x2, 0x4e23, @remote}, {0x306, @broadcast}, 0x2, {0x2, 0x4e21, @multicast2}, 'yam0\x00'}) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r5, 0x84, 0x1e, &(0x7f00000020c0)=0x2000, 0x4) ioctl$SG_GET_NUM_WAITING(r6, 0x227d, &(0x7f0000002100)) getsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x2, &(0x7f0000002140), &(0x7f0000002180)=0x8) [ 406.972588] device team0 entered promiscuous mode [ 406.977760] device team_slave_0 entered promiscuous mode [ 406.983546] device team_slave_1 entered promiscuous mode [ 406.998398] 8021q: adding VLAN 0 to HW filter on device team0 [ 407.011989] device team0 left promiscuous mode [ 407.016826] device team_slave_0 left promiscuous mode [ 407.022333] device team_slave_1 left promiscuous mode 21:19:15 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) ioctl$TIOCMSET(r1, 0x5418, &(0x7f0000000200)=0x9) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") r2 = accept4$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000000c0)=0x14, 0x800) getpeername$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) 21:19:15 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000411000)="bc", 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$TCXONC(r0, 0x540a, 0x1) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x80000) write$UHID_DESTROY(r2, &(0x7f0000000040), 0x4) 21:19:15 executing program 5: mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) mount(&(0x7f000000a000)='./file0\x00', &(0x7f0000026ff8)='./file0\x00', &(0x7f00000008c0)='reiserfs\x00', 0x0, &(0x7f0000000900)) r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x68800, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x4, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_DESTROY_ID(r0, &(0x7f0000000100)={0x1, 0x10, 0xfa00, {&(0x7f0000000040), r1}}, 0x18) 21:19:15 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$UI_BEGIN_FF_ERASE(r0, 0xc00c55ca, &(0x7f00000001c0)={0x4, 0x4, 0x42c1}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:15 executing program 7: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0xd88e) r1 = memfd_create(&(0x7f0000000080)='8securitvtrusted\x00', 0x3) ftruncate(r1, 0x94d) r2 = add_key(&(0x7f0000000280)='ceph\x00', &(0x7f00000002c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000300), 0x0, 0xfffffffffffffffb) r3 = add_key(&(0x7f0000000340)='encrypted\x00', &(0x7f0000000380)={0x73, 0x79, 0x7a, 0x0}, &(0x7f00000003c0)="b6cf25346b5ed405a41db48ed38d5a2eddca313729e4df4b3abc168a9d9d3a018c5370c5a731e5bb", 0x28, 0x0) openat$cgroup_type(r1, &(0x7f0000000300)='cgroup.type\x00', 0x2, 0x0) keyctl$negate(0xd, r2, 0x2, r3) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000000c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x22400}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0xac, r4, 0x104, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x5, 0x1}}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'dh\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x60, 0x2, [@IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@remote}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x4}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0xa}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xbc}]}, 0xac}, 0x1, 0x0, 0x0, 0x1}, 0x8001) fcntl$addseals(r1, 0x409, 0x4) ioctl$TCSETA(r1, 0x4030582a, &(0x7f0000760000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000000000d8}) [ 407.103449] device team0 entered promiscuous mode [ 407.108509] device team_slave_0 entered promiscuous mode [ 407.114341] device team_slave_1 entered promiscuous mode [ 407.194370] 8021q: adding VLAN 0 to HW filter on device team0 21:19:15 executing program 5: r0 = socket$can_raw(0x1d, 0x3, 0x1) unshare(0x20400) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") setsockopt(r0, 0x65, 0x5, &(0x7f0000000000), 0x4) r2 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r2, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r2, 0xffffffffffffff7f) getsockopt(r0, 0x6, 0xfff, &(0x7f00000000c0)=""/6, &(0x7f0000000100)=0x6) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) accept4(r2, 0x0, &(0x7f00000001c0), 0x0) close(r2) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000000)={0x6, {{0xa, 0x4e23, 0x400}}}, 0x88) [ 407.269312] device veth0_to_bridge entered promiscuous mode [ 407.279534] device team0 left promiscuous mode [ 407.284361] device team_slave_0 left promiscuous mode [ 407.289926] device team_slave_1 left promiscuous mode 21:19:15 executing program 7: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000200), &(0x7f0000000240)=0x4) ioctl$PPPOEIOCSFWD(r0, 0x4008b100, &(0x7f0000000040)={0x18, 0x0, {0x0, @remote, 'teql0\x00'}}) getsockname(r0, &(0x7f0000000140)=@vsock={0x28, 0x0, 0x0, @reserved}, &(0x7f00000001c0)=0x80) connect$pppoe(r0, &(0x7f0000000080)={0x18, 0x0, {0x2, @empty, 'bridge0\x00'}}, 0x1e) ioctl$TUNSETSNDBUF(r0, 0x400454d4, &(0x7f00000000c0)=0x3f) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000100)=0x4) 21:19:15 executing program 7: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x2, 0x71, 0xffffffffffffffff, 0x0) mmap(&(0x7f000081c000/0x2000)=nil, 0x2000, 0x1000001, 0xa4030, r0, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x800000, 0x3, &(0x7f0000130000/0x800000)=nil) pkey_mprotect(&(0x7f000090a000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x10000000000) [ 407.707524] device team0 left promiscuous mode [ 407.712381] device team_slave_0 left promiscuous mode [ 407.717913] device team_slave_1 left promiscuous mode 21:19:15 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000080)="72c29ca61bdc702f5680b3a725f68664acc187fef131bdb238da206d0155d9579327ab41cd2ea4d0eddc42ee834d08f97cbe908312f3e42ca540c1a1c30a0e") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) r1 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x10000) ioctl$KDDELIO(r1, 0x4b35, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$cuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/cuse\x00', 0x80200, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000200), &(0x7f0000000240)=0x4) r1 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) getsockopt$inet_mreqsrc(r1, 0x0, 0x27, &(0x7f0000000280)={@rand_addr, @broadcast, @loopback}, &(0x7f0000000340)=0xc) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000700)=ANY=[@ANYBLOB="66696c746572000000000000000000000000000000000000000000000000000007000000040000005004000030010000000000000000000068030000680300006803000004000000", @ANYPTR=&(0x7f0000000400)=ANY=[@ANYBLOB="00000000000000000000000000000000000000002590ab8445939ac0d14fe738e04900000000000000000000000000000000000000000000000000000000000084a02aa83237"], @ANYBLOB="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"], 0x4a0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 407.757382] device team0 left promiscuous mode [ 407.762490] device team_slave_0 left promiscuous mode [ 407.769481] device team_slave_1 left promiscuous mode [ 408.315117] device veth0_to_bridge left promiscuous mode [ 408.321969] device team0 entered promiscuous mode [ 408.326971] device team_slave_0 entered promiscuous mode [ 408.332882] device team_slave_1 entered promiscuous mode [ 408.342466] 8021q: adding VLAN 0 to HW filter on device team0 21:19:16 executing program 0: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x1c, 0x80000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x8001}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000002c0)={0x5, 0x0, 0x30000000000000, 0x0, r1}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) bind$vsock_stream(r0, &(0x7f0000000300)={0x28, 0x0, 0x0, @reserved}, 0x10) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r5 = socket$netlink(0x10, 0x3, 0x4) write(r5, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r6, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) [ 408.365362] device team0 entered promiscuous mode [ 408.370397] device team_slave_0 entered promiscuous mode [ 408.376483] device team_slave_1 entered promiscuous mode [ 408.438948] 8021q: adding VLAN 0 to HW filter on device team0 [ 408.451351] device team0 entered promiscuous mode [ 408.456425] device team_slave_0 entered promiscuous mode [ 408.462256] device team_slave_1 entered promiscuous mode [ 408.470681] 8021q: adding VLAN 0 to HW filter on device team0 [ 408.479465] device team0 left promiscuous mode 21:19:16 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00001f0000)='/dev/ptmx\x00', 0x1000002, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) write(r0, &(0x7f0000411000)="bc", 0x1) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCXONC(r0, 0x540a, 0x3) ioctl$TCXONC(r0, 0x540a, 0x1) r2 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x5, 0x80000) write$UHID_DESTROY(r2, &(0x7f0000000040), 0x4) [ 408.484344] device team_slave_0 left promiscuous mode [ 408.489957] device team_slave_1 left promiscuous mode [ 408.741637] device team0 entered promiscuous mode [ 408.746916] device team_slave_0 entered promiscuous mode [ 408.752703] device team_slave_1 entered promiscuous mode [ 408.760949] 8021q: adding VLAN 0 to HW filter on device team0 21:19:16 executing program 5: r0 = socket(0x400000000010, 0x3, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85715070") syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x800) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000480)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={"6272696467655f736c7f43655f5600", 0x6}) poll(&(0x7f00000001c0)=[{r1}, {r1}], 0x2, 0x80) [ 408.787560] device veth0_to_bridge entered promiscuous mode [ 408.796480] device team0 left promiscuous mode [ 408.801269] device team_slave_0 left promiscuous mode [ 408.806795] device team_slave_1 left promiscuous mode [ 408.829204] device team0 entered promiscuous mode [ 408.834371] device team_slave_0 entered promiscuous mode [ 408.840198] device team_slave_1 entered promiscuous mode 21:19:16 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/vga_arbiter\x00', 0x101140, 0x0) r1 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000280)={&(0x7f0000000540)={0xf4, r1, 0x208, 0x70bd26, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x6c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x8001}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bpq0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @ipv4}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffff77fb1ec}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast2}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xeb}, @IPVS_CMD_ATTR_DEST={0x34, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xfff}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e23}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x9}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1f}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xff}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xfffffffffffffffc}]}, @IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x19}}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblc\x00'}]}]}, 0xf4}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:16 executing program 7: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) write$FUSE_NOTIFY_INVAL_ENTRY(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="3a003524a1112ebbaac400000000ac00270000000000000000000000000000000000"], 0x22) r1 = syz_open_dev$sndtimer(&(0x7f00000b5ff1)='/dev/snd/timer\x00', 0x0, 0x0) r2 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x6, 0x440000) connect$inet(r2, &(0x7f0000000280)={0x2, 0x4e24, @broadcast}, 0x10) r3 = request_key(&(0x7f0000000080)='ceph\x00', &(0x7f00000000c0)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000100)='/dev/snd/timer\x00', 0xfffffffffffffffe) r4 = request_key(&(0x7f00000001c0)='syzkaller\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000240)="73797374656d6b657972696e672e236e6f64657621956b657972696e6700", 0xfffffffffffffffc) keyctl$search(0xa, r3, &(0x7f0000000140)='big_key\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x3}, r4) unshare(0x20400) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x100000110, r2, 0xfffffffffffffffe) fcntl$getflags(r0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000000)) [ 408.884854] 8021q: adding VLAN 0 to HW filter on device team0 [ 408.918128] device team0 left promiscuous mode [ 408.922941] device team_slave_0 left promiscuous mode [ 408.928531] device team_slave_1 left promiscuous mode 21:19:17 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{0x0, 0xfffffffffffffffe}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000080)=0x0) sched_setattr(r2, &(0x7f00000001c0)={0x30, 0x7, 0x0, 0xffffffffffff956f, 0x1, 0x8, 0x7ff, 0x7fffffff}, 0x0) [ 409.307703] device team0 entered promiscuous mode [ 409.312796] device team_slave_0 entered promiscuous mode [ 409.318800] device team_slave_1 entered promiscuous mode [ 409.326760] 8021q: adding VLAN 0 to HW filter on device team0 [ 409.360942] device team0 left promiscuous mode [ 409.365951] device team_slave_0 left promiscuous mode [ 409.372678] device team_slave_1 left promiscuous mode 21:19:17 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000100)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/mixer\x00', 0x10800, 0x0) setsockopt$RDS_FREE_MR(r1, 0x114, 0x3, &(0x7f00000000c0)={{0x8, 0x7}}, 0x10) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") socket$inet6(0xa, 0x7, 0x0) 21:19:17 executing program 7: r0 = syz_open_dev$vcsn(&(0x7f0000000000)='/dev/vcs#\x00', 0xe79a, 0x800) execveat(r0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='proc\x00', &(0x7f00000000c0)='&+em0\x00'], &(0x7f0000000240), 0x1000) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000380)='/dev/vsock\x00', 0xa000, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, &(0x7f0000000400)) fcntl$setflags(r0, 0x2, 0x1) write$FUSE_LSEEK(r0, &(0x7f0000000200)={0x18, 0xfffffffffffffffe, 0x8, {0x1}}, 0x18) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f00000004c0)={'security\x00', 0xffffffffffffe10, [{}, {}, {}, {}, {}]}, 0x78) openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x420440, 0x0) write$P9_RLERROR(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="090002000701000000"], 0x9) accept$inet6(r1, &(0x7f00000002c0)={0xa, 0x0, 0x0, @local}, &(0x7f0000000300)=0x1c) setsockopt$RDS_CONG_MONITOR(r1, 0x114, 0x6, &(0x7f0000000240)=0x1, 0x4) write$P9_RREADDIR(r0, &(0x7f0000000340)=ANY=[], 0x0) 21:19:17 executing program 4: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x80, 0x0) write$FUSE_WRITE(r0, &(0x7f0000000080)={0x18, 0x0, 0x4, {0x1b}}, 0x18) r1 = socket$inet(0x2b, 0x1, 0x0) bind$inet(r1, &(0x7f0000000600)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000000040), 0x50212, 0x2000e803, &(0x7f0000000000)={0x2, 0x4e23}, 0x10) sendmmsg(r1, &(0x7f000000acc0)=[{{&(0x7f0000005d00)=@rc, 0x80, &(0x7f00000070c0), 0x0, &(0x7f0000007140)=ANY=[@ANYBLOB="10000800000000000000000000000000"], 0x10}}], 0x1, 0x40040) 21:19:17 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffd3b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x7d9, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(r0, 0x10000001b, &(0x7f0000000340)="d319bce4d732650493ed1fc4f93a94b2d4c920fa40aa77046d3a23a5165fb21c18b14382e42c3c45308808a39c074ebbb10d67559f43794b9bfd7639dca117fe44b8a0fb73ba613ec057013acc71d880650587013d50") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0xb, 0x802, 0x4) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:17 executing program 7: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x3) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000340)) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000000180)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$TIOCSWINSZ(r2, 0x5414, &(0x7f0000000240)={0xfffffffffffffffd, 0x10000000000100, 0x8, 0x5}) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) r3 = fcntl$dupfd(r1, 0x0, r0) setsockopt$inet6_buf(r3, 0x29, 0x37, &(0x7f0000000380)="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", 0x1000) getsockopt$inet6_IPV6_XFRM_POLICY(r3, 0x29, 0x23, &(0x7f0000001400)={{{@in=@multicast1, @in6=@ipv4={[], [], @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f0000001500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f00000001c0)={'team0\x00', r4}) socketpair$inet6_sctp(0xa, 0x5, 0x84, &(0x7f0000000080)) ioctl$sock_SIOCGIFINDEX(r2, 0xaf02, &(0x7f0000016c40)={'ip6gre0\x00'}) ppoll(&(0x7f00000000c0)=[{r1}], 0x1, &(0x7f0000000100)={0x77359400}, &(0x7f0000000140), 0x8) close(r0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x80040, 0x80) 21:19:17 executing program 4: socketpair$inet(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) recvmmsg(r1, &(0x7f0000000f40)=[{{&(0x7f0000000980)=@sco, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000a00)=""/221, 0xdd}], 0x1, &(0x7f0000000ec0)=""/79, 0x4f}}], 0x1, 0x0, &(0x7f0000001000)) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x32, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') close(r0) 21:19:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:17 executing program 4: r0 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x3, 0x0) ioctl$int_in(r0, 0x800800c0045006, &(0x7f0000000080)=0xf) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x31, 0xffffffffffffffff, 0x0) 21:19:18 executing program 4: ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(0xffffffffffffffff, 0xc0505350, &(0x7f0000000180)={{}, {}, 0x7fff, 0x6}) inotify_add_watch(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x21000500) r0 = syz_open_dev$dmmidi(&(0x7f0000001980)='/dev/dmmidi#\x00', 0x8, 0x8200) fstatfs(r0, &(0x7f0000000080)=""/83) socketpair(0x15, 0x80000, 0x3, &(0x7f00000019c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000000040)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x820200}, 0xc, &(0x7f0000001680)={&(0x7f0000001800)=ANY=[]}, 0x1, 0x0, 0x0, 0x40000}, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r2, &(0x7f0000000000), 0x282, 0x0) 21:19:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080), 0x4) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r1, 0x40044590) [ 410.320145] device team0 entered promiscuous mode [ 410.325471] device team_slave_0 entered promiscuous mode [ 410.331404] device team_slave_1 entered promiscuous mode [ 410.340782] 8021q: adding VLAN 0 to HW filter on device team0 [ 410.350226] device team0 left promiscuous mode [ 410.354988] device team_slave_0 left promiscuous mode [ 410.360570] device team_slave_1 left promiscuous mode [ 410.377190] device team0 entered promiscuous mode [ 410.382179] device team_slave_0 entered promiscuous mode [ 410.388093] device team_slave_1 entered promiscuous mode [ 410.397178] 8021q: adding VLAN 0 to HW filter on device team0 [ 410.404726] device veth0_to_bridge left promiscuous mode [ 410.421768] device team0 left promiscuous mode 21:19:18 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x2, 0x100) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000200)=ANY=[@ANYBLOB="4b56f63cadc8b1a35fd5d32b92e0d0922a1848ba48dbe48fd6b8c2be7f964829", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000100)=0x24) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000001c0)={r3, 0x4}, 0x8) r4 = socket$netlink(0x10, 0x3, 0x4) write(r4, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:18 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0x0, 0x0) r1 = dup(r0) setsockopt$inet6_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000000080), 0x4) ioctl$EVIOCGRAB(r0, 0x40044590, &(0x7f0000000000)) ioctl$TIOCSBRK(r1, 0x40044590) [ 410.426628] device team_slave_0 left promiscuous mode [ 410.432229] device team_slave_1 left promiscuous mode [ 410.778412] device team0 entered promiscuous mode [ 410.783597] device team_slave_0 entered promiscuous mode [ 410.789390] device team_slave_1 entered promiscuous mode [ 410.800305] 8021q: adding VLAN 0 to HW filter on device team0 [ 410.808565] device team0 left promiscuous mode [ 410.813318] device team_slave_0 left promiscuous mode [ 410.818852] device team_slave_1 left promiscuous mode [ 411.006705] device team0 left promiscuous mode [ 411.011453] device team_slave_0 left promiscuous mode [ 411.016961] device team_slave_1 left promiscuous mode [ 411.025368] device team0 entered promiscuous mode [ 411.030469] device team_slave_0 entered promiscuous mode [ 411.036307] device team_slave_1 entered promiscuous mode [ 411.044208] 8021q: adding VLAN 0 to HW filter on device team0 [ 411.052229] device team0 entered promiscuous mode 21:19:19 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) mount(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000300)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_int(r0, &(0x7f0000000180)='cgroup.max.descendants\x00', 0x2, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000140)='9', 0x1}], 0x1) r2 = socket$inet(0x2, 0x2000000080002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r2, 0x0, 0x80, &(0x7f0000000280)=@broute={'broute\x00', 0x20, 0x2, 0x14, [0x0, 0x0, 0x0, 0x0, 0x0, 0x200005c0], 0x0, &(0x7f0000000040), &(0x7f0000000080)=ANY=[@ANYRESDEC=r2]}, 0x8c) 21:19:19 executing program 4: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000200)=0x1c, 0x80000) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x18, &(0x7f0000000240)={0x0, 0x8001}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000002c0)={0x5, 0x0, 0x30000000000000, 0x0, r1}, 0x10) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r2, 0x107, 0x1, &(0x7f0000000000)={r3, 0x1, 0x6, @local}, 0x10) bind$vsock_stream(r0, &(0x7f0000000300)={0x28, 0x0, 0x0, @reserved}, 0x10) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r4, 0x84, 0xc, &(0x7f00000000c0), &(0x7f0000000100)=0x4) r5 = socket$netlink(0x10, 0x3, 0x4) write(r5, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r6, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:19 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000140)='bridge0\x00', 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x195) r1 = socket(0xa, 0x1, 0x0) getpeername$packet(r1, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000480)=0x14) setsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000004c0)={@mcast1, r2}, 0x14) r3 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r3, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x2a, &(0x7f0000000040)={0x2, {{0x2, 0x0, @multicast2}}}, 0xfffffffffffffd4a) setsockopt$inet_int(r0, 0x0, 0x32, &(0x7f0000000100)=0x10000000, 0x4) [ 411.057238] device team_slave_0 entered promiscuous mode [ 411.063072] device team_slave_1 entered promiscuous mode [ 411.070630] 8021q: adding VLAN 0 to HW filter on device team0 [ 411.085374] device veth0_to_bridge entered promiscuous mode 21:19:19 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f0000000540), &(0x7f0000000380), &(0x7f00000004c0)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x28000, 0x0) getsockopt$inet6_dccp_int(r1, 0x21, 0x0, &(0x7f0000000200), &(0x7f0000000240)=0x4) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) tee(r2, r1, 0x2, 0x1) r3 = msgget$private(0x0, 0x80) fcntl$setsig(r0, 0xa, 0x40) msgctl$MSG_INFO(r3, 0xc, &(0x7f00000003c0)=""/114) [ 411.129926] device team0 left promiscuous mode [ 411.134754] device team_slave_0 left promiscuous mode [ 411.140326] device team_slave_1 left promiscuous mode [ 411.210451] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 411.257709] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 411.463393] device team0 entered promiscuous mode [ 411.468926] device team_slave_0 entered promiscuous mode [ 411.474701] device team_slave_1 entered promiscuous mode [ 411.482162] 8021q: adding VLAN 0 to HW filter on device team0 [ 411.491180] device veth0_to_bridge entered promiscuous mode [ 411.503504] device team0 left promiscuous mode [ 411.508462] device team_slave_0 left promiscuous mode 21:19:19 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") fcntl$setflags(r0, 0x2, 0x1) 21:19:19 executing program 1: r0 = memfd_create(&(0x7f0000000040)='em1^proc)@vmnet1$-\x00', 0x0) setsockopt$sock_void(r0, 0x1, 0x0, 0x0, 0x0) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x2000000000}, 0x0) r1 = add_key(&(0x7f0000000880)='cifs.spnego\x00', &(0x7f00000008c0)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000900)="99dfa8fa5f8c56939482994f2f5a8e21cfa28e00fabb26e8a6f5dda795211acea0e0dd3445520ed1e810f0615071d2c6eb2cf1b52ad903143c5a3b7adb111d660833e3b40312f02f4bf94bbc069bc6825a645d58cc3ebae36694ab9d3557dcf4c2913c0144218f89bf4367433b5c4ff24c61eb445804957bad0cce44104dae1f011764d7e729abe67ac6d9433abf3ddae96eaf9e88a03f66044565cf9863f4e0810d005a96ab8e9ccf5c4f93686698d7e16afe926ea8c5b599361d1702f22d4a393c0749fb32f155b3abb43bbd4f45186541a8e5b155c04cf45eae90a29e7b2715f702e106570bff199d67ff4d80d88277", 0xf1, 0xfffffffffffffff8) add_key$user(&(0x7f0000000840)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000200), 0x0, r1) r2 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000003c0)={{{@in=@loopback, @in6=@local, 0x4e20, 0x2400, 0x4e23, 0x0, 0xa, 0xa0, 0xa0, 0x87, 0x0, r2}, {0x6, 0x3, 0x3223, 0x9, 0x100000001, 0x3ff, 0x8001, 0x7}, {0x8, 0x7, 0x3ff, 0x8}, 0x4, 0x6e6bbc, 0x3, 0x1, 0x2}, {{@in=@rand_addr=0xae4, 0x4d3, 0x7f}, 0xa, @in6=@mcast1, 0x3501, 0x3, 0x2, 0x4, 0x9, 0x8}}, 0xe8) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x13, &(0x7f0000000640)={0x0, 0x2}, &(0x7f0000000680)=0x8) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r0, 0x84, 0x7b, &(0x7f00000006c0)={r3, 0x7}, 0x8) r4 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r4, 0x84, 0x64, &(0x7f0000000300)=[@in6={0xa, 0x4e21, 0x81, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x10}}, 0x9}, @in={0x2, 0x4e22, @multicast2}, @in6={0xa, 0x4e20, 0x3bf503f2, @empty, 0x118}, @in6={0xa, 0x4e23, 0x7e, @local, 0x56ac}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x18}}, @in6={0xa, 0x4e21, 0x20, @empty, 0xff}], 0xa0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000080)={0x0, 0x3f, 0x8}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000540)={r5, 0xc0, "3081da62ac60a908b59216d37f1d8ef2a0768df8b3395566e25138f5d35d70bd9b4fbe982b070f285720298f79a76d2d95e57d3606d76b24575243eb23698bedddf1976ac0c1654db631f4f99549a2135a03195413701831266909ea68c53adc75ac92dc6caa45ea91d246d4e976f3c64a74123aacb129af767c6c8c31e858175bbd508e1176c5aa73a4fc497fe96f2b9035699424ae4454af255e77344f827fd6c467ee1653f21a2b07bd4cd5bf3d28cc72ed093a74d0e06ae3cdc6531e7e67"}, &(0x7f00000004c0)=0xc8) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r6 = socket(0x1000f, 0x805, 0xfffffffffffffffa) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:19 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet(0x2, 0x0, 0x25db) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)=ANY=[@ANYBLOB="a7a386ac0200020004000300b108"], 0xe) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000100)=""/137) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x100000000) [ 411.515717] device team_slave_1 left promiscuous mode 21:19:19 executing program 5: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$inet(0x2, 0x0, 0x25db) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f0000000080)=ANY=[@ANYBLOB="a7a386ac0200020004000300b108"], 0xe) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000040)={&(0x7f0000000000)=""/2, 0x2000, 0x800}, 0x18) r2 = openat$cuse(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cuse\x00', 0x101000, 0x0) ioctl$EVIOCGKEY(r2, 0x80404518, &(0x7f0000000100)=""/137) mmap$xdp(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x100000000) 21:19:19 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x1, 0x80400) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000080)={0x8, 0x5}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:19 executing program 5: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={&(0x7f0000000140), 0xc, &(0x7f0000000080)={&(0x7f0000000100)=@newlink={0x30, 0x10, 0xe3b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0xf, 0x12, @vti={{0x8, 0x1, 'vti\x00'}, {0x4}}}]}, 0x30}}, 0x0) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x8000, 0x0) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000000180)={{0x0, 0x0, 0xfffffffffffffc01, 0x4, 0x4}, 0x2b3, 0xe3, 0x400, 0x800, 0x7, "7924f859a751a7dadd276083b409169ad87e490cc142dba15cb90ee58d026df2882f6b949ea339913fdbccae9aa550623909cc338107939609d9dc07b5508d3e7c310e6b811424294a84537a68652ff05839468bf36c0a246ab47b98c9dd1fa5fa7b2d8cfccf680ca920c611eaca97a26ddcdc803569bf6b6b772a0ff70bc411"}) [ 412.284225] device team0 entered promiscuous mode [ 412.289375] device team_slave_0 entered promiscuous mode [ 412.295216] device team_slave_1 entered promiscuous mode [ 412.302854] 8021q: adding VLAN 0 to HW filter on device team0 [ 412.312266] device veth0_to_bridge left promiscuous mode [ 412.320659] device veth0_to_bridge left promiscuous mode [ 412.343103] device team0 left promiscuous mode [ 412.347832] device team_slave_0 left promiscuous mode [ 412.353378] device team_slave_1 left promiscuous mode 21:19:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r2 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) accept4(r2, &(0x7f0000000200)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000280)=0x80, 0x0) keyctl$reject(0x13, r1, 0xffff, 0x1, r1) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000340)={@empty, @broadcast, r3}, 0xc) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r4 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000380)={'#! ', './file0', [{0x20, 'user\x00'}], 0xa, "c95a74821376e91af27db902ed136126e1cc8f080ab09ef4b6f664736985631e5ee547c9045da8c27daa068ab58079498babe530661157951e2eb07ff4f46402e85e84a692f47b266ab5d2c28e1a80ed067681528eae965d72ec5a963e48e044b3a558701fd93f6a954636cc71bbccf029fb1818780fcb8297f778eee8e42205340fbfb2b96a190bc9883ae6a056fe496e834ac59887cc93d042720d3aa5633918"}, 0xb2) 21:19:20 executing program 4: r0 = socket$pppoe(0x18, 0x1, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f0000000000)=[@in={0x2, 0x4e22}, @in6={0xa, 0x4e23, 0x800, @loopback, 0x1aa}, @in={0x2, 0x4e24, @remote}], 0x3c) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x1e) r1 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r1, &(0x7f0000000180)={0x18, 0x0, {0x3, @local, 'syz_tun\x00'}}, 0x1e) dup3(r0, r1, 0x0) 21:19:20 executing program 7: r0 = getpgrp(0xffffffffffffffff) ptrace$peek(0x3, r0, &(0x7f0000000000)) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x0, 0xcc, &(0x7f0000002000), 0x3c) 21:19:20 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40c000, 0x182) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000000c0)={0x791f, 0x8005, 0x400, 0x200, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r3, 0x84, 0x7c, &(0x7f00000001c0)={r4, 0x1, 0x8001}, 0x8) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) openat$uhid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uhid\x00', 0x2, 0x0) [ 412.422153] netlink: 3 bytes leftover after parsing attributes in process `syz-executor5'. [ 412.444468] device team0 entered promiscuous mode [ 412.449475] device team_slave_0 entered promiscuous mode [ 412.455285] device team_slave_1 entered promiscuous mode [ 412.492401] 8021q: adding VLAN 0 to HW filter on device team0 21:19:20 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f00000001c0)='keyring\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x2}, 0x0, 0x0, 0xffffffffffffffff) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 412.535865] device team0 left promiscuous mode [ 412.540616] device team_slave_0 left promiscuous mode [ 412.546213] device team_slave_1 left promiscuous mode 21:19:20 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x3, &(0x7f00009ff000), &(0x7f00002bf000)='syzkaller\x00', 0x0, 0xffffffffffffff55, &(0x7f0000000440)=""/183}, 0x38) r0 = socket$inet6(0xa, 0x802, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f00000000c0)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f000086c000)={{&(0x7f0000068000/0x800000)=nil, 0x800000}, 0x1}) r2 = gettid() process_vm_writev(r2, &(0x7f0000c22000)=[{&(0x7f000034afa4)=""/1, 0x7ffff000}], 0x1, &(0x7f0000c22fa0)=[{&(0x7f0000000080)=""/1, 0x2034afa5}], 0x1, 0x0) write$UHID_CREATE2(r0, &(0x7f0000000140)={0xb, 'syz1\x00', 'syz1\x00', 'syz0\x00', 0x33, 0x0, 0x80000001, 0x101, 0x7, 0x9, "483ea91e463378b4a54206fd62b03fff6aa2d8fc3cc2d052324b8b9beef5ab8dc967478f192b0786f2f3e2d8aa654134fa4d49"}, 0x14b) close(r1) 21:19:21 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r0 = add_key(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x0}, &(0x7f0000000340)="aa94325f67674a8181d2537d4c9b8bacc85526baec01f25788c977228c468514dfa74d53678ab87b6df8f25df3cd0df403f92306b100b8d8b2553aefd5f46c033b9a3ca973d010420d1c3c29491b375e2aaa2525ade488d89a2f5e482847", 0x5e, 0xfffffffffffffffe) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000700)="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", 0x1cc, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 412.981317] device team0 entered promiscuous mode [ 412.986329] device team_slave_0 entered promiscuous mode [ 412.992211] device team_slave_1 entered promiscuous mode [ 413.001410] 8021q: adding VLAN 0 to HW filter on device team0 [ 413.051359] device team0 left promiscuous mode [ 413.056245] device team_slave_0 left promiscuous mode [ 413.061825] device team_slave_1 left promiscuous mode [ 413.097645] device team0 entered promiscuous mode [ 413.102872] device team_slave_0 entered promiscuous mode [ 413.108706] device team_slave_1 entered promiscuous mode [ 413.117553] 8021q: adding VLAN 0 to HW filter on device team0 [ 413.126131] device veth0_to_bridge entered promiscuous mode 21:19:21 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{0x0, 0x0, 0x20000000000000, 0x0, 0x21c13d16}, 0x5}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r1 = accept(r0, 0x0, &(0x7f0000000340)) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffff9c, 0x84, 0x7b, &(0x7f0000000380)={0x0, 0x9}, &(0x7f00000003c0)=0x8) syz_open_dev$dmmidi(&(0x7f0000000480)='/dev/dmmidi#\x00', 0x6, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000400)={r2, 0x8, 0x7, [0x7, 0x7, 0x100000000, 0xffffffff, 0x1, 0x4d, 0x4]}, &(0x7f0000000440)=0x16) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r3 = socket(0x10, 0x802, 0x0) prctl$getreaper(0x2b, &(0x7f00000004c0)) r4 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x40, 0x40) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r4, 0x5386, &(0x7f0000000080)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000001c0)={'tunl0\x00'}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:21 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) pread64(r0, &(0x7f0000000080)=""/60, 0x3c, 0x0) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x10a) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, &(0x7f0000000040)={0x1, r1}) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f0000000cc0)='\a', 0x1) [ 413.145443] device team0 left promiscuous mode [ 413.150291] device team_slave_0 left promiscuous mode [ 413.157232] device team_slave_1 left promiscuous mode 21:19:21 executing program 7: r0 = socket$inet_udplite(0x2, 0x2, 0x88) unshare(0x20400) setsockopt$inet_udp_int(r0, 0x11, 0x6f, &(0x7f0000000000)=0x1000000000, 0xffffffffffffffad) [ 414.089437] device team0 left promiscuous mode [ 414.094357] device team_slave_0 left promiscuous mode [ 414.099887] device team_slave_1 left promiscuous mode [ 414.264812] device team0 left promiscuous mode [ 414.269621] device team_slave_0 left promiscuous mode [ 414.275190] device team_slave_1 left promiscuous mode [ 414.438349] device team0 entered promiscuous mode [ 414.443353] device team_slave_0 entered promiscuous mode [ 414.449215] device team_slave_1 entered promiscuous mode [ 414.456887] 8021q: adding VLAN 0 to HW filter on device team0 [ 414.464327] device team0 entered promiscuous mode [ 414.469300] device team_slave_0 entered promiscuous mode [ 414.475182] device team_slave_1 entered promiscuous mode [ 414.482650] 8021q: adding VLAN 0 to HW filter on device team0 [ 414.495840] device team0 entered promiscuous mode [ 414.500905] device team_slave_0 entered promiscuous mode [ 414.506660] device team_slave_1 entered promiscuous mode [ 414.514260] 8021q: adding VLAN 0 to HW filter on device team0 [ 414.522477] device team0 left promiscuous mode [ 414.527220] device team_slave_0 left promiscuous mode [ 414.532847] device team_slave_1 left promiscuous mode [ 414.540580] device team0 entered promiscuous mode [ 414.545644] device team_slave_0 entered promiscuous mode [ 414.551391] device team_slave_1 entered promiscuous mode [ 414.559200] 8021q: adding VLAN 0 to HW filter on device team0 [ 414.566805] device team0 left promiscuous mode [ 414.571541] device team_slave_0 left promiscuous mode [ 414.577113] device team_slave_1 left promiscuous mode [ 414.745126] device veth0_to_bridge left promiscuous mode [ 414.751403] device team0 entered promiscuous mode [ 414.756571] device team_slave_0 entered promiscuous mode [ 414.762330] device team_slave_1 entered promiscuous mode [ 414.797497] 8021q: adding VLAN 0 to HW filter on device team0 [ 414.813344] device team0 left promiscuous mode [ 414.818156] device team_slave_0 left promiscuous mode [ 414.823723] device team_slave_1 left promiscuous mode [ 415.050211] device team0 entered promiscuous mode [ 415.055204] device team_slave_0 entered promiscuous mode [ 415.060957] device team_slave_1 entered promiscuous mode [ 415.068961] 8021q: adding VLAN 0 to HW filter on device team0 [ 415.077200] device team0 left promiscuous mode [ 415.082081] device team_slave_0 left promiscuous mode [ 415.087616] device team_slave_1 left promiscuous mode [ 415.096770] device team0 entered promiscuous mode [ 415.101823] device team_slave_0 entered promiscuous mode [ 415.107634] device team_slave_1 entered promiscuous mode [ 415.118196] 8021q: adding VLAN 0 to HW filter on device team0 21:19:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) 21:19:23 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000000)="8a5c010700315f85715070") r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_buf(r1, 0x6, 0x6, &(0x7f0000c86000), &(0x7f0000000000)=0xfffffd62) 21:19:23 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x40005cf7, 0x0, 0xffff}) 21:19:23 executing program 5: r0 = socket(0x10, 0x2, 0x0) fcntl$lock(r0, 0x6, &(0x7f0000000080)={0x0, 0x2, 0x4d5, 0x7ffffffffffffffb}) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000000)=0x0) r2 = getpgid(0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/userio\x00', 0x0, 0x0) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r0, &(0x7f00000000c0)={r3, r0, 0x6}) 21:19:23 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key$keyring(&(0x7f0000000200)='keyring\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x3}, 0x0, 0x0, 0xfffffffffffffff9) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, r0) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'veth0_to_team\x00', 0x8000000000000}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vcs\x00', 0x40600, 0x0) ioctl$TIOCLINUX4(r2, 0x541c, &(0x7f00000001c0)) 21:19:23 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f00002aafe4)={0xa, 0x4e23, 0x0, @ipv4}, 0x1c) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000080)={0x0, 0xd0f0}, &(0x7f00000000c0)=0x8) socket$inet6(0xa, 0x0, 0x2) getsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000100)={0x0, 0x7fff, 0xac9a, 0x1}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_STATUS(r0, 0x84, 0xe, &(0x7f0000000180)={r1, 0x0, 0x101, 0x7f, 0x7, 0x81, 0x1, 0x3, {r2, @in6={{0xa, 0x4e21, 0x7f, @mcast1, 0x3}}, 0x6, 0x3, 0x4, 0x7, 0x5}}, &(0x7f0000000240)=0xb0) listen(r0, 0x3) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r3, &(0x7f000087dffe)='F', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r3, 0x84, 0x7b, &(0x7f0000000000), &(0x7f0000000040)=0x8) 21:19:23 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000480)='/dev/autofs\x00', 0x80000, 0x0) ioctl$KDSETLED(r2, 0x4b32, 0x100000000) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r4 = socket(0x10, 0x802, 0x0) keyctl$read(0xb, r0, &(0x7f0000000340)=""/6, 0x6) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000001c0)={r3, @in={{0x2, 0x4e20, @rand_addr=0x998}}, 0x38d5c735, 0xffffffffffffffff, 0x3f, 0x9}, &(0x7f0000000280)=0x98) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = dup3(r4, r1, 0x80000) mq_notify(r5, &(0x7f0000000380)={0x0, 0xd, 0x0, @thr={&(0x7f0000000540)="5ab970876cd27e9d60d193cc2b823806419062a32f628feb7767b9301d292b0a704456d5151584f38815209aec721253e4578f62cd7dc354c1185a49821919aff4529945b19d7ab007a897b4a7dcf1c7800adbcee7899161073f9d0457207a05cb65cc7539e766d4dbd39031b5b678dfdefe83cf257f885a204eb69e482b5f0d870a32f82dc40f29dc3edbbba582d60192d6e719732862b7b27897195259aa1eb5e8d1de9aa254525ed5ae96f82cd4c67e3199a320041926adc171f2305e172de6c9695bb7a09d8c8c696e92bfc0f15470a801476958a7dcb3151bf2d25277f5ed08cc6905419c6ce77ffee394cc09848886646c6408c1ce7d", &(0x7f0000000700)="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"}}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:23 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) dup(0xffffffffffffff9c) syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x1, 0x400000) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @rand_addr}, &(0x7f0000000380)=0x10) r1 = accept$inet(r0, &(0x7f0000000240)={0x2, 0x0, @broadcast}, &(0x7f0000000280)=0xca) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000040)={0x0, 0x80}, 0x8) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) r3 = dup3(r1, r2, 0x80000) ioctl$RNDZAPENTCNT(r3, 0x5204, &(0x7f0000000080)=0x3a4f) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) [ 415.264991] device veth0_to_bridge entered promiscuous mode [ 415.273700] device team0 left promiscuous mode [ 415.278443] device team_slave_0 left promiscuous mode [ 415.283995] device team_slave_1 left promiscuous mode 21:19:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") fcntl$setflags(r0, 0x2, 0x1) 21:19:23 executing program 4: r0 = add_key$keyring(&(0x7f0000000240)='keyring\x00', &(0x7f00000000c0), 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000400)='keyring\x00', &(0x7f0000000a00), 0x0, 0x0, r0) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x2, &(0x7f0000000280)="025cc80700145f8f764070") r3 = add_key$keyring(&(0x7f0000000680)='keyring\x00', &(0x7f00000003c0), 0x0, 0x0, r1) shutdown(r2, 0x1) r4 = add_key$user(&(0x7f0000000300)='user\x00', &(0x7f0000000440), &(0x7f00000006c0)="01a20228947c39e9df9703014800f5e552d1a8fa86486489ac", 0x1, r3) r5 = add_key$user(&(0x7f0000000000)='user\x00', &(0x7f0000000040), &(0x7f0000000580), 0x1b8, r0) keyctl$dh_compute(0x17, &(0x7f0000000100)={r4, r5, r4}, &(0x7f0000a53ffb)=""/5, 0x5, &(0x7f0000000180)={&(0x7f0000000140)={'wp256-generic\x00'}}) 21:19:23 executing program 4: r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x8, 0xf4) setsockopt$inet6_int(r0, 0x29, 0xdc, &(0x7f00005e6000)=0x5, 0x4) sendto$inet6(r0, &(0x7f0000e13f4e), 0x0, 0x0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x1c) recvmmsg(r0, &(0x7f0000000040), 0x0, 0x2040, 0x0) 21:19:23 executing program 4: unshare(0x2000000) mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x0, 0x32, 0xffffffffffffffff, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(0xffffffffffffffff, 0x80089203, &(0x7f0000000140)) 21:19:23 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a00c80700507000000000") r1 = socket$inet6(0xa, 0x40000080806, 0x0) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0xe}}}, 0x1c) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x32, 0xffffffffffffffff, 0x0) r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x40, 0x0) statx(r2, &(0x7f00000000c0)='./file0\x00', 0x7000, 0x80, &(0x7f0000000140)) ioctl$sock_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) [ 416.019250] device team0 left promiscuous mode [ 416.024230] device team_slave_0 left promiscuous mode [ 416.030919] device team_slave_1 left promiscuous mode 21:19:24 executing program 7: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = memfd_create(&(0x7f0000000380)="812b16d50365035df9e3d1f7a6d9ed005b7e7fca9b4a84c2871367eb92987f7513680d2e399a4aa481caf07220f7d74d7346d6f8d9d37fba265a15176a12ea3480925cf9b6374e1d27", 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r1, 0x0) unshare(0x600) ioctl$TCSETSF(r0, 0xc074510c, &(0x7f0000000140)) [ 416.326221] device team0 entered promiscuous mode [ 416.331191] device team_slave_0 entered promiscuous mode [ 416.336959] device team_slave_1 entered promiscuous mode [ 416.345365] 8021q: adding VLAN 0 to HW filter on device team0 [ 416.354119] device team0 left promiscuous mode [ 416.358871] device team_slave_0 left promiscuous mode [ 416.364371] device team_slave_1 left promiscuous mode [ 416.374388] device team0 entered promiscuous mode [ 416.379382] device team_slave_0 entered promiscuous mode [ 416.385187] device team_slave_1 entered promiscuous mode [ 416.394894] 8021q: adding VLAN 0 to HW filter on device team0 [ 416.407591] device team0 entered promiscuous mode [ 416.412709] device team_slave_0 entered promiscuous mode [ 416.418526] device team_slave_1 entered promiscuous mode [ 416.444580] 8021q: adding VLAN 0 to HW filter on device team0 [ 416.463198] device veth0_to_bridge left promiscuous mode 21:19:24 executing program 4: r0 = socket$inet6(0xa, 0x80000, 0x6d) io_setup(0x1ff, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f0000000200)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0}]) r2 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x48000, 0x0) ioctl$UFFDIO_COPY(r2, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x4000, 0x1}) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000ffd000/0x1000)=nil, 0x1000}, 0x1}) io_getevents(r1, 0x0, 0x1, &(0x7f00000002c0)=[{}], &(0x7f0000000480)) 21:19:24 executing program 3: r0 = getpgrp(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000240)={0xa, 0xa54, {0x56, 0x7fff, 0x1, {0xffc, 0x4}, {0x8, 0x3}, @ramp={0x1, 0x10001, {0x8, 0x80000000, 0x3, 0xfff}}}, {0x56, 0x6, 0x0, {0xfff}, {0x2, 0x3}, @cond=[{0x1, 0x2, 0x2, 0x0, 0x6, 0x1}, {0x401, 0x9, 0x8e3, 0x1, 0x1, 0x7}]}}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:24 executing program 2: r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x40, 0x222001) setsockopt$l2tp_PPPOL2TP_SO_DEBUG(r0, 0x111, 0x1, 0x1f, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:19:24 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000080)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$inet_buf(r3, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) getsockopt$inet_buf(r0, 0x0, 0x2a, &(0x7f0000000300)=""/211, &(0x7f0000000040)=0xd3) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:24 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x9) r3 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x20, 0x101000) bind$can_raw(r3, &(0x7f00000000c0)={0x1d, r1}, 0x10) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) getsockopt$IPT_SO_GET_REVISION_TARGET(r3, 0x0, 0x43, &(0x7f0000000100)={'icmp6\x00'}, &(0x7f00000001c0)=0x1e) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000240)=0x0) ptrace$peekuser(0x3, r5, 0x3) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:24 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x101000, 0x0) r2 = dup2(r0, r0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000000200)={r1, r2, 0xa, 0x3}, 0x10) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$pptp(0x18, 0x1, 0x2) ioctl(r3, 0x100008912, &(0x7f0000000000)='\x00\x00\x00\x00\x00') accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r4 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") fcntl$setflags(r0, 0x2, 0x1) 21:19:24 executing program 7: r0 = syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x0) ppoll(&(0x7f0000000000)=[{r0}], 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f0000000280), 0x8) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r0, 0xc0a85320, &(0x7f00000001c0)={{0x80}, "706f72ff070000000000000000000000000b000000000000000000001f0000ffffff03000000ef000003ff02000000000012000000000000004000000600", 0xc7, 0x80003}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x2000000080003, 0x0) close(r0) close(r1) writev(r1, &(0x7f0000000080)=[{&(0x7f00000002c0)="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", 0x1000}], 0x1) [ 416.802246] device team0 left promiscuous mode [ 416.807076] device team_slave_0 left promiscuous mode [ 416.812616] device team_slave_1 left promiscuous mode 21:19:24 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000000)) r1 = epoll_create1(0x0) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000e4cfe0)={{&(0x7f0000012000/0x2000)=nil, 0x2000}, 0x1}) r2 = syz_open_dev$sndtimer(&(0x7f0000000140)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000040)=0x1) ioctl$SNDRV_TIMER_IOCTL_NEXT_DEVICE(r2, 0x40045402, &(0x7f0000013000)) ioctl$SNDRV_TIMER_IOCTL_SELECT(r2, 0x40345410, &(0x7f00000001c0)={{0x1}}) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f00000003c0)) ioctl$SNDRV_TIMER_IOCTL_START(r2, 0x54a0) dup3(r1, r0, 0x0) [ 416.906302] device team0 left promiscuous mode [ 416.911207] device team_slave_0 left promiscuous mode [ 416.916782] device team_slave_1 left promiscuous mode [ 416.992574] device team0 entered promiscuous mode [ 416.997747] device team_slave_0 entered promiscuous mode [ 417.003513] device team_slave_1 entered promiscuous mode [ 417.015556] 8021q: adding VLAN 0 to HW filter on device team0 [ 417.034248] device team0 left promiscuous mode 21:19:25 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="14ffffff04000000000000000000000000000000874e3d60b40924e162390fbc5ef1c408550a910c5c9cfabc3f7e2aace953966204002b4d620b61333164f18b80946a996beca68e20b54844fc8e600c27a469ceb75a4415e4c68d7ee53435e255386ea7faa201451b7ae31947f93768c4cd0db21449a5392a4688337ea0cc7d129a3b757f6ce8dd83728b52407207aa0ff985c368f67f1563484fade1ff3e27d913b0503f2c43c9e6d074"], 0x14}}, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x0, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000140)={0x1, {{0x2, 0x4e22, @loopback}}}, 0x88) [ 417.039219] device team_slave_0 left promiscuous mode [ 417.045828] device team_slave_1 left promiscuous mode 21:19:25 executing program 7: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='-cPu '], 0x5) 21:19:25 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000007c0)=0x0) r3 = geteuid() stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000000740)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x40080}, {&(0x7f0000000280)=@abs={0x1, 0x0, 0x4e24}, 0x1f5, &(0x7f0000000680), 0x0, &(0x7f00000006c0)=[@cred={0x0, 0x1, 0x2, r2, r3, r4}, @rights={0x0, 0x1, 0x1, [r1, r0, r0]}], 0x0, 0x20040800}], 0x3ff, 0x880) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) sync() recvmmsg(r0, &(0x7f00000000c0), 0x40002cc, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xb6, 0x0) 21:19:25 executing program 7: mkdir(&(0x7f0000000340)='./file0\x00', 0x0) mount(&(0x7f00000000c0)='./file0//ile0\x00', &(0x7f0000000000)='./file0\x00', &(0x7f0000000200)='cgroup2\x00', 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000080)='cgroup.subtree_control\x00', 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000040)=ANY=[@ANYBLOB='-cPu '], 0x5) 21:19:25 executing program 7: seccomp(0x1, 0x0, &(0x7f0000000100)={0x3, &(0x7f0000000040)=[{}, {0x40}, {0x2000000000000006}]}) 21:19:25 executing program 7: r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20}, 0x1c) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000f59ffc)=0x5, 0x4) r1 = socket$inet6(0xa, 0x2, 0x0) r2 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x2, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000000c0)={{{@in6=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$TUNSETOWNER(r2, 0x400454cc, r3) setsockopt$sock_int(r1, 0x1, 0xf, &(0x7f0000d1c000)=0x2c, 0x4) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev, 0x7}, 0x1c) 21:19:25 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="025cc80700145f8f764070") r1 = epoll_create(0x9) r2 = epoll_create(0x4) r3 = socket$rds(0x15, 0x5, 0x0) r4 = epoll_create(0x100000001) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r4, &(0x7f000000e000)) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r0, &(0x7f0000000000)) r5 = socket$inet6(0xa, 0x5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f000000d000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f000000dff4)) r6 = epoll_create(0xa) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000140)) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r1, &(0x7f0000c7f000)) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r4, &(0x7f0000001800)) [ 417.920626] device veth0_to_bridge entered promiscuous mode [ 417.927098] device team0 entered promiscuous mode [ 417.932285] device team_slave_0 entered promiscuous mode [ 417.938188] device team_slave_1 entered promiscuous mode [ 417.945827] 8021q: adding VLAN 0 to HW filter on device team0 [ 417.953404] device team0 entered promiscuous mode [ 417.958393] device team_slave_0 entered promiscuous mode [ 417.964235] device team_slave_1 entered promiscuous mode [ 417.971774] 8021q: adding VLAN 0 to HW filter on device team0 [ 417.991663] device team0 left promiscuous mode [ 417.996471] device team_slave_0 left promiscuous mode [ 418.002133] device team_slave_1 left promiscuous mode [ 418.010250] device team0 entered promiscuous mode [ 418.015269] device team_slave_0 entered promiscuous mode [ 418.021230] device team_slave_1 entered promiscuous mode [ 418.028896] 8021q: adding VLAN 0 to HW filter on device team0 [ 418.036986] device team0 left promiscuous mode [ 418.041803] device team_slave_0 left promiscuous mode [ 418.047377] device team_slave_1 left promiscuous mode [ 418.055505] device team0 entered promiscuous mode [ 418.060478] device team_slave_0 entered promiscuous mode [ 418.066298] device team_slave_1 entered promiscuous mode 21:19:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000240)={'raw\x00', 0xe, "554abca672771236652d1cb1ff1a"}, &(0x7f0000000280)=0x32) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f00000001c0)={&(0x7f0000ff9000/0x4000)=nil, 0x4000}, &(0x7f0000000200)=0x10) [ 418.074665] 8021q: adding VLAN 0 to HW filter on device team0 [ 418.084951] device team0 left promiscuous mode [ 418.089659] device team_slave_0 left promiscuous mode [ 418.095260] device team_slave_1 left promiscuous mode 21:19:26 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) gettid() r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 418.506800] device team0 entered promiscuous mode [ 418.511874] device team_slave_0 entered promiscuous mode [ 418.517666] device team_slave_1 entered promiscuous mode [ 418.525280] 8021q: adding VLAN 0 to HW filter on device team0 [ 418.533974] device veth0_to_bridge left promiscuous mode [ 418.572543] device team0 left promiscuous mode [ 418.577283] device team_slave_0 left promiscuous mode [ 418.582868] device team_slave_1 left promiscuous mode [ 418.631364] device team0 entered promiscuous mode [ 418.636365] device team_slave_0 entered promiscuous mode [ 418.642228] device team_slave_1 entered promiscuous mode [ 418.656738] 8021q: adding VLAN 0 to HW filter on device team0 [ 418.686515] device team0 left promiscuous mode [ 418.691338] device team_slave_0 left promiscuous mode [ 418.696929] device team_slave_1 left promiscuous mode [ 418.716830] device team0 entered promiscuous mode [ 418.721941] device team_slave_0 entered promiscuous mode [ 418.727771] device team_slave_1 entered promiscuous mode [ 418.737230] 8021q: adding VLAN 0 to HW filter on device team0 [ 418.753758] device team0 left promiscuous mode [ 418.758568] device team_slave_0 left promiscuous mode [ 418.764137] device team_slave_1 left promiscuous mode [ 418.793689] device team0 entered promiscuous mode [ 418.798727] device team_slave_0 entered promiscuous mode [ 418.804531] device team_slave_1 entered promiscuous mode [ 418.812329] 8021q: adding VLAN 0 to HW filter on device team0 [ 418.820209] device team0 left promiscuous mode [ 418.824928] device team_slave_0 left promiscuous mode [ 418.830518] device team_slave_1 left promiscuous mode 21:19:26 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x400000, 0x0) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000100)=0x924, 0x4) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000040)={'syzkaller1\x00', {0x2, 0x4e21, @local}}) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r0, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x1c, r2, 0x100, 0x70bd2d, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80}, 0x40000) kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:19:26 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f00000007c0)=0x0) r3 = geteuid() stat(&(0x7f0000000800)='./file0\x00', &(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000000740)=[{&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0x0, &(0x7f0000000140), 0x0, 0x0, 0x0, 0x40080}, {&(0x7f0000000280)=@abs={0x1, 0x0, 0x4e24}, 0x1f5, &(0x7f0000000680), 0x0, &(0x7f00000006c0)=[@cred={0x0, 0x1, 0x2, r2, r3, r4}, @rights={0x0, 0x1, 0x1, [r1, r0, r0]}], 0x0, 0x20040800}], 0x3ff, 0x880) r5 = openat$nullb(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/nullb0\x00', 0x4000000004002, 0x0) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x200000e, 0x13, r5, 0x0) sync() recvmmsg(r0, &(0x7f00000000c0), 0x40002cc, 0x0, 0x0) syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0xb6, 0x0) 21:19:26 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) syz_open_dev$evdev(&(0x7f00000001c0)='/dev/input/event#\x00', 0x180000000, 0x400) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:26 executing program 5: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) r2 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r2, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x0, @dev}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000008000)={0x0, {{0x2, 0x0, @multicast2}}}, 0x90) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, &(0x7f0000000080)={0x9, {{0x2, 0x0, @multicast2}}}, 0x88) getsockopt$inet_buf(r3, 0x0, 0x30, &(0x7f0000008000)=""/144, &(0x7f0000004000)=0x90) getsockopt$inet_buf(r0, 0x0, 0x2a, &(0x7f0000000300)=""/211, &(0x7f0000000040)=0xd3) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:26 executing program 7: r0 = getpgrp(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000240)={0xa, 0xa54, {0x56, 0x7fff, 0x1, {0xffc, 0x4}, {0x8, 0x3}, @ramp={0x1, 0x10001, {0x8, 0x80000000, 0x3, 0xfff}}}, {0x56, 0x6, 0x0, {0xfff}, {0x2, 0x3}, @cond=[{0x1, 0x2, 0x2, 0x0, 0x6, 0x1}, {0x401, 0x9, 0x8e3, 0x1, 0x1, 0x7}]}}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:26 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) r3 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/rfkill\x00', 0x400000, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x32, &(0x7f0000000b80)={@ipv4={[], [], @multicast2}, r1}, 0x14) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000840)='/dev/vga_arbiter\x00', 0x101000, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x2200, 0x0) write$P9_RXATTRWALK(r4, &(0x7f00000000c0)={0xf, 0x1f, 0x1, 0xfffffffffffffffb}, 0xf) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r5, 0x4b48, &(0x7f0000000100)={0x5cf4, 0x0, 0x9}) 21:19:26 executing program 1: sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000001c0)={"7465616d300000ffffffc000", 0x4bfd}) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0x40000, 0x0) ioctl$EVIOCGABS0(r1, 0x80184540, &(0x7f0000000840)=""/4096) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:26 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) r1 = semget(0x1, 0x4, 0x200) semctl$GETPID(r1, 0x3, 0xb, &(0x7f00000001c0)=""/59) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 419.001426] device team0 entered promiscuous mode [ 419.006553] device team_slave_0 entered promiscuous mode [ 419.012355] device team_slave_1 entered promiscuous mode [ 419.058358] 8021q: adding VLAN 0 to HW filter on device team0 [ 419.067885] device team0 left promiscuous mode [ 419.072872] device team_slave_0 left promiscuous mode [ 419.078533] device team_slave_1 left promiscuous mode [ 419.332462] device team0 left promiscuous mode [ 419.337300] device team_slave_0 left promiscuous mode [ 419.342846] device team_slave_1 left promiscuous mode [ 419.601467] device veth0_to_bridge entered promiscuous mode [ 419.614769] device team0 left promiscuous mode [ 419.619552] device team_slave_0 left promiscuous mode [ 419.625149] device team_slave_1 left promiscuous mode [ 419.635853] device team0 left promiscuous mode [ 419.640828] device team_slave_0 left promiscuous mode [ 419.646413] device team_slave_1 left promiscuous mode [ 419.657155] device team0 entered promiscuous mode [ 419.662204] device team_slave_0 entered promiscuous mode [ 419.667996] device team_slave_1 entered promiscuous mode [ 419.677430] 8021q: adding VLAN 0 to HW filter on device team0 [ 419.686425] device team0 entered promiscuous mode [ 419.691443] device team_slave_0 entered promiscuous mode [ 419.697283] device team_slave_1 entered promiscuous mode 21:19:27 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = semget$private(0x0, 0x0, 0x44) semctl$IPC_RMID(r0, 0x0, 0x0) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 419.724243] 8021q: adding VLAN 0 to HW filter on device team0 [ 419.739209] device team0 entered promiscuous mode [ 419.744450] device team_slave_0 entered promiscuous mode [ 419.750309] device team_slave_1 entered promiscuous mode [ 419.797397] 8021q: adding VLAN 0 to HW filter on device team0 [ 419.815260] device team0 entered promiscuous mode [ 419.820289] device team_slave_0 entered promiscuous mode [ 419.826134] device team_slave_1 entered promiscuous mode 21:19:27 executing program 7: r0 = getpgrp(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000240)={0xa, 0xa54, {0x56, 0x7fff, 0x1, {0xffc, 0x4}, {0x8, 0x3}, @ramp={0x1, 0x10001, {0x8, 0x80000000, 0x3, 0xfff}}}, {0x56, 0x6, 0x0, {0xfff}, {0x2, 0x3}, @cond=[{0x1, 0x2, 0x2, 0x0, 0x6, 0x1}, {0x401, 0x9, 0x8e3, 0x1, 0x1, 0x7}]}}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 419.856691] 8021q: adding VLAN 0 to HW filter on device team0 [ 419.874280] device team0 left promiscuous mode [ 419.879429] device team_slave_0 left promiscuous mode [ 419.886889] device team_slave_1 left promiscuous mode 21:19:28 executing program 4: r0 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x2, 0x101042) fcntl$getown(r0, 0x9) write$cgroup_pid(r0, &(0x7f0000000080), 0x0) 21:19:28 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2, &(0x7f00004aaffc)=0xfffffffffffffa1c, 0x4) setsockopt$inet6_int(r0, 0x29, 0x42, &(0x7f0000000040)=0x1ff, 0x4) getsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f0000000080)=""/35, &(0x7f00000000c0)=0x23) getsockopt$inet6_buf(r0, 0x29, 0x6, &(0x7f0000000040), &(0x7f0000000000)=0x6160e7ea50f175d4) 21:19:28 executing program 4: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x0, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000000040)) ioctl$UFFDIO_REGISTER(0xffffffffffffffff, 0xc020aa00, &(0x7f0000000100)={{&(0x7f0000011000/0x3000)=nil, 0x3000}}) r1 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vhost-net\x00', 0x2, 0x0) r2 = dup(r1) ioctl$VHOST_SET_OWNER(r1, 0xaf01, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x4008af13, &(0x7f00000127c0)={'team0\x00'}) ioctl$VHOST_SET_FEATURES(r1, 0x4008af00, &(0x7f0000000080)=0xc000000) close(r0) [ 420.388386] device team0 entered promiscuous mode [ 420.393478] device team_slave_0 entered promiscuous mode [ 420.399339] device team_slave_1 entered promiscuous mode [ 420.408105] 8021q: adding VLAN 0 to HW filter on device team0 21:19:28 executing program 4: r0 = socket$inet6(0xa, 0x1000000000004, 0x101) r1 = socket(0x10, 0x80002, 0x0) ioctl$void(r0, 0x5451) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=@ipv4_newroute={0x1c, 0x18, 0x1, 0x0, 0x0, {0x2, 0x80}}, 0x1c}}, 0x0) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") [ 420.441624] device team0 left promiscuous mode [ 420.446488] device team_slave_0 left promiscuous mode [ 420.452138] device team_slave_1 left promiscuous mode 21:19:28 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'aead\x00', 0x0, 0x0, 'aegis128l-generic\x00'}, 0x58) setsockopt$ALG_SET_KEY(r1, 0x117, 0x1, &(0x7f0000ff8000)="0a0775b005e381e5b3b60ced5c54dbb7", 0x10) r2 = accept$alg(r1, 0x0, 0x0) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00', &(0x7f0000000140)='aead\x00', 0x5, 0x2) sendmmsg$alg(r2, &(0x7f0000003e80)=[{0x0, 0x0, &(0x7f0000002a80), 0x167, &(0x7f0000000100)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}], 0x1, 0x0) recvmmsg(r2, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x80, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) ioctl(r0, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") [ 420.490586] device team0 left promiscuous mode [ 420.495374] device team_slave_0 left promiscuous mode [ 420.500963] device team_slave_1 left promiscuous mode [ 420.549160] device team0 entered promiscuous mode [ 420.554184] device team_slave_0 entered promiscuous mode [ 420.559984] device team_slave_1 entered promiscuous mode [ 420.569214] 8021q: adding VLAN 0 to HW filter on device team0 [ 420.576787] device team0 entered promiscuous mode [ 420.581932] device team_slave_0 entered promiscuous mode [ 420.587741] device team_slave_1 entered promiscuous mode 21:19:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vsock\x00', 0x80400, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000700)=@nat={'nat\x00', 0x1b, 0x5, 0x498, 0x1e8, 0x0, 0x1e8, 0x2b8, 0x2b8, 0x400, 0x400, 0x400, 0x400, 0x400, 0x5, &(0x7f0000000240), {[{{@uncond, 0x0, 0xc0, 0xf0, 0x0, {}, [@common=@icmp={0x28, 'icmp\x00', 0x0, {0xb, 0x0, 0x81}}]}, @common=@unspec=@CONNMARK={0x30, 'CONNMARK\x00', 0x1, {0xfffffffffffffff9, 0x0, 0x6, 0x2}}}, {{@ip={@multicast1, @local, 0xff, 0xffffffff, 'ip6tnl0\x00', 'rose0\x00', {0xff}, {0xff}, 0x2f, 0x1, 0x6}, 0x0, 0x98, 0xf8}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x7, [0x0, 0x6, 0x1000, 0x9, 0x7fffffff, 0x2], 0x3, 0xffffffff, 0x100000001}, {0x100000000, [0x7, 0x3ff, 0x4, 0x3, 0x5, 0xffffffff], 0x1000, 0xef7, 0x3}}}}, {{@ip={@broadcast, @dev={0xac, 0x14, 0x14, 0x17}, 0xff, 0xff000000, 'team_slave_0\x00', 'veth1_to_bond\x00', {}, {0xff}, 0xff, 0x1, 0x1}, 0x0, 0x98, 0xd0}, @NETMAP={0x38, 'NETMAP\x00', 0x0, {0x1, {0x2, @broadcast, @dev={0xac, 0x14, 0x14, 0x1d}, @icmp_id=0x64, @icmp_id=0x64}}}}, {{@ip={@rand_addr=0x749, @local, 0xffffff00, 0xffffffff, 'sit0\x00', '\x00', {0xff}, {0xff}, 0x749a3e51f35a4342, 0x1, 0xc}, 0x0, 0x110, 0x148, 0x0, {}, [@common=@unspec=@quota={0x38, 'quota\x00', 0x0, {0x1, 0x0, 0xfffffffffffffff9, 0xfffffffffffffff8}}, @common=@set={0x40, 'set\x00', 0x0, {{0x6, [0x776, 0x8, 0x9, 0x1, 0x2, 0x7fff], 0xd1, 0x2, 0x1}}}]}, @DNAT0={0x38, 'DNAT\x00', 0x0, {0x1, {0x14, @loopback, @local, @gre_key=0x9, @port=0x4e23}}}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x4f8) r1 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz1\x00', 0x1ff) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$SG_GET_NUM_WAITING(r0, 0x227d, &(0x7f0000000340)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"74656100080000007f00", 0x400}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 420.619639] 8021q: adding VLAN 0 to HW filter on device team0 [ 420.646581] device team0 left promiscuous mode [ 420.651340] device team_slave_0 left promiscuous mode [ 420.656885] device team_slave_1 left promiscuous mode [ 420.776761] Unknown ioctl 8829 [ 420.948540] device team0 entered promiscuous mode [ 420.953702] device team_slave_0 entered promiscuous mode [ 420.959498] device team_slave_1 entered promiscuous mode [ 420.967357] 8021q: adding VLAN 0 to HW filter on device team0 [ 420.976731] device team0 left promiscuous mode [ 420.981693] device team_slave_0 left promiscuous mode [ 420.987253] device team_slave_1 left promiscuous mode [ 421.235927] device team0 entered promiscuous mode [ 421.240957] device team_slave_0 entered promiscuous mode [ 421.246802] device team_slave_1 entered promiscuous mode [ 421.256236] 8021q: adding VLAN 0 to HW filter on device team0 [ 421.264336] device veth0_to_bridge left promiscuous mode [ 421.273457] device team0 left promiscuous mode [ 421.278202] device team_slave_0 left promiscuous mode [ 421.283758] device team_slave_1 left promiscuous mode [ 421.305088] device team0 entered promiscuous mode [ 421.310079] device team_slave_0 entered promiscuous mode [ 421.315894] device team_slave_1 entered promiscuous mode 21:19:29 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='team_slave_1\x00') setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000040)=0x6, 0x4) kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) munlockall() ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") r1 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000100)={0x0, 0x5d, "5a4b77009bfc9665045e67419d35df4707856d2612ac7d0707d28b6b1ccec533d0a264cb2f0e7af9ac57ff1b6a2dbe853177d256f27f211f98ad2b7d1c55dfc8362ea98f642bedee119dc5b4cc523202f71497b6b02b3f9e5cfb241e2c"}, &(0x7f00000001c0)=0x65) socket$vsock_dgram(0x28, 0x2, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000000200)={r2, @in={{0x2, 0x4e20, @local}}}, 0x84) fcntl$setlease(r1, 0x400, 0x2) ioctl$void(r0, 0xc0045c78) 21:19:29 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000001c0)={@mcast1, 0x0}, &(0x7f0000000200)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', r1}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) sched_yield() r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:29 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000000040)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) recvmmsg(r4, &(0x7f0000002dc0)=[{{&(0x7f0000000cc0)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/181, 0xb5}}], 0x4, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r5, 0x1, 0x6, @local}, 0x10) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x20202, 0x0) r7 = socket$netlink(0x10, 0x3, 0xb) sendmsg$rds(r6, &(0x7f0000000640)={&(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/27, 0x1b}, {&(0x7f00000001c0)=""/160, 0xa0}, {&(0x7f0000000280)=""/175, 0xaf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/33, 0x21}], 0x5, &(0x7f0000000540)=[@fadd={0x58, 0x114, 0x6, {{0x5, 0x2}, &(0x7f0000000440)=0x8001, &(0x7f0000000480)=0x3, 0x1f, 0x7ff, 0x7f, 0x2, 0x69, 0x3ff}}, @rdma_dest={0x18, 0x114, 0x2, {0x7, 0x1}}, @cswp={0x58, 0x114, 0x7, {{0x1f}, &(0x7f00000004c0)=0x8, &(0x7f0000000500)=0x1, 0x9, 0x80000001, 0x7, 0x936f, 0x42, 0x4}}], 0xc8, 0x20008000}, 0x80) ioctl$TIOCLINUX5(r6, 0x541c, &(0x7f0000000680)={0x5, 0x5, 0x6, 0x1, 0xb50}) write(r7, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r8, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:29 executing program 7: r0 = getpgrp(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000240)={0xa, 0xa54, {0x56, 0x7fff, 0x1, {0xffc, 0x4}, {0x8, 0x3}, @ramp={0x1, 0x10001, {0x8, 0x80000000, 0x3, 0xfff}}}, {0x56, 0x6, 0x0, {0xfff}, {0x2, 0x3}, @cond=[{0x1, 0x2, 0x2, 0x0, 0x6, 0x1}, {0x401, 0x9, 0x8e3, 0x1, 0x1, 0x7}]}}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 421.378190] 8021q: adding VLAN 0 to HW filter on device team0 [ 421.421973] device team0 left promiscuous mode [ 421.426870] device team_slave_0 left promiscuous mode [ 421.432507] device team_slave_1 left promiscuous mode 21:19:29 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{0x0, 0xc000000000000, 0x1, 0x3, 0x1}, 0x4}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x100000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x100000001]}, &(0x7f0000000800)=0xffffffffffffff9f) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000380)={"7465616d300000ffffffc000", 0x4bfb}) r1 = add_key(&(0x7f00000001c0)='id_legacy\x00', &(0x7f0000000300)={0x73, 0x79, 0x7a, 0x2}, &(0x7f0000000840)="18ffd17e46fb3cdcd2ad0e2c3482e8f5da2335dbbb4627268d4eefd40aec9016b15dc7d9626a76609e16a37dc7cd24c277954cb538f6efe2e280c26d2a38e62a13240369dc13af41ceece5d4088c50bbe9e5a0380572e516597984cf2af3adba59ad696549ee3e48077a4f0f5dc74799c61b091ec1ecc0ef5350bc1f0903caab861644e0448b317540ca6f2f2128ffba19d094e6b61ac4f7550d19540b2fa8d8431de6360bfbdc5af84d825688c0eda6a390e86c13222758d4628dbbf5d4e1cb9ec0d5f3ccc5a813194fc185b2b854c3c6d2c25beec544abb7ad556793025ec759bd867e8adeed53dabfce8f63836ec54914bbd45f80d7ebe4cd3e7baee7a9e87f3ec88a162e574331d1414ac68b8dca1b8dac614804a4f9346637fb46a7b7a2b4a3d4c551a30cd32f8e1c54c83fd8a8958caa66a3c18c99a84f0107533b7e51cebb99603130a9c9a5a6fc2f652c15757311a987dbb6057e171c6b824857030309346b77756ff4c44ecaf122c3eae0b4e54ab708c562f507efad1bece09574eaad149354d9c520e2f84f1a01c6f6310324a5b82b9a959a4d059925d7684d45beed121243d9e879eba8b2952fc9638d6abb0a19d6e44855bec0f1353d7f318c3e957f9e614f34c7426d6a22a58c61c936ec2dd63e7a7b622bbb2525aa53c870ab0d1fe6e4b785991d5e743301676d8fccc3b674ec6973151f910574ed5654ae71635fc7162d3b5862fd57c4e8de5056cd4dbb1d80bbee23a48109f63db757a33a607053f2b7ad4b931fa658df419920bc8bfbfd583416d14ceec8d9f88caa8e988bbefcc6cbb7151d1be236b6dae74985169a9e7bc1ad6a9fbc1d60fe34b0962d754490f0821893d72b2648a004304cdd273e0f27be9c9581133e9ffb0e54019211ad2419723bc2931d922ae2ba0558eb7ff9cacc4ac8a80363bbbd453aad214527270e953f4ad6693aeb6e2e64b9092ea48e4b18b6beffd3652c81bf22771de618247063c523915c3910009204c6ca52599f9d604d10241b932a892ca8570d4f4d300d1bc9acf0a3f52b5546d253838a7ca1059dff7c7def2a77c83e310f45d3e9aaed7fe745cd0d6d135bfcad43fb51024ccbda3854942dc58a12b9bdc01bf48e22aee94664023df3438ea8f60b1b6a0d22cc41b7fb590240750dece29f607a79127a87362169ab0bbc583c7bfb70d8ac47925b47a3a3faea5a5ee49e83d0c8c3de25b4a919f19b70fd682689c17bb1bb22a5d9f42712c73e62228f48bcd30180fb0460cacb70c4103092683ae7fd961ebc13c7dbffd56be21e997e1e395726a7195afbfcf4924da95feb22724f239456d0aeea4c44c9ee85a66eb78567bc12621006c087aa834e9d564f45a9032c0331cf2c35c5ba2a800954fde12878b17867edf376266df21c6aad2b5023da5a31f4055ca8b063faf53d1b02bd941712719d8fe5df85796725a1bfa691a2be7a00dd0380d1c83c048effa251da2e3a8190d0a1ad1b0e00970198e7309f1b86f7082265602964a98fbd6318ede27166b72989f30784c75119b77774767559716b2431edfee4fa4c41fab080aaae912a6cd437745dc096a006a051ae423d34f4511d84e15fe1a3ccbd72a4673b1f7e2dfcdb220e145c863fba316e9642632869785ffd7d5338769c175e8de9281f13c98089551b83df7ff11cf14e18d5746567be6dc145941ba967934e6b095e1fd2087d98d9e7c03002df1cf415ce4672e7d244e3507137c55c1d2c978c3d515e9aaa963db155e99e71884d47123336b7e78064307231b93e3fce7056d727f365fe451f8258039b9bf386cd34e1ab4967779d46b7ffe8a79b9e844ccc52237fc909bfa593244d6645f459983d9f003555a1f88cda306e01fb2c321b2a2c2214d8f628d644382f802ad6554d85e8b85fbf36f4f133cb8f9006004440432f3fb3a8859e4555ce1e6de62ac859ae0e0c7c58f18d7b6f20034e96142bcecb2a6468fffd50e9e04033cba545a60ab1b53310312a9a970afeee4fcc58e042faa67c82240288e3f27178058a5ae047231be526a41a84a22cd0e876ca8222ec064bacfd73f83530824ce7fa3d349a02044cd330e8e04eba38bb7fc0b55714a65a57375d8f2fbad4c4df55d20290cde13cc71ea68c459741b5fac51dc59d47f43066acb155f03fa70b4acc2cb632d21b1ab6c24a65b521da765207ede8e0bc7552da4f62cfce34afa8c705a82e4522d2ea22a26829cd35c3d66351832cff1ed9a2919ce15dce5271f4c823e527691f4f85d8577338b25159cb4a94d8318ed04b8aa1eb76f3d749658ec3b06e167f6769e103d6d15567009f22584ef035222e5758515fe7aa93731d4c10cd1f5d96ac2d67b35a038386f5580b46a15d304fd5636dcaa2168198e1c321fd0572161d7197b96f1df1dc966ead15e0705c00d69bdbf8a3c694b8ce8758daa12da80d6b88c23eb58ee932684a53b564abc89e0af10da76b87f2ae15dd29dc46d0dc47f4124615f09a9b85f8a719d141338d489ea72c6e26f03db956c62096d07da49cb7b93842493b2117bdafac6951dee7d61dc520872414e11d6d32bab35d1338f0c7fcb18a2121c24aa21218001affcb054b71b95e28730002d46373742c4df0f5b44d66ecd6c854c9de3383e325816125f5da7527acccbd717dd1d3b2cfe530cbb85b052c36ea52ed911e0065766a4c0c9acb34bc0483a0da150c93c470bf94e48fbb6bf75886b589a3204d4dba11c94b90b1d75989c733faab5d39913bc7cb33859c5a4c2529624d7589158fb08e0b725b5db5c7f822c6777bdbc37b334e5687c9304ae904201f85454af678deefc3bd383954eca21e8ee783512b94e830510d4414a3c3db7bb81c49ade727cb969c3427360ded9173bf9e0edc9a8b4a47bde728e5ca48544c94583df8f3f07f464827bea3c084ef46af194ded32f9504c1b1c7020ca6d5a54fcc26b276b75321dc890046e5608c27eb0f10576d6f755ec015bd22dae817dce00469a16186d3949128d3ca97dcc99871d4508863fcdaf523894f711f42be9f6317292574726babccd10882daedf7b99ba212141c6c86a1e99922e6db5565e6dad6e10d8e3f615f3eb9403685dfd943ae484db14141671a039326adf36b0b1fd00e64b0528842613f85a04d027fb389b1d3a96db17d83f1ea58adac53fb89dca772d771afe1bca238378b521899b49eccbb2f963960746fd4d596965a00747a6a214dcdc5d71354560a0e2a8816d66f2fc50fe0ccee52c3dacbaa6bef07c0b8250550cbbf17afba747948303de6d0ee80563df95d3941e2753b3b080e17612d8781864a1a297a418ea260d7ec835f44c03129f9404b1450e64bda24b8346a25d03a9991f48182be335a002fe9cd471bb88560cbaade9eadee6c94775ebc608ba9fdbf5b5ef91ab972856591898193fcb139fa54d0ba53af2ad950c39b7cf013de45c333941e0c73524e504e8ccddca5e7081d2834d104305e8a0e1695533c6e804c3b85ff83a97d3c52e0cdf06e37c6e6f7db71eb7f76a57dfb0b609fd5de68b89af5896408e428c2b40560e81433c3ea48c3a0bde6eda5e0813342118e221ff756ed247b151190f48dd0b40bf2acf7ba14e71166d98380179e63d3df4a797c93f72da139c7e7338b007185b86e89ed1f9cb31d03724c8512e11c4cdede38d2e6e4aadd60eb184e2e48cec046d8494a0c0fc698f358bc7f6262f3ab141a3b0ad694cbf86bccf48e2438bf4b03814ba62fb128533aa9260e9cb5d85cd46f0210514c54effab2c2f3305a46d08f9db0db7d4ecc828ae3fddc7b399772385f26e3c8d7ec710c23ec20283b2046242794eb22fe9d20a3197cdc991f612b2694aaccaa50a98eaf1865a569325495f36eebbe32e0d49f72da78dd067bc40010af0daade102d5ff4571b4386767dd65e878f7a0acaaf01f5eabacdb1e5aad0b65e0b1e9acb5651e02f362c6f20b7c911fac1d06835183e75d22f25242b3bd42f17027cf61ec539a9a94ac305b7db764382d43b504d54df1ebdc9d19c38bcc571423b216ff71e52feb01484ccae4324e6937cf58e167ae44de54afd13c4ef18d0bb52a36b59cd8c6006ad1289608d7bc1ea895adfe67598d6ce90df59cea4ae42c44970ab707cd77ada539a77d4e61643a55d92769f45b2293ca5383e6b6254e7e0cb386cf388d6bbf5358c8edc1183f59793f714e2d13cbc2084d27c025fd87a9e5d6525bc8081a225c7a026993f5af87da063421b1c545d4dc654020db9a35253ea95bbe23c23888d93eb526c1d5d81b4abcee4d874fe0a47f6462cd74a19534e9b6dbfcdfe4320026e1d0c022427ae9303e216b7e38b22e46f94b66d475d1c5e59521c93bb17b21f4f5b7814f92c4256ddf964c190b0b9204eb8be11287b4c21fb8cc645d6b8d7f2e68c859199a4e9b516257a3397cc49ec65f505ffe054a308b3745c7b3ae5f96f763f7ae478fb0b7da30cb8427b3455f386c4b0fd446cc63b671d41fd87af50ce021befcb445d0cccb1591d5e9d7059c75f767b8421c4f47c884477117cb6ad317ac380fd2ba92d212ad748239c7c3f787497ef7287259e30926a8be0eb4cf9b0aeb90b3b4d6369c6447d264e1fcb3ad83454560ef603c9fa9e01afa6fb17071030f6ae48ee3931033f67e47874b717866a1f24f9de55acb89874a6d1497121f6782e714d1d7e30e839ce6c4cfea15c9ceef72c7d3d5acc495fbe42b03692939889c8d70b033abc081c9c32f1233de23aec55c74c1509db4001bc1992218507d473c53f3bf77702db9bf6577557dca382c0987230725ff2e4c3a0e0c08587eb7018c525cdb9024f74d91bb964b9b0b81884aa6ab6c898021deaa91b8d8c24dd90b69c8c9c6387ef9a66b76aa6dc966d2a9f9e449c90c5af47fe21402bb19c306e4c2c24ceb908587162165ae1f5ca9be82e8e886005fc648fd4963105a00c82dc8afe087cee4910279b72410189c20b8a9ff887afe98037a336fffda3258a959e62ac394c2539b9278d04a0e5692443ac586f5200adc62a0c4b9c6b6d5f30ac4d12e8eb367dd3ed30afbd67780e05a1a6c8e420d115981c8e5d5f7afcdea0d7243d05805bd825d87caca1c95f0483d069ec9bd680ae559ea69dc88e6f14bbcb76264eb1d499a6be870ee6848e803bdcfe1a90ac79454ac59e494bc455c877df019fdcaaa66810f306d6da58d45ba86c4b14df327d2ac560a8c6f5af747c6bd007740cbf53e30afed0075f7aac3e35452c5974bda507bfa9db272d0d315fa49943a7252fee418a7ab57d7854e7f7fb88a663421c15135c011be5be8195d7ff2a0227a972f15b117a178c9ce8ac4a05f019914beb4cd9a4747744ed6fc8a0ea900da68fc3cc0ce65ce8fc545e8b237f41f514ee305b0119a6316c04261d9c0655ce7fe96c8db9daf754d383c007e98ea920d5025b725c1c048fab3b9e42c507c6506fc42f6e348f6e50fb73ad8ab819790b889304766f9220667e5c48c4661ba411509ad4b4c9ef68ce0e7240f3262c4225854b48902a466f570ba5b7de0fa222451c9bddc9e77622ff6ca598c2f71504bdf8bc59e7f1246a52b5199a9f76ff40f613ebda35a7d6dd7d3509e6c2a26ea6bc5d3b58d45dbe4af08c10f19c314609b8f188b0a51c0a9b45d17e92550e033769ec1965923e346f3e666e48ea6fe37b917b891fc51762d0ea279f234b468007beac82504b995d2f64b0a81a64d127a6b6a62dd85ec4c94edb2eaf844c6f1e052f9beb2c6481bc3e5b1a4c70002753dd8e1139ace953698b1847b6e62bd827ee845", 0x1000, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={0x73, 0x79, 0x7a, 0x0}, 0x0, 0x0, r1) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}}, 0xa0) [ 421.530692] device team0 left promiscuous mode [ 421.535790] device team_slave_0 left promiscuous mode [ 421.543509] device team_slave_1 left promiscuous mode 21:19:29 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) gettid() ioctl(r0, 0x7fff, &(0x7f0000000100)="0c991551686839680c2495acb70700315f85bfa185c7c5f4cbfe60665ae5593f5aa5600101000000387ec66bf228ab94296a43816a2ecfc7bd945daee3c18594d88703241aae24a7b754abf371dc769a6eec9228aabeba5cc656854dd6af7acef7d289a1c43e63e9d0d7c93f5f57ab5695ef183c5d099bfaee80cee5693748971130eb38631d188ffe8e71c29f9914ea241b303bbaf6076b97f3849fb87766ff6bf2c3aff42e12311a91a8ff8591f5b5b870908adc0a28d39417d84982b0680fe32659b800cde6f0cf6a3e0000000000000000000000") r1 = socket(0x10, 0x803, 0x0) getsockopt$SO_BINDTODEVICE(r1, 0x1, 0x37, &(0x7f0000000040), 0x20a155a0) 21:19:29 executing program 4: mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) mbind(&(0x7f00009db000/0xa000)=nil, 0xa000, 0x2, &(0x7f0000000000)=0x1, 0x9, 0x0) clone(0x8240000, &(0x7f0000000180), &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300)) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(r0, 0x0, 0x43, &(0x7f0000000040)={'ipvs\x00'}, &(0x7f0000000080)=0x1e) 21:19:29 executing program 5: ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = getpgrp(0xffffffffffffffff) sched_setaffinity(r0, 0x8, &(0x7f0000000380)=0x9) r1 = getpgrp(0x0) r2 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xb, 0x81) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)=ANY=[@ANYBLOB="09040000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f00000000c0)=0x28) write$RDMA_USER_CM_CMD_GET_EVENT(r2, &(0x7f0000000080)={0xc, 0x8, 0xfa00, {&(0x7f0000000380)}}, 0xffffff01) ioctl$int_in(r2, 0x5452, &(0x7f0000000140)=0x3) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000480)) tkill(r1, 0x1000000000013) 21:19:30 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000580)='/dev/fuse\x00', 0x2, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000240)='/dev/snd/pcmC#D#p\x00', 0x8, 0x80) ioctl$TUNGETVNETHDRSZ(r1, 0x800454d7, &(0x7f0000000280)) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000080)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) read$FUSE(r0, &(0x7f00000040c0), 0x1000) read$FUSE(r0, &(0x7f00000020c0), 0x1000) write$FUSE_INIT(r0, &(0x7f0000000100)={0x50, 0x0, 0x1}, 0x50) mount$fuse(0x0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000180)='fuse\x00', 0x0, &(0x7f0000000400)=ANY=[]) pread64(r0, &(0x7f00000001c0)=""/10, 0xa, 0x0) [ 422.483805] device team0 entered promiscuous mode [ 422.489101] device team_slave_0 entered promiscuous mode [ 422.494918] device team_slave_1 entered promiscuous mode [ 422.505627] 8021q: adding VLAN 0 to HW filter on device team0 [ 422.518573] device team0 left promiscuous mode [ 422.523545] device team_slave_0 left promiscuous mode 21:19:30 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x80000001, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) r1 = syz_open_dev$amidi(&(0x7f0000000200)='/dev/amidi#\x00', 0x101, 0x1) ioctl$SIOCGIFHWADDR(r1, 0x8927, &(0x7f0000000240)) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)=0x0) prctl$setptracer(0x59616d61, r2) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 422.529243] device team_slave_1 left promiscuous mode [ 422.762990] device team0 entered promiscuous mode [ 422.768241] device team_slave_0 entered promiscuous mode [ 422.774164] device team_slave_1 entered promiscuous mode [ 422.782495] 8021q: adding VLAN 0 to HW filter on device team0 [ 422.790686] device team0 left promiscuous mode [ 422.795543] device team_slave_0 left promiscuous mode [ 422.801134] device team_slave_1 left promiscuous mode 21:19:30 executing program 7: r0 = getpgrp(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) r2 = openat$uinput(0xffffffffffffff9c, &(0x7f0000000200)='/dev/uinput\x00', 0x2, 0x0) ioctl$UI_END_FF_UPLOAD(r2, 0x406855c9, &(0x7f0000000240)={0xa, 0xa54, {0x56, 0x7fff, 0x1, {0xffc, 0x4}, {0x8, 0x3}, @ramp={0x1, 0x10001, {0x8, 0x80000000, 0x3, 0xfff}}}, {0x56, 0x6, 0x0, {0xfff}, {0x2, 0x3}, @cond=[{0x1, 0x2, 0x2, 0x0, 0x6, 0x1}, {0x401, 0x9, 0x8e3, 0x1, 0x1, 0x7}]}}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000001c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 422.811401] device team0 entered promiscuous mode [ 422.816592] device team_slave_0 entered promiscuous mode [ 422.822425] device team_slave_1 entered promiscuous mode 21:19:30 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x4, 0x32, 0xffffffffffffffff, 0x0) r1 = userfaultfd(0x0) ioctl$UFFDIO_API(r1, 0xc018aa3f, &(0x7f0000000000)) ioctl$UFFDIO_REGISTER(r1, 0xc020aa00, &(0x7f0000001fe2)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_DISABLE_FRAGMENTS(r2, 0x84, 0x8, &(0x7f0000013e95), 0x4) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x0, &(0x7f0000000040)={0x0, 0x7fff, 0x81, 0xe9f6}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp6_SCTP_RTOINFO(r2, 0x84, 0x0, &(0x7f0000000080)={r3, 0x0, 0x0, 0xfffffffffffffffd}, 0x10) close(r2) close(r1) [ 422.862386] 8021q: adding VLAN 0 to HW filter on device team0 [ 422.887497] device veth0_to_bridge entered promiscuous mode [ 422.895313] device team0 left promiscuous mode [ 422.900179] device team_slave_0 left promiscuous mode [ 422.905781] device team_slave_1 left promiscuous mode 21:19:31 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000012c0)=ANY=[@ANYBLOB="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"], 0xec4}}, 0x0) r1 = syz_open_dev$sndpcmp(&(0x7f0000000380)='/dev/snd/pcmC#D#p\x00', 0x1, 0x90000) setsockopt$inet_buf(r1, 0x0, 0x35, &(0x7f00000032c0)="cf72a4218d8fd9530ed051e72d8a24997882afbb023267a163b142973dd277dc8293861dbddf03f60d2b340db22b89a88bf3b7402174f8a0808412fffc016e", 0x3f) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_team\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000180)={{{@in=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@local}}, &(0x7f0000000280)=0xe8) accept4$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14, 0x80000) accept4$packet(r1, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14, 0x80000) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000400)={@local, 0x0}, &(0x7f0000000440)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000480)={{{@in6=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in6=@remote}}, &(0x7f0000000580)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@ipv4, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f0000000780)=0xe8) getsockname(r0, &(0x7f00000007c0)=@can={0x1d, 0x0}, &(0x7f0000000840)=0x80) accept4$packet(r1, &(0x7f0000000880)={0x11, 0x0, 0x0}, &(0x7f00000008c0)=0x14, 0x80800) accept(r1, &(0x7f0000000940)=@hci={0x1f, 0x0}, &(0x7f00000009c0)=0x80) getpeername$packet(r1, &(0x7f0000000a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000a40)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000ac0)={'bridge_slave_1\x00', 0x0}) getsockname$packet(r1, &(0x7f0000000b00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000b40)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000001080)={{{@in=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000001180)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f00000031c0)={{{@in6=@mcast2, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @broadcast}}}, &(0x7f0000001200)=0xe8) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000001240)={'syzkaller1\x00', 0x0}) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000001280)={0x0, @multicast2}, &(0x7f0000003300)=0xc) getsockname$packet(r1, &(0x7f0000003380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000033c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000003400)={{{@in6=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}}, &(0x7f0000003500)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000004bc0)={{{@in=@remote, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@broadcast}}, &(0x7f0000004cc0)=0xe8) getpeername$packet(r1, &(0x7f0000004dc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000004e00)=0x14) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000004e40)={{{@in6, @in6=@ipv4={[], [], @loopback}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000004f40)=0xe8) accept$packet(r1, &(0x7f0000004fc0)={0x11, 0x0, 0x0}, &(0x7f0000005000)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000005040)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f0000005080)={@loopback, @multicast2, 0x0}, &(0x7f00000050c0)=0xc) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000005100)={0x0, @loopback, @rand_addr}, &(0x7f0000005140)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r1, &(0x7f0000005b80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000005b40)={&(0x7f0000005180)={0x9b4, r2, 0x0, 0x70bd2d, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x24c, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r5}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4b3}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffff9d42}}, {0x8}}}]}}, {{0x8, 0x1, r9}, {0x150, 0x2, [{0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r11}}}]}}, {{0x8, 0x1, r12}, {0x3c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xd3c9}}}]}}, {{0x8, 0x1, r13}, {0x168, 0x2, [{0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x2, 0x5, 0xda3c, 0x1ff}, {0x7fff, 0x7, 0x3bf, 0x10001}, {0x1, 0x7, 0xd70, 0x8}, {0x10000, 0x8, 0x3f, 0x20}, {0x8, 0x4, 0x1, 0xfffffffffffff490}, {0x1f, 0x4a, 0x1, 0x3cb}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xd2}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}]}}, {{0x8, 0x1, r17}, {0x74, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}]}}, {{0x8, 0x1, r19}, {0x1dc, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r20}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x1, 0x2, 0x3, 0x1}, {0x545, 0x80000000, 0xdc8, 0x5}, {0x2, 0x3, 0x4f, 0xd10}, {0x59f99e2, 0x1a, 0x0, 0x10000}, {0xec, 0x8, 0x7}, {0x4f, 0x1, 0x1, 0x1}, {0x3d4, 0xbc, 0x7fffffff}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r21}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r23}}, {0x8}}}]}}, {{0x8, 0x1, r24}, {0x80, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}]}}, {{0x8, 0x1, r25}, {0x150, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r26}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r27}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}, {0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}]}}]}, 0x9b4}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) [ 423.203815] netlink: 3760 bytes leftover after parsing attributes in process `syz-executor4'. [ 423.227428] netlink: 3760 bytes leftover after parsing attributes in process `syz-executor4'. 21:19:31 executing program 4: r0 = socket$inet_dccp(0x2, 0x6, 0x0) setsockopt(r0, 0x10d, 0x800000000e, &(0x7f0000000040)="0000fa00803aaeecd083320e71de06cad06e117c5ff57d4fefa2b1277d5e72e73bc971d5bfcdd9d1186abf32ea726b6507e75419e724f8e1ff507c9f032a24666ac4381dc406e401e26fcd531857d4957e2dbadbc6eaba6dff5b", 0x5a) [ 423.290984] device team0 entered promiscuous mode [ 423.296175] device team_slave_0 entered promiscuous mode [ 423.302136] device team_slave_1 entered promiscuous mode [ 423.312330] 8021q: adding VLAN 0 to HW filter on device team0 [ 423.326966] device team0 left promiscuous mode [ 423.331876] device team_slave_0 left promiscuous mode [ 423.337498] device team_slave_1 left promiscuous mode 21:19:31 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)=0x39f) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x3, @local, 'bpq0\x00'}}) write$binfmt_misc(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="73797a31988d214fa13ff3d2b883eaada8def8d3ff0b12a3bb3860d99040754aec2c59386724b98718343537a9e527f66e79e692d0aa6cd2f42af5ff7f00002b55bc4186409cbfc16d1d39a338b73f992c7d9984f3d176cd3a9b7e3161840a0d5d6e41b23e6bbaff218db1e2c5859bf6f4a1701dae64"], 0x66) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 423.387498] device team0 entered promiscuous mode [ 423.392768] device team_slave_0 entered promiscuous mode [ 423.398590] device team_slave_1 entered promiscuous mode 21:19:31 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000040)="0a5cc80700315f85715070") sendmsg$nl_route(r0, &(0x7f0000000580)={&(0x7f0000000500), 0xc, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="3c00000010000107000000000000000000000000", @ANYRES32=0x0, @ANYBLOB="00001007000000000000ef6e6686be164b12000c00010300000000000000000400020008001f00000000001feb456d581a88632a592c801aab4c66c966a4229740d1dfbac828179962f23ff15d52622f666b0f4edd5a38f9fc1d008f0b7ac08d4182604fb7b4ddd10aaa9d30dc4067eb9bc264cba0c810cc09e38bf2b02a3ac3bb2793bc1590e47722c64f1ba095e667e4e7bc4da9337b057311b00087fd9ff09490c76f4faf1ea6a3aeae88447ea5df9445f72a95a5cf3333036a9b6dcf5aadfcf6586a9f6c2bd2636f"], 0x3c}}, 0x0) sendmmsg(r1, &(0x7f0000000180)=[{{&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, r1, 0x0, 0x0, 0x3, 0x3, {0xa, 0x4e20, 0x0, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1a}}, 0x2}}}, 0x80, &(0x7f0000000000)=[{&(0x7f0000000100)="86b24f43c77bf62064589b5b8a7d6bb9c2dc4e6c3efc83ab00debb8f0776d82c6131d8140ff84d10a4036dbcab70a148888287907e8d7160176cb3823120a025172bd4d46f028794a117fab717ba26274c365ff449a4a47c305a77b1c957e8f109e1015e73480e7872488e01afb5e6bdabb95a57c367595a72", 0x79}, {&(0x7f0000000300)="4dda9f6c5f8137b9baa6b18e49cf1c5e979eabd3c85c98d9f24433c1bb8af13707273cbd03782feb686916918baf506b3373eb07fff2c795c95986efd6752e8cf7facc57b187080d6e23ee92c248ea00e4cb0bfcf6157f89977a3def7da240fad97a3a27f86676fbb98913da9ad6772fbe10af1059e30160fe84aec6c82eb16cadc124e536eb1bedd59df98961414290c59e65711d43f7880e10a04c0e8a248a85cef6e273a117f5369036de83fc7c7dbfba2cdd43f09a4f9d1bf3fa30807256861480051f75425d4d7a39", 0xcb}], 0x2, &(0x7f00000005c0)=[{0x60, 0x11f, 0x7fff, "60c404847c9a0b4ba7b444811cbc787ffd29c46775c7cfcc51ba134b35621b09c0afd7df166b25418094a185d3d1f4b9b6a64ab8c420fab445afba3ddb6fb3b6c4b21e544addecd8210b22801075ab"}, {0xb0, 0x116, 0x29, "89a3413fb8714da1843cd98a2eee9a7fc31483ac0cec1fd50a760a14f4dbe188a55bba8412e1359e92494589f0785bd36c45c59e303b28eb78c121e5da6ec031528d0b462fec8c7d7607a6d1ddba06087af94f2d3262f45ae94cddcfeb91068a3b76db89535c5c0fd4f2b7cdaffdce03e666d8487bafc05dbcab46c1d0c8c1f620055cabd6bf3a9d01fb40f8ce6b01ed331f6fe45077139e798ebc5474a179fd"}, {0xa0, 0x116, 0x3, "d90418b3fd112460d4a4526cf04580295c1fd82588b7607720d089fb7503a829a32304cf46a57e1c45234a711357d153db4cd31795e3c81c230c6350812a16beb76c47511b556ac6e612afdeb53e5953354f02f5a6ff495859df05be50a16a014c0f7d22798bdaa96ba49fb3007fc514cdcadb3ae3d5582a7d6fda6f73457a47c84158ee93484109dc15"}, {0xf0, 0x10c, 0x9, "289b4c232f041eb7e263fde4766af9280d162cc3aa817973b0457e182dc672d945c9c206fb418e1986b851cacf17d9d5c9b7e9b81143834aac41ee1e58bef29c98baf9c41965f070c3b89f3d00fda6203b0af0b95c97011634e999d574792afe097d7b5bd0357f6d68ff3edbcc2bfa69169986afe92a7dc188d2104e1acd69c9b7186f2f68575cb3620d3d540b4ee7a5a61b6b2a018e16061a315386a4a620e2bffb23e86eb695c165650e8751c531d3e7979a023e5f8159de897b9bd39778e077fcf577c0d68a87ff3f7a43ddd0d05a4d9c5a43ca75165885bb7966d2"}, {0xd0, 0x11d, 0x7, "a974af57a42a38ef1cbb7876ddfd4f6393251990320ce93c0c3442027fe54cc82bef778ed3b88d94b549a66fa34079cab4d134ef7c41c31ccbf6b6b666ecc131e5fde702540751a1c7e048861a7eee9b06a68d5c40d92bcdb0ab3f8e14ccc8962ce2e081679e48e215f38d660ade0420abeca318ff22e3808efc3c424768dd3102c16710dd1a4b07b90f85f5552062b2cf5c592728aafae5fa1c23c226c4b3d01de5e2e540d19a18c6861b559640a0d863226bfaff520fb86e67128c305e3a"}, {0xd8, 0x113, 0x6, "e85707de9be538780387150d1aa6746194aa932a4a5ae1cb610674d7b02cde8921564c6528f77745c0a4a0fda9f5e304fdd1649afe11ce8864a309f57be326eff250e449293fd300450332f1fe4f84ff83959aea619fe5be3cd7489f543b57619f09e891952a7e6a49cbc423bb823ab593fec88345381a563c353b8cbfe59656d160210b8c753264c3fbcf1ee28c859c3872038a595d0f4b20d52581321a60f9ed496b2941f35b9c614e31107b707d6117bc6a2996e784a8d01982f84bf096bbbf"}], 0x448}, 0x7}], 0x1, 0x40005) 21:19:31 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x9, 0x803, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000200)='eql\x00', 0x10) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file1\x00', 0x0) [ 423.463904] 8021q: adding VLAN 0 to HW filter on device team0 [ 423.490339] device team0 entered promiscuous mode [ 423.495380] device team_slave_0 entered promiscuous mode [ 423.501295] device team_slave_1 entered promiscuous mode [ 423.564876] 8021q: adding VLAN 0 to HW filter on device team0 [ 423.601806] device team0 left promiscuous mode [ 423.606695] device team_slave_0 left promiscuous mode 21:19:31 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r0 = syz_open_dev$sndtimer(&(0x7f0000000080)='/dev/snd/timer\x00', 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_TREAD(r0, 0x40045402, &(0x7f0000000000)=0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000000c0)={{0x100000003}}) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x0, 0xf}) ioctl$SNDRV_TIMER_IOCTL_START(r0, 0x54a0) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) getsockopt$IP6T_SO_GET_ENTRIES(r1, 0x29, 0x41, &(0x7f0000000040)={'filter\x00', 0x28, "b1c4559d710af71d80e342459adf1f5efd1a8d48195c46acced04d74696cfcdb3314b4618bf32948"}, &(0x7f00000001c0)=0x4c) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 423.612287] device team_slave_1 left promiscuous mode [ 423.962155] device team0 entered promiscuous mode [ 423.967144] device team_slave_0 entered promiscuous mode [ 423.972961] device team_slave_1 entered promiscuous mode [ 423.981441] 8021q: adding VLAN 0 to HW filter on device team0 [ 423.990540] device team0 left promiscuous mode [ 423.995265] device team_slave_0 left promiscuous mode [ 424.000807] device team_slave_1 left promiscuous mode 21:19:32 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0xfffffd7a) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) prctl$setname(0xf, &(0x7f0000000200)="6b657972696e676d643573756d766d6e657431274073797374656daf00") ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x75, &(0x7f0000000080)={0x0, 0x5}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x76, &(0x7f0000000100)={r4, 0x688}, &(0x7f00000001c0)=0x8) 21:19:32 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r1 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) r3 = openat$userio(0xffffffffffffff9c, &(0x7f0000000240)='/dev/userio\x00', 0x8280, 0x0) ioctl$PIO_CMAP(r3, 0x4b71, &(0x7f0000000280)={0x5, 0x0, 0x8001, 0x9, 0x6, 0x1}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f00000001c0)={0x8, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x24) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000340)={r4, 0x53acbd85}, &(0x7f0000000380)=0x8) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 424.008458] device team0 entered promiscuous mode [ 424.013443] device team_slave_0 entered promiscuous mode [ 424.019298] device team_slave_1 entered promiscuous mode [ 424.027373] 8021q: adding VLAN 0 to HW filter on device team0 [ 424.035351] device veth0_to_bridge left promiscuous mode 21:19:32 executing program 7: r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r1, 0x8912, &(0x7f0000000000)="0a5cc80700315f85715070") r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r2, &(0x7f0000000040)='H', 0x1, 0x0, &(0x7f0000030ff0)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f000051c000)=[{&(0x7f0000000140)="480000001400190d09004beafd0d8c560284470080ffe00600000000000000a2bc5603ca00000f7f89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) recvmmsg(r4, &(0x7f0000002dc0)=[{{&(0x7f0000000cc0)=@pppoe={0x18, 0x0, {0x0, @remote}}, 0x80, &(0x7f0000001240), 0x0, &(0x7f00000012c0)=""/181, 0xb5}}], 0x4, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r5, 0x1, 0x6, @local}, 0x10) r6 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0x20202, 0x0) r7 = socket$netlink(0x10, 0x3, 0xb) sendmsg$rds(r6, &(0x7f0000000640)={&(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000100)=""/27, 0x1b}, {&(0x7f00000001c0)=""/160, 0xa0}, {&(0x7f0000000280)=""/175, 0xaf}, {&(0x7f0000000340)=""/54, 0x36}, {&(0x7f0000000380)=""/33, 0x21}], 0x5, &(0x7f0000000540)=[@fadd={0x58, 0x114, 0x6, {{0x5, 0x2}, &(0x7f0000000440)=0x8001, &(0x7f0000000480)=0x3, 0x1f, 0x7ff, 0x7f, 0x2, 0x69, 0x3ff}}, @rdma_dest={0x18, 0x114, 0x2, {0x7, 0x1}}, @cswp={0x58, 0x114, 0x7, {{0x1f}, &(0x7f00000004c0)=0x8, &(0x7f0000000500)=0x1, 0x9, 0x80000001, 0x7, 0x936f, 0x42, 0x4}}], 0xc8, 0x20008000}, 0x80) ioctl$TIOCLINUX5(r6, 0x541c, &(0x7f0000000680)={0x5, 0x5, 0x6, 0x1, 0xb50}) write(r7, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r8, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) [ 424.070817] netlink: 28 bytes leftover after parsing attributes in process `syz-executor4'. 21:19:32 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={'team0\x00', 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 424.118070] netlink: 28 bytes leftover after parsing attributes in process `syz-executor4'. [ 424.177694] device team0 left promiscuous mode [ 424.182801] device team_slave_0 left promiscuous mode [ 424.189780] device team_slave_1 left promiscuous mode 21:19:32 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f00000001c0)={@mcast1, 0x0}, &(0x7f0000000200)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000240)={'team0\x00', r1}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) sched_yield() r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:32 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) r0 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) timer_create(0x1, &(0x7f0000000040)={0x0, 0x34, 0x1, @tid=0xffffffffffffffff}, &(0x7f0000000080)=0x0) timer_settime(r1, 0x0, &(0x7f00000001c0)={{}, {0x0, 0x1c9c380}}, &(0x7f0000000300)) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) keyctl$dh_compute(0x17, &(0x7f0000000340)={r0, r0, r0}, &(0x7f0000000380)=""/218, 0xda, &(0x7f0000000640)={&(0x7f0000000480)={'rmd320-generic\x00'}, &(0x7f00000005c0)="d20555d7238cf382a71d92eecf34e5769e2ddd26897224aa2b5e2cd9a01b8bf68bbb172c054f003fc625a80dcc9c1d4c7ff77c44e401f633d42eebac758a9b866bf3677f4049bfd76b68f37c0936a0843bf4a38ea63410f9eeeaf23fa535", 0x5e}) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x80000) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000540)={0x0, 0x8009, 0x3ff, 0x5, r2}, &(0x7f0000000580)=0x10) r4 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:32 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') r1 = fcntl$getown(r0, 0x9) ioctl$sock_SIOCSPGRP(r0, 0x8902, &(0x7f0000000040)=r1) kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) r2 = semget(0x2, 0x4, 0x8) semctl$SEM_STAT(r2, 0x6, 0x12, &(0x7f00000000c0)=""/39) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:19:32 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)=0x39f) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x3, @local, 'bpq0\x00'}}) write$binfmt_misc(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="73797a31988d214fa13ff3d2b883eaada8def8d3ff0b12a3bb3860d99040754aec2c59386724b98718343537a9e527f66e79e692d0aa6cd2f42af5ff7f00002b55bc4186409cbfc16d1d39a338b73f992c7d9984f3d176cd3a9b7e3161840a0d5d6e41b23e6bbaff218db1e2c5859bf6f4a1701dae64"], 0x66) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 425.205392] device veth0_to_bridge entered promiscuous mode [ 425.213499] device veth0_to_bridge left promiscuous mode [ 425.219597] device team0 entered promiscuous mode [ 425.224636] device team_slave_0 entered promiscuous mode [ 425.230411] device team_slave_1 entered promiscuous mode [ 425.238773] 8021q: adding VLAN 0 to HW filter on device team0 [ 425.252114] device team0 left promiscuous mode [ 425.256820] device team_slave_0 left promiscuous mode [ 425.262355] device team_slave_1 left promiscuous mode [ 425.272245] device team0 left promiscuous mode [ 425.277107] device team_slave_0 left promiscuous mode [ 425.282630] device team_slave_1 left promiscuous mode [ 425.290693] device veth0_to_bridge entered promiscuous mode [ 425.298197] device team0 left promiscuous mode 21:19:33 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)=0x39f) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x3, @local, 'bpq0\x00'}}) write$binfmt_misc(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="73797a31988d214fa13ff3d2b883eaada8def8d3ff0b12a3bb3860d99040754aec2c59386724b98718343537a9e527f66e79e692d0aa6cd2f42af5ff7f00002b55bc4186409cbfc16d1d39a338b73f992c7d9984f3d176cd3a9b7e3161840a0d5d6e41b23e6bbaff218db1e2c5859bf6f4a1701dae64"], 0x66) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") [ 425.303069] device team_slave_0 left promiscuous mode [ 425.308710] device team_slave_1 left promiscuous mode [ 425.534102] device team0 entered promiscuous mode [ 425.539224] device team_slave_0 entered promiscuous mode [ 425.545090] device team_slave_1 entered promiscuous mode [ 425.552824] 8021q: adding VLAN 0 to HW filter on device team0 [ 425.561527] device team0 entered promiscuous mode [ 425.566845] device team_slave_0 entered promiscuous mode [ 425.572631] device team_slave_1 entered promiscuous mode [ 425.580211] 8021q: adding VLAN 0 to HW filter on device team0 [ 425.588783] device team0 left promiscuous mode [ 425.593539] device team_slave_0 left promiscuous mode [ 425.599131] device team_slave_1 left promiscuous mode 21:19:33 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="73797ac5"], 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000040), &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) shutdown(r0, 0x2) [ 425.754556] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 425.830904] device veth0_to_bridge entered promiscuous mode [ 425.837278] device team0 entered promiscuous mode [ 425.842232] device team_slave_0 entered promiscuous mode [ 425.848085] device team_slave_1 entered promiscuous mode [ 425.856469] 8021q: adding VLAN 0 to HW filter on device team0 [ 425.869340] device team0 left promiscuous mode [ 425.874243] device team_slave_0 left promiscuous mode 21:19:33 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"746517c35f736c6176455f3100", 0x8000}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 425.879785] device team_slave_1 left promiscuous mode 21:19:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000001c0)={0x0, 0x5}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={r0, 0x58, &(0x7f0000000240)=[@in6={0xa, 0x4e22, 0x2e30, @dev={0xfe, 0x80, [], 0x20}, 0x1000}, @in={0x2, 0x4e24, @loopback}, @in={0x2, 0x4e22, @remote}, @in6={0xa, 0x4e24, 0xffffffff, @ipv4={[], [], @remote}, 0x8}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dsp\x00', 0x400, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r2, 0x5382, &(0x7f0000000380)) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 425.930796] device veth0_to_bridge left promiscuous mode [ 425.946381] device team0 entered promiscuous mode [ 425.951529] device team_slave_0 entered promiscuous mode [ 425.957389] device team_slave_1 entered promiscuous mode 21:19:34 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000e5b000)={0x2, 0x10000004e20, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000ccb000)={0x2, 0x4e20}, 0x10) write$binfmt_misc(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="73797ac5"], 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x3, &(0x7f0000000040), &(0x7f00002bf000)='syzkaller\x00', 0x1, 0xb7, &(0x7f0000000440)=""/183}, 0x48) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f00000000c0)={r0, r1}) shutdown(r0, 0x2) [ 426.005470] 8021q: adding VLAN 0 to HW filter on device team0 [ 426.049479] device veth0_to_bridge left promiscuous mode [ 426.077638] device team0 left promiscuous mode [ 426.082858] device team_slave_0 left promiscuous mode [ 426.090167] device team_slave_1 left promiscuous mode 21:19:34 executing program 7: r0 = syz_open_dev$midi(&(0x7f0000000100)='/dev/midi#\x00', 0xa1, 0x0) getsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f00000002c0)={@empty, @dev, @dev}, &(0x7f0000000300)=0xc) r1 = socket(0x10, 0x100020000000802, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) ioctl$SG_SET_TIMEOUT(r2, 0x2201, &(0x7f00000000c0)=0x5) sendmsg$nl_generic(r1, &(0x7f0000000180)={&(0x7f0000000000), 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, 0x19, 0x401, 0x0, 0x0, {0x1c}, [@nested={0xc, 0x0, [@typed={0x8, 0x0, @uid}]}]}, 0x20}}, 0x0) r3 = dup(r1) ioctl$SCSI_IOCTL_PROBE_HOST(r3, 0x5385, &(0x7f00000001c0)={0xfb, ""/251}) socket$nl_xfrm(0x10, 0x3, 0x6) 21:19:34 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = syz_open_dev$mouse(&(0x7f0000000040)='/dev/input/mouse#\x00', 0x401, 0x1) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000080)={0x0, 0x7}, &(0x7f00000001c0)=0xa1) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f00000003c0)={r1, 0xc4, "9945b774175c9e0026633164e9d0ffa14934e12b0e6888e1b9301a358d68f733891fb1cbb2c2a5858ef122d0b1227f1ae33fc17d47a140281453d3d966f7b79af9bae2fe563f666d16049de6ea1eca7bd150586c2c5403f5faa63a84e23d3c19a86359a21022bd6a3ae4a1608891e77cacab35ff05aa02361aa1d9565a5e92acf77a838b87173a3f1af908e0bbb3ea4ef2b9882d3e95c53e93a1a63a86f05dd16ea51a125a1ea7a1a1351aff977a43d64c2607ce59cae3d1ad9ed70a32fdd2c81cc89c92"}, &(0x7f0000000200)=0xcc) r2 = accept$inet(0xffffffffffffffff, &(0x7f0000000540)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x7) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(r2, &(0x7f0000000300)={0xa0, 0x19, 0x0, {0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x7}}, 0xa0) 21:19:34 executing program 0: r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000001c0)='^\x00'}, 0x10) ioctl$GIO_FONT(r0, 0x4b60, &(0x7f0000000280)=""/194) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000240)='dctcp-reno\x00', 0xb) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @local}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x1) write(r3, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) ioctl$RNDADDENTROPY(r4, 0x40085203, &(0x7f00000003c0)={0x8000, 0x4adb24f49102db9f, "77408dc07e986b22d3211da450bfd66fd027df9a6acb72e57b49fa719f53b87ae4b443642810c916d8d009ce7fe677f9ad6ca953ffdcf1af1517e291757fb871bec2212798cb6a7c972bdfb46137249ebaf9ea3fd39ec84abddd763f8a2169df20fa5b17eefb9b5a754907eff2a408f4e41129691d404197fe2d7328f5af15c6dcae88a5e1c19e862aa2600c8774cac2bf8b49e5c73e7fe62da143ca92fe58b83af8cd47b439603bfefdf5c8a474940b83ed07000000fd5244cb1d84aaf470432752cc5725353bc2b18608ace6ec3a82e889beb47f43bb21a5c87bdb7f9aaa3a6be96743c24ba4dd"}) lsetxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.advise\x00', &(0x7f0000000100)='\x00', 0x1, 0x1) 21:19:34 executing program 5: r0 = syz_open_dev$sndtimer(&(0x7f0000000040)='/dev/snd/timer\x00', 0x0, 0x0) r1 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x77f, 0x1aa81) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r1, 0xc0505350, &(0x7f0000000080)={{0x6, 0x81}, {0xff, 0x1ff}, 0x0, 0x4, 0xfff}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000029fcc)={{0x2}}) 21:19:34 executing program 5: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f0000000280)=@abs, 0x6e) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r1, &(0x7f0000b82000)) sendmmsg$unix(r1, &(0x7f00000bd000), 0x80, 0x0) r3 = dup3(r1, r0, 0x0) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r3, 0x10e, 0x1, &(0x7f0000000000)=0x11, 0x4) 21:19:34 executing program 5: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x5, 0x7f, 0x7, 0x5}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f00000003c0), &(0x7f0000000080)}, 0x3bf) bpf$MAP_CREATE(0x4, &(0x7f0000000880)={0x6, 0x1, 0x7c, 0x0, 0x20000000, 0x0}, 0x2c) r1 = getuid() fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000040)='./file0\x00', r1, r2) 21:19:35 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) r1 = gettid() timer_create(0x0, &(0x7f0000044000)={0x0, 0x12, 0x0, @thr={&(0x7f0000000040), &(0x7f0000000140)}}, &(0x7f0000044000)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) r2 = socket$inet(0x2, 0x1, 0x0) mmap(&(0x7f000092d000/0x400000)=nil, 0x400000, 0xfffffffffffffffc, 0x8972, 0xffffffffffffffff, 0x0) r3 = request_key(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={0x73, 0x79, 0x7a, 0x3}, &(0x7f00000002c0)='/dev/rfkill\x00', 0xfffffffffffffff8) add_key$user(&(0x7f0000000180)='user\x00', &(0x7f00000001c0)={0x73, 0x79, 0x7a, 0x3}, &(0x7f0000000200)="0178baece8e372391cefec6d99f702ba86f4eefb9fc38026a22dd0fbdd721b948f45379450d465d7e1da0d911f49781d45ac766167", 0x35, r3) bind$inet(r2, &(0x7f0000000300)={0x2, 0x4e25, @broadcast}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @loopback}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000340)='/dev/rfkill\x00', 0x80000, 0x0) connect$inet(r2, &(0x7f00009322c4)={0x2, 0x0, @local={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x2000, 0x0) ioctl$TCSETAF(r4, 0x5408, &(0x7f0000000040)={0x3ff, 0x6, 0x2, 0x3, 0x3e000000, 0x7, 0x5, 0x7, 0x7, 0x7f}) connect$inet(r2, &(0x7f0000000080)={0x2, 0x4e23, @loopback}, 0x10) sendto$inet(r2, &(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000140)={0x2, 0xfff, @local}, 0x10) bind$inet(r2, &(0x7f0000000380)={0x2, 0x4e22, @loopback}, 0x10) rt_tgsigqueueinfo(r1, r1, 0xc, &(0x7f0000000100)={0xd, 0x6c9d4654, 0x7fffffff, 0x3}) dup2(r0, r2) tkill(r1, 0x1000200000016) 21:19:35 executing program 2: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000200)={0x3, {{0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x6}}}}, 0x88) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f00000001c0)) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r1, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") getsockopt$inet_mreqn(r1, 0x0, 0x24, &(0x7f0000000040)={@multicast1, @multicast1}, &(0x7f00000000c0)=0xc) r2 = syz_open_dev$usbmon(&(0x7f0000000100)='/dev/usbmon#\x00', 0x1, 0x200000) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000140)={0x5, 0xd, 0x5}) [ 427.172733] device team0 entered promiscuous mode [ 427.177851] device team_slave_0 entered promiscuous mode [ 427.183629] device team_slave_1 entered promiscuous mode 21:19:35 executing program 5: r0 = inotify_init1(0x0) fcntl$setown(r0, 0x8, 0xffffffffffffffff) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x100, 0x0) mq_timedsend(r2, &(0x7f0000000200)="97a51c2e33d06b366b78d1976f4f53a48160391a6aa6b1b584bdd656d1230fa6045955d91f4294bb969cb8a1d9c1d16623d8d8f13dbdad7fcaad0342e14b0e7db452458e8a971d4602106459971e1e56be460386f2236b05de1dbdfad4d7e1cb82f4cc8c2714aadf7227f74ae3280a845e2d33342b12cd8ca5bcc39f3c809b5fc163bb008ac973b572ddaedf992056799501ea5cb194c81e786329d9d59470396f51b884c1023e0041329481751b79429fa8930db06b784da8aacd5f814e51b5b0df5a0d1456b787c63da56c0516831b22f0c23056917f", 0xd7, 0x6, &(0x7f0000000080)={0x77359400}) ptrace$setopts(0x4206, r1, 0x0, 0x0) ptrace(0x4207, r1) ptrace$setregset(0x4205, r1, 0x201, &(0x7f0000000100)={&(0x7f0000000200)}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)=""/151, 0x97) [ 427.217062] 8021q: adding VLAN 0 to HW filter on device team0 [ 427.226612] device veth0_to_bridge entered promiscuous mode [ 427.233073] netlink: 4 bytes leftover after parsing attributes in process `syz-executor7'. [ 427.242814] device veth0_to_bridge left promiscuous mode [ 427.257877] device team0 left promiscuous mode [ 427.262671] device team_slave_0 left promiscuous mode [ 427.268352] device team_slave_1 left promiscuous mode 21:19:35 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000380)='/dev/snd/pcmC#D#c\x00', 0x3, 0x400000) r1 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffff9c, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sequencer\x00', 0x8400, 0x0) setsockopt$inet_sctp6_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x7, &(0x7f0000000340), 0x4) r3 = socket(0x10, 0x802, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) sched_rr_get_interval(r4, &(0x7f0000000240)) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f00000004c0)='./file0\x00', 0x38) [ 427.313487] device team0 entered promiscuous mode [ 427.318518] device team_slave_0 entered promiscuous mode [ 427.324337] device team_slave_1 entered promiscuous mode [ 427.335367] 8021q: adding VLAN 0 to HW filter on device team0 [ 427.363821] netlink: 4 bytes leftover after parsing attributes in process `syz-executor7'. [ 427.372543] device veth0_to_bridge entered promiscuous mode [ 427.412714] device veth0_to_bridge left promiscuous mode 21:19:35 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x8, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) pipe(&(0x7f0000000300)={0xffffffffffffffff}) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r2, 0x84, 0x19, &(0x7f0000000340)={r1, 0xff}, 0x8) r3 = socket(0x14, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) getpeername(r0, &(0x7f0000000040)=@ipx, &(0x7f00000001c0)=0x80) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000480)={r2, &(0x7f0000000380)="8676db683133e08d59f3c4dc43935fd707041aed959deafe1ab3ba860b591352726c4bf4f257b2975c8173f9cf0a539e3d39e998fb6f794a5008abba6a10c462f91de3dae75eae355dd6f9188e67753a460e572c46f455d6501defaf57269808434f5eab3cd4c7b72876a10cac9c68cb946bc5332d09987a645c754ff8d1bdd57ec8be8d2441a5a20326c6235a4f559ee9daa4270a71c4f771299539af826862386dadab297b5b1b70d395996a9cafc1f5b82e92ad0a1aa9a09e8b74d1321c3112fb5b387fafec8964b89f73398505b646e0b8", &(0x7f0000000540)=""/144}, 0x18) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) setsockopt$inet_udp_int(r3, 0x11, 0x65, &(0x7f00000004c0)=0x10000, 0x4) 21:19:35 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000100)=0x39f) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x40000, 0x0) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000000c0)={0x18, 0x0, {0x3, @local, 'bpq0\x00'}}) write$binfmt_misc(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="73797a31988d214fa13ff3d2b883eaada8def8d3ff0b12a3bb3860d99040754aec2c59386724b98718343537a9e527f66e79e692d0aa6cd2f42af5ff7f00002b55bc4186409cbfc16d1d39a338b73f992c7d9984f3d176cd3a9b7e3161840a0d5d6e41b23e6bbaff218db1e2c5859bf6f4a1701dae64"], 0x66) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:19:35 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"746517c35f736c6176455f3100", 0x8000}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:35 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x10001, 0x10000) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000200)) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 427.541472] device team0 entered promiscuous mode [ 427.546635] device team_slave_0 entered promiscuous mode [ 427.553477] device team_slave_1 entered promiscuous mode 21:19:35 executing program 7: r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1, 0x0) connect$vsock_dgram(r0, &(0x7f0000000040)={0x28, 0x0, 0xffffffff}, 0x10) ioctl(r0, 0x8bc9, &(0x7f00000000c0)) r1 = msgget$private(0x0, 0x400) msgctl$IPC_INFO(r1, 0x3, &(0x7f0000000080)=""/183) 21:19:35 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f00000000c0), 0x4) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000080)={'veth1_to_bridge\x00', {0x2, 0x4e20, @local}}) 21:19:35 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) io_setup(0xd10, &(0x7f0000000040)=0x0) io_destroy(r1) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") r2 = syz_open_dev$sndpcmc(&(0x7f0000000640)='/dev/snd/pcmC#D#c\x00', 0x101, 0x20000) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000680)={0x0, 0x80000001, 0x2, [0x1, 0x8]}, &(0x7f00000006c0)=0xc) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x1a, &(0x7f0000000700)={r3, 0xa3, "e53261b08a3796f50fe539f8d0951e7ac20e2929e11f7315bce3ed2aa07c3b399e0e0bb004474316b2c5f18239f75369d93568adec19d5faf8336e0e692c7ecf856bb490ed978cc3206a0479e044bb2ef66f7bc49de75c35d486f8af3db3a4695c79b686841438f544b7acc57cec4bdc83203adb4458700832d7e18d66db4e47131f91eced730d9f8a4de6f1027851aafcd4f889bdecec122ee08990b84b740edc5e09"}, &(0x7f00000007c0)=0xab) modify_ldt$write(0x1, &(0x7f00000000c0)={0xffffffff, 0x0, 0x0, 0x6, 0x9, 0x8, 0x10001, 0x1, 0x4, 0x1}, 0x10) [ 427.732283] 8021q: adding VLAN 0 to HW filter on device team0 21:19:35 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x200040, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r1, &(0x7f0000000300)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e21, 0x101, @dev={0xfe, 0x80, [], 0x20}, 0x5f}, r2}}, 0x30) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) write$FUSE_POLL(r1, &(0x7f0000000340)={0x18, 0x0, 0x8, {0x80000000}}, 0x18) ioctl$EVIOCGLED(r0, 0x80404519, &(0x7f0000000380)=""/145) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffddc000", 0x2000}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) [ 427.876300] device team0 left promiscuous mode [ 427.881090] device team_slave_0 left promiscuous mode [ 427.886638] device team_slave_1 left promiscuous mode 21:19:35 executing program 7: statfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000001c0)=""/183) r0 = socket$kcm(0x29, 0x5, 0x0) getsockopt(r0, 0x1, 0x2, &(0x7f0000000080)=""/198, &(0x7f0000000180)=0xc6) fcntl$addseals(r0, 0x409, 0x5) [ 427.919359] device team0 left promiscuous mode [ 427.924495] device team_slave_0 left promiscuous mode [ 427.931999] device team_slave_1 left promiscuous mode 21:19:36 executing program 7: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000000c0)={r1}) r2 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @dev}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000000100)=0xe8) getresgid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000440)={0xa0, 0x0, 0x7, {{0x5, 0x1, 0x7, 0x3ff, 0x7, 0x6, {0x1, 0x2, 0x8319, 0xc989, 0x7, 0xffffffff, 0x2, 0x4, 0x100000001, 0x4, 0x29fd, r3, r4, 0xda, 0x3}}, {0x0, 0x4}}}, 0xa0) r5 = syz_open_procfs(r2, &(0x7f0000000140)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$RNDGETENTCNT(r5, 0x80045200, &(0x7f0000000080)) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)) ioctl$EVIOCGABS20(r5, 0x80184560, &(0x7f0000000280)=""/178) 21:19:36 executing program 7: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.swap.current\x00', 0x0, 0x0) socketpair$inet6_dccp(0xa, 0x6, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x89e1, &(0x7f00000000c0)={r1}) r2 = fcntl$getown(r0, 0x9) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @dev}, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@rand_addr}, 0x0, @in=@rand_addr}}, &(0x7f0000000100)=0xe8) getresgid(&(0x7f00000001c0)=0x0, &(0x7f0000000200), &(0x7f0000000240)) write$FUSE_CREATE_OPEN(r0, &(0x7f0000000440)={0xa0, 0x0, 0x7, {{0x5, 0x1, 0x7, 0x3ff, 0x7, 0x6, {0x1, 0x2, 0x8319, 0xc989, 0x7, 0xffffffff, 0x2, 0x4, 0x100000001, 0x4, 0x29fd, r3, r4, 0xda, 0x3}}, {0x0, 0x4}}}, 0xa0) r5 = syz_open_procfs(r2, &(0x7f0000000140)="2f65786500000000000489004bddd9de91be10eebf000ee91e18f0c76fbb232a07424ae1e901d2da75af1f0200f5ab26d7e071fb35331ce39c5a0000") ioctl$RNDGETENTCNT(r5, 0x80045200, &(0x7f0000000080)) ioctl$FS_IOC_FSGETXATTR(r5, 0xc0c0583b, &(0x7f0000000040)) ioctl$EVIOCGABS20(r5, 0x80184560, &(0x7f0000000280)=""/178) 21:19:36 executing program 7: r0 = socket$kcm(0x2, 0xa, 0x0) r1 = socket$inet(0x2, 0x8000f, 0x9) getsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000180), &(0x7f00000001c0)=0xb) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=ANY=[], &(0x7f0000000200)="47501a00f9d3c471b4a5430b11691d81fb4b9c49106ab3a01eaa6e1494e10112f6e527a746961b2da661bc0517d1fed124f6efb4292dc4c6df52a2c0623cdc1a18767d961c26d3aa8c633a234967dfe047b15997efc5a3bb522cb0393846dcc3f6e76a288635697c642b3cc7b3b36b3d1354dd508712a1f15e3b542d8a0c0c9a73d19d952bcef7d7d5cb703b44c4f17e5f76e7a2f9c44e076fb1000000000000000000000000000000", 0x2, 0xab93031f99fda67f, &(0x7f0000000080)=""/251}, 0x48) sendmsg(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)=@nfc={0x27, 0x0, 0x2}, 0x80, &(0x7f0000000180)}, 0x0) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000040)={0x0, @empty, 0x0, 0x0, "6f7666008800"}, 0x2c) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890b, &(0x7f0000000000)) ioctl$sock_kcm_SIOCKCMUNATTACH(r0, 0x890c, &(0x7f0000000000)) [ 428.743866] device team0 entered promiscuous mode [ 428.749096] device team_slave_0 entered promiscuous mode [ 428.754896] device team_slave_1 entered promiscuous mode [ 428.762679] 8021q: adding VLAN 0 to HW filter on device team0 [ 428.770113] device veth0_to_bridge entered promiscuous mode [ 428.783554] device team0 left promiscuous mode [ 428.788270] device team_slave_0 left promiscuous mode [ 428.793868] device team_slave_1 left promiscuous mode 21:19:36 executing program 4: mknod$loop(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r0 = inotify_init() r1 = syz_open_dev$dmmidi(&(0x7f00000001c0)='/dev/dmmidi#\x00', 0x101, 0x40) getsockopt$IPT_SO_GET_REVISION_MATCH(r1, 0x0, 0x42, &(0x7f0000000080)={'HL\x00'}, &(0x7f0000000180)=0x1e) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f00000000c0)=0x7fff) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x400) unlink(&(0x7f0000000040)='./file0\x00') ioctl$RTC_VL_READ(r1, 0x80047013, &(0x7f0000000100)) sync_file_range(r0, 0x800, 0x40, 0x3) 21:19:36 executing program 5: socketpair(0x11, 0xa, 0x2, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r0, 0x114, 0xa, &(0x7f0000000040), 0x1) r1 = socket$inet6(0xa, 0x5, 0x0) bind$inet6(r1, &(0x7f0000000080)={0xa, 0x4e23}, 0x1c) listen(r1, 0xa0cd) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x40004e23, 0x0, @loopback}, 0x1c) mq_getsetattr(r0, &(0x7f00000000c0)={0x7f, 0x9, 0x4, 0x9, 0x4, 0x0, 0x352, 0x9}, &(0x7f0000000100)) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000280)={0x0, @in={{0x2, 0x4e23, @local}}, 0x9}, 0x90) ioctl$TUNSETGROUP(r0, 0x400454ce, 0x0) 21:19:37 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a4cc80700315f85715070") r1 = syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x5c832, 0xffffffffffffffff, 0x0) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f00000000c0)) ioprio_set$pid(0x2, 0x0, 0x4006) getsockopt$SO_COOKIE(r0, 0x1, 0x39, &(0x7f0000000040), &(0x7f0000000100)=0x8) [ 429.228515] device team0 entered promiscuous mode [ 429.233591] device team_slave_0 entered promiscuous mode [ 429.239400] device team_slave_1 entered promiscuous mode [ 429.247593] 8021q: adding VLAN 0 to HW filter on device team0 [ 429.256249] device team0 left promiscuous mode [ 429.261141] device team_slave_0 left promiscuous mode [ 429.266680] device team_slave_1 left promiscuous mode 21:19:37 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0xee, 0x220300) r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r3 = syz_open_dev$vcsn(&(0x7f00000001c0)='/dev/vcs#\x00', 0x44f5, 0x40) ioctl$LOOP_CTL_ADD(r3, 0x4c80, r2) r4 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r5 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) readv(r4, &(0x7f0000003800)=[{&(0x7f0000000700)=""/4096, 0x1000}, {&(0x7f0000000240)=""/96, 0x60}, {&(0x7f0000000340)=""/48, 0x30}, {&(0x7f0000000540)=""/195, 0xc3}, {&(0x7f0000000480)=""/73, 0x49}, {&(0x7f0000001700)=""/4096, 0x1000}, {&(0x7f0000002700)=""/4096, 0x1000}, {&(0x7f0000003700)=""/236, 0xec}], 0x8) 21:19:37 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) ioctl(r0, 0x8912, &(0x7f0000000200)="0a5cc80700315f85715070") r1 = syz_open_dev$sg(&(0x7f0000000380)='/dev/sg#\x00', 0x5, 0x101400) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000000)={{{@in=@remote, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@local}}, &(0x7f0000000100)=0xe8) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r3, r4) r5 = syz_open_dev$usbmon(&(0x7f0000000240)='/dev/usbmon#\x00', 0x81, 0x20002) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000280)={r2, 0x1, 0x6, @broadcast}, 0x10) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000002, 0x52, r1, 0x0) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0xa) mmap(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x2, 0x1010, r1, 0x5d) openat$vcs(0xffffffffffffff9c, &(0x7f0000000ff7)='/dev/vcs\x00', 0x0, 0x0) [ 429.278881] device team0 left promiscuous mode [ 429.283812] device team_slave_0 left promiscuous mode [ 429.289490] device team_slave_1 left promiscuous mode [ 429.320993] device team0 entered promiscuous mode [ 429.326135] device team_slave_0 entered promiscuous mode [ 429.332062] device team_slave_1 entered promiscuous mode [ 429.366675] 8021q: adding VLAN 0 to HW filter on device team0 [ 429.374499] device veth0_to_bridge left promiscuous mode [ 429.426085] device team0 left promiscuous mode [ 429.431116] device team_slave_0 left promiscuous mode [ 429.438314] device team_slave_1 left promiscuous mode 21:19:37 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x800, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:37 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000080)=[{0x6, 0xee4}, {0x8, 0x3}, {0x8, 0xa3e3}, {0x3}, {0x2, 0x1}, {0x8, 0xa4}, {0x7, 0x8001}, {0x3, 0x8}, {0x4, 0x7}], 0x9) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:37 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x109000, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f0000000080)={@loopback, @multicast1}, &(0x7f00000001c0)=0x8) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000100)={{0x0, 0x0, 0x80000001, 0xffffffffffffffff}, 0x2, 0xfffffffffffffffe}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$BLKTRACESTART(r0, 0x1274, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) write$input_event(r0, &(0x7f0000000300)={{}, 0x11, 0x10001, 0x9a82}, 0x18) 21:19:37 executing program 4: r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0xe72, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x5, &(0x7f0000000040)=[{0x5, 0x9, 0x0, 0x800}, {0x2, 0xfffffffffffffff8, 0xfffffffffffffffd, 0xfffffffffffffffb}, {0x2, 0x6, 0xfffffffffffffe01, 0x18}, {0x80000001, 0x6, 0x8, 0x8}, {0x9, 0x8001, 0xfffffffffffff6f4, 0x8}]}, 0x10) read$FUSE(r0, &(0x7f0000000100), 0x1000) seccomp(0x2, 0x1, &(0x7f00000000c0)={0x0, &(0x7f0000000100)}) 21:19:37 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0x3) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000040)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) close(r0) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9ce8}, 0xb) socketpair$inet_udplite(0x2, 0x2, 0x88, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_DEL(r2, 0x0, 0x484, &(0x7f00000000c0)={0xdf, @empty, 0x4e23, 0x1, 'wrr\x00', 0x4, 0x3f, 0x10}, 0x2c) [ 430.381119] device team0 entered promiscuous mode [ 430.386115] device team_slave_0 entered promiscuous mode [ 430.391923] device team_slave_1 entered promiscuous mode [ 430.399700] 8021q: adding VLAN 0 to HW filter on device team0 [ 430.412188] device veth0_to_bridge entered promiscuous mode [ 430.420502] device team0 left promiscuous mode [ 430.425251] device team_slave_0 left promiscuous mode [ 430.430802] device team_slave_1 left promiscuous mode 21:19:38 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) iopl(0x7fffffff) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:19:38 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x100008912, &(0x7f0000000100)="025cc80700145f8f764070") r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r1, 0x107, 0x16, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x16}]}, 0x10) r2 = memfd_create(&(0x7f0000000140)='\x00', 0x3) write$P9_RLINK(r2, &(0x7f0000000180)={0x7, 0x47, 0x2}, 0x7) syz_emit_ethernet(0x3e, &(0x7f0000000080)={@link_local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x8, 0x11, 0x0, @empty, @mcast2, {[], @udp={0x0, 0x0, 0x8}}}}}}, &(0x7f0000775000)) 21:19:38 executing program 5: r0 = socket(0x40000000015, 0x5, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000001a40)={&(0x7f0000001140)={0x2, 0x0, @local}, 0x10, &(0x7f0000001280), 0x0, &(0x7f0000002b00)=[@zcopy_cookie={0x18, 0x114, 0xc, 0x3}, @cswp={0x58, 0x114, 0x7, {{0x101, 0xffffffff}, &(0x7f00000014c0)=0x5, &(0x7f0000001500)=0x7, 0xa0, 0x7ff, 0xad, 0x4, 0x0, 0x7}}, @rdma_args={0x48, 0x114, 0x1, {{0x5d, 0x7}, {&(0x7f0000001540)=""/204, 0xcc}, &(0x7f0000001940)=[{&(0x7f0000001640)=""/178, 0xb2}, {&(0x7f0000001700)=""/185, 0xb9}, {&(0x7f00000017c0)=""/147, 0x93}, {&(0x7f0000001b00)=""/4096, 0x1000}, {&(0x7f0000001880)=""/44, 0x2c}, {&(0x7f00000018c0)=""/124, 0x7c}], 0x6, 0x21, 0x200}}, @zcopy_cookie={0x18}], 0xd0, 0x149d36d49757994f}, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@mcast1, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000240)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000005200)={{{@in6=@local, @in=@rand_addr, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@local}}, &(0x7f0000005300)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000005400)={{{@in=@multicast1, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@rand_addr}}, &(0x7f0000005500)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000005540)={'team0\x00', 0x0}) accept$packet(r0, &(0x7f0000005580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000055c0)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000007a00)={'team0\x00', 0x0}) recvmsg(r0, &(0x7f0000008000)={&(0x7f0000007a40)=@xdp={0x2c, 0x0, 0x0}, 0x80, &(0x7f0000007f00)=[{&(0x7f0000007ac0)}, {&(0x7f0000007b00)=""/245, 0xf5}, {&(0x7f0000007c00)=""/48, 0x30}, {&(0x7f0000007c40)=""/60, 0x3c}, {&(0x7f0000007c80)=""/211, 0xd3}, {&(0x7f0000007d80)=""/172, 0xac}, {&(0x7f0000007e40)=""/186, 0xba}], 0x7, &(0x7f0000007f80)=""/109, 0x6d, 0xbb55}, 0x40) accept4$packet(r0, &(0x7f0000008040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008080)=0x14, 0x800) getsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f00000083c0)={0x0, @broadcast, @broadcast}, &(0x7f0000008400)=0xc) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000008480)={{{@in6=@mcast2, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@loopback}}, &(0x7f0000008580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008980)={{{@in, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@dev}}, &(0x7f0000008a80)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000008bc0)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@ipv4={[], [], @local}}}, &(0x7f0000008cc0)=0xe8) getsockname$packet(r0, &(0x7f0000008d00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000008d40)=0x14) sendmsg$can_bcm(r0, &(0x7f0000000340)={&(0x7f0000000200)={0x1d, r14}, 0x10, &(0x7f0000000300)={&(0x7f0000000280)={0x1, 0x10, 0x400, {}, {}, {0x1, 0x5, 0xfffffffffffffffa, 0x1}, 0x1, @can={{0x3, 0xff, 0x3, 0xffff}, 0x4, 0x2, 0x0, 0x0, "fec98d0f650a0f03"}}, 0x48}, 0x1, 0x0, 0x0, 0x4040080}, 0x4000000) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000008d80)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000008dc0)={'team0\x00', 0x0}) accept$packet(r0, &(0x7f0000008e00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000008e40)=0x14) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000008e80)={@local, @broadcast, 0x0}, &(0x7f0000008ec0)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000009440)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000009400)={&(0x7f0000008f00)={0x4d4, r1, 0x8, 0x70bd2c, 0x25dfdbfd, {}, [{{0x8, 0x1, r2}, {0x44, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r3}}, {0x8}}}]}}, {{0x8, 0x1, r4}, {0x168, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r6}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r7}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7766}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r9}}}]}}, {{0x8, 0x1, r10}, {0x178, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r12}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3ff}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x17c, 0x2, [{0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x10001}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x2800000000}}, {0x8, 0x6, r17}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xffffffff}}, {0x8, 0x6, r18}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xd9b3}}, {0x8, 0x6, r19}}}]}}]}, 0x4d4}, 0x1, 0x0, 0x0, 0x7fd23de0fd1a69}, 0x8800) 21:19:38 executing program 7: setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(0xffffffffffffffff, 0x84, 0x64, &(0x7f0000000080)=[@in={0x2, 0x4e20, @loopback}, @in6={0xa, 0x0, 0x0, @remote}], 0x2c) [ 430.498182] device team0 entered promiscuous mode [ 430.503308] device team_slave_0 entered promiscuous mode [ 430.509156] device team_slave_1 entered promiscuous mode [ 430.556303] 8021q: adding VLAN 0 to HW filter on device team0 [ 430.569289] device team0 entered promiscuous mode [ 430.574285] device team_slave_0 entered promiscuous mode [ 430.580126] device team_slave_1 entered promiscuous mode 21:19:38 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f00000001c0), 0xc, &(0x7f0000000380)={&(0x7f0000000000)=@getstats={0x1c, 0x5e, 0x3eb667d028874899}, 0x1c}}, 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x1, 0x80) ioctl$EVIOCSABS3F(r2, 0x401845ff, &(0x7f00000000c0)={0x60, 0xf1, 0x100000001, 0x400, 0x200, 0x3}) sendmmsg$alg(r1, &(0x7f0000000140)=[{0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000100)}], 0x492492492492805, 0x0) [ 430.617307] 8021q: adding VLAN 0 to HW filter on device team0 [ 430.628850] device team0 left promiscuous mode [ 430.633585] device team_slave_0 left promiscuous mode [ 430.639175] device team_slave_1 left promiscuous mode 21:19:38 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'lo\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000040)={r1, 0x1, 0x6, @remote}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x3, 0x6, @remote}, 0x10) socket$nl_route(0x10, 0x3, 0x0) 21:19:38 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = dup3(r0, r0, 0x80000) write$FUSE_NOTIFY_STORE(r1, &(0x7f00000001c0)={0x2e, 0x4, 0x0, {0x4, 0x4, 0x6, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}}, 0x2e) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) r2 = perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(r2, 0xfffffdffffffff00, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 430.963307] device team0 left promiscuous mode [ 430.968143] device team_slave_0 left promiscuous mode [ 430.973667] device team_slave_1 left promiscuous mode [ 430.985168] device team0 entered promiscuous mode [ 430.990369] device team_slave_0 entered promiscuous mode [ 430.996236] device team_slave_1 entered promiscuous mode [ 431.005941] 8021q: adding VLAN 0 to HW filter on device team0 [ 431.016238] device veth0_to_bridge left promiscuous mode [ 431.023107] device team0 left promiscuous mode [ 431.027923] device team_slave_0 left promiscuous mode [ 431.033451] device team_slave_1 left promiscuous mode 21:19:39 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000240)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sequencer\x00', 0x8000, 0x0) accept$inet(r0, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f00000001c0)=0xffffffffffffff29) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) setsockopt$IP6T_SO_SET_ADD_COUNTERS(r1, 0x29, 0x41, &(0x7f0000000340)={'filter\x00', 0x2, [{}, {}]}, 0x48) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) ioctl$UFFDIO_WAKE(r0, 0x8010aa02, &(0x7f00000003c0)={&(0x7f0000ffc000/0x1000)=nil, 0x1000}) getsockopt$packet_int(r0, 0x107, 0xb, &(0x7f0000000180), &(0x7f0000000280)=0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) [ 431.063587] device team0 entered promiscuous mode [ 431.068629] device team_slave_0 entered promiscuous mode [ 431.076520] device team_slave_1 entered promiscuous mode 21:19:39 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) r3 = dup2(r0, r0) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000000080)={r2}) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) [ 431.135199] 8021q: adding VLAN 0 to HW filter on device team0 [ 431.204640] device lo entered promiscuous mode [ 431.215090] device team0 entered promiscuous mode [ 431.220265] device team_slave_0 entered promiscuous mode [ 431.227464] device team_slave_1 entered promiscuous mode 21:19:39 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000040)=@get={0x1, &(0x7f0000000300)=""/157, 0x1}) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:39 executing program 7: r0 = socket$inet6(0xa, 0x2100000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x4e24, 0x0, @ipv4={[], [], @loopback}}, 0x1c) removexattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="736563757269742e766d6a657430776c61743073797374656d6d643573756d00008dacf56d9b2c6490b69e2fd36fba973559108c3412fff70904a8cdf8d17e831b7a9d52283eedd9abff9851"]) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@remote, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x400000000002}, {}, {}, 0x0, 0x0, 0x1}, {{@in6=@mcast2, 0x0, 0x33}, 0x0, @in6=@loopback}}, 0xe8) sendmsg(r0, &(0x7f0000001700)={0x0, 0xfffffde2}, 0x0) 21:19:39 executing program 4: futex(&(0x7f000000cffc), 0x5, 0x0, &(0x7f0000000100), &(0x7f0000000080), 0xbffffffd) r0 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x0, 0x5) getsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000200), &(0x7f0000000240)=0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000300)={0x0, 0x57, "d9cabdbc06e66529b28ed9f809d1475850a98518cd73f65513d8a33d8667dc7ef97293562298c4e151e8f315bb4b7b8cbca2ca2739955dd57bb311800ddaa63e904d026fd892ff92d2083cc89956453cd09085ee18812d"}, &(0x7f0000000380)=0x5f) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f00000003c0)=@assoc_value={r1, 0x640}, &(0x7f0000000400)=0x8) r2 = shmget(0x1, 0x2000, 0x1, &(0x7f0000ffb000/0x2000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000000)=""/21) r3 = getpgrp(0xffffffffffffffff) getsockopt$inet6_mreq(r0, 0x29, 0x15, &(0x7f0000000280)={@dev}, &(0x7f00000002c0)=0x14) wait4(r3, &(0x7f00000000c0), 0x8, &(0x7f0000000140)) shmctl$SHM_UNLOCK(r2, 0xc) [ 431.308198] 8021q: adding VLAN 0 to HW filter on device team0 [ 431.423544] device team0 left promiscuous mode [ 431.428415] device team_slave_0 left promiscuous mode [ 431.433964] device team_slave_1 left promiscuous mode [ 431.462962] futex_wake_op: syz-executor4 tries to shift op by -1; fix this program 21:19:39 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000140)='system]cgroup\x00', 0x0) pwritev(r1, &(0x7f0000000a80)=[{&(0x7f0000000980)="94", 0x1}], 0x1, 0x81806) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) kcmp(r2, r3, 0x0, r0, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x29ac) sendfile(r0, r1, &(0x7f0000000080), 0x4000000000000007) fadvise64(r0, 0x0, 0x8000, 0x4) [ 431.480885] device team0 entered promiscuous mode [ 431.485920] device team_slave_0 entered promiscuous mode [ 431.491763] device team_slave_1 entered promiscuous mode [ 431.503370] futex_wake_op: syz-executor4 tries to shift op by -1; fix this program 21:19:39 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') r1 = dup2(r0, r0) ioctl$SNDRV_CTL_IOCTL_TLV_READ(r1, 0xc008551a, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000c00f8ff01000232a0a608640679d00016e526c0e2eb95f71d17728722396bf9a6b7b624c445f34b0703137816"]) kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dsp\x00', 0x80000, 0x0) getsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xb, &(0x7f0000000100), &(0x7f0000000140)=0xb) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)='eql\x00') openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x100, 0x0) ioctl$TCFLSH(r2, 0x540b, 0x0) [ 431.525910] 8021q: adding VLAN 0 to HW filter on device team0 [ 431.546261] device veth0_to_bridge entered promiscuous mode [ 431.556458] device team0 left promiscuous mode [ 431.561223] device team_slave_0 left promiscuous mode [ 431.567294] device team_slave_1 left promiscuous mode [ 431.594868] device team0 left promiscuous mode [ 431.599647] device team_slave_0 left promiscuous mode [ 431.605261] device team_slave_1 left promiscuous mode 21:19:39 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="0a5cc80700315f85714070") r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$VHOST_SET_VRING_BASE(r1, 0xaf01, &(0x7f0000000000)) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=""/193, &(0x7f0000000280)=""/97, &(0x7f0000000300)=""/127}) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000700)=ANY=[]) ioctl$VHOST_SET_VRING_ADDR(r1, 0x4028af11, &(0x7f0000000780)={0x1, 0x0, &(0x7f0000000380)=""/115, &(0x7f0000000580)=""/156, &(0x7f0000000940)=""/185}) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000040)=0xfffffffffffffffc) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f0000000080)) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vga_arbiter\x00', 0x800, 0x0) 21:19:39 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000140)='system]cgroup\x00', 0x0) pwritev(r1, &(0x7f0000000a80)=[{&(0x7f0000000980)="94", 0x1}], 0x1, 0x81806) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) kcmp(r2, r3, 0x0, r0, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x29ac) sendfile(r0, r1, &(0x7f0000000080), 0x4000000000000007) fadvise64(r0, 0x0, 0x8000, 0x4) [ 432.135943] device team0 entered promiscuous mode [ 432.141132] device team_slave_0 entered promiscuous mode [ 432.147054] device team_slave_1 entered promiscuous mode [ 432.159211] 8021q: adding VLAN 0 to HW filter on device team0 [ 432.169953] device team0 entered promiscuous mode [ 432.174971] device team_slave_0 entered promiscuous mode [ 432.180796] device team_slave_1 entered promiscuous mode 21:19:40 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x0, 0x82) r1 = memfd_create(&(0x7f0000000140)='system]cgroup\x00', 0x0) pwritev(r1, &(0x7f0000000a80)=[{&(0x7f0000000980)="94", 0x1}], 0x1, 0x81806) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000000)=0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f00000000c0)=0x0) kcmp(r2, r3, 0x0, r0, r1) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, 0xffffffffffffffff, 0x0, 0x29ac) sendfile(r0, r1, &(0x7f0000000080), 0x4000000000000007) fadvise64(r0, 0x0, 0x8000, 0x4) [ 432.192519] 8021q: adding VLAN 0 to HW filter on device team0 [ 432.210563] device team0 left promiscuous mode [ 432.215428] device team_slave_0 left promiscuous mode [ 432.221109] device team_slave_1 left promiscuous mode 21:19:40 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r0 = add_key$keyring(&(0x7f0000000380)='keyring\x00', &(0x7f0000000480)={0x73, 0x79, 0x7a, 0x1}, 0x0, 0x0, 0xfffffffffffffff8) add_key$user(&(0x7f0000000280)='user\x00', &(0x7f0000000340)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000240), 0x0, r0) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") r1 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) recvmsg(r1, &(0x7f00000004c0)={&(0x7f0000000140)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, 0x80, &(0x7f0000000240)=[{&(0x7f00000001c0)=""/94, 0x5e}, {&(0x7f0000000540)=""/245, 0xf5}], 0x2, &(0x7f0000000700)=""/230, 0xe6, 0x1}, 0x120) setsockopt$ALG_SET_AEAD_AUTHSIZE(r2, 0x117, 0x5, 0x0, 0xdf7) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 432.243559] device lo left promiscuous mode [ 432.250607] device team0 entered promiscuous mode [ 432.255856] device team_slave_0 entered promiscuous mode [ 432.261753] device team_slave_1 entered promiscuous mode [ 432.280249] 8021q: adding VLAN 0 to HW filter on device team0 [ 432.320675] device veth0_to_bridge left promiscuous mode [ 432.327470] device team0 left promiscuous mode [ 432.332193] device team_slave_0 left promiscuous mode [ 432.337750] device team_slave_1 left promiscuous mode 21:19:40 executing program 5: setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x2d, &(0x7f0000000080)={0xf, {{0xa, 0x4e24, 0x1, @empty, 0x7ff}}}, 0x88) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000000)=""/66, 0x42, 0x1, 0x0, 0x0) syncfs(0xffffffffffffffff) 21:19:40 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) socketpair$inet_tcp(0x2, 0x1, 0x0, &(0x7f00000000c0)) [ 432.477313] device team0 left promiscuous mode [ 432.482302] device team_slave_0 left promiscuous mode [ 432.489560] device team_slave_1 left promiscuous mode 21:19:40 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) getsockname(r0, &(0x7f00000000c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f00000001c0)=0x80) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0_to_bridge\x00', r1}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @local}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x4) write(r3, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:40 executing program 4: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="2331ab0fe251cdde926e4673f590d6c6949bb13d1bc6d89a8c"], 0x1, 0x0) msgrcv(r0, &(0x7f00000001c0)={0x0, ""/97}, 0x69, 0x3, 0x3000) msgctl$IPC_SET(r0, 0x1, &(0x7f00000003c0)) 21:19:40 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ppp\x00', 0xa0001, 0x0) ioctl$TIOCLINUX2(r0, 0x541c, &(0x7f0000000080)={0x2, 0x4, 0xfffffffffffff3ed, 0x7, 0xff, 0x7f}) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:40 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vhost-vsock\x00', 0x2, 0x0) ioctl$sock_SIOCBRADDBR(r1, 0x89a0, &(0x7f0000000000)='vcan0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000200000020001100") r2 = memfd_create(&(0x7f00000001c0)='/dev/vhost-vsock\x00', 0x1) ioctl$BLKSECDISCARD(r2, 0x127d, &(0x7f0000000200)=0x7fff) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='attr/prev\x00') setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e23, 0x400, @remote, 0xbe04}, {0xa, 0x4e24, 0x6, @empty, 0x8}, 0x3, [0x8, 0x80000000, 0x100, 0x0, 0x4, 0x2, 0x4, 0x6]}, 0x5c) 21:19:40 executing program 7: stat(&(0x7f0000000040)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000240)="4f00d346c8cc5364f1c4ee5ddfc18e532b104236dd3354d1422bd8bf5f5f8f8f7359614bb0dca38d5dc6a2df8b1da45d7c4eb9827f5713ee05f4b5f477efa5d000b5e2fac5475111b5dee238ffea5885bf17ea7a11cd33c1d9be0163fb9023a78b8b5bef0ccf12bc6ee166aa90f6a5a7cc1108c3909d54009c07683b530d5aeb40d5e8487cc41e72771758b71d81870f8cb6ff50f3eb23a5ab883bbd6209947da0bf56dcf5768342ab107e01") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev}, 0x79) r1 = syz_open_dev$dspn(&(0x7f0000e5bff6)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f00000015c0)) readv(r1, &(0x7f0000000600)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000340)=0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e22, 0x9, @ipv4, 0x2}, {0xa, 0x4e24, 0x80, @dev={0xfe, 0x80, [], 0x11}}, 0x7f, [0xe1, 0x7f, 0x4, 0x81, 0x80, 0x6, 0x25e9ccb4, 0x200]}, 0x5c) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000380)=r2) pivot_root(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='./file2\x00') bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000300)=0x7f, 0xfffffffffffffe10) 21:19:40 executing program 5: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$TIOCGPTPEER(r0, 0x5441, 0x10000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, 0x0, 0x6, 0xffffffffffffff9c}, 0x2c) 21:19:40 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r0, 0x0) read(r1, &(0x7f00000000c0)=""/91, 0x154) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0x10, 0x80800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e21, 0x558, @mcast1, 0x1}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x1f}, 0x1}, @in={0x2, 0x4e21, @multicast2}], 0x58) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x8000) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0xffbf) 21:19:41 executing program 5: r0 = perf_event_open(&(0x7f000025c000)={0x1, 0x70, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000080), 0x4) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r0, 0x0) read(r1, &(0x7f00000000c0)=""/91, 0x154) r2 = accept4$inet(0xffffffffffffffff, &(0x7f0000000140)={0x2, 0x0, @loopback}, &(0x7f0000000180)=0x10, 0x80800) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f00000001c0)=[@in={0x2, 0x4e21, @broadcast}, @in6={0xa, 0x4e21, 0x558, @mcast1, 0x1}, @in6={0xa, 0x4e22, 0x7, @dev={0xfe, 0x80, [], 0x1f}, 0x1}, @in={0x2, 0x4e21, @multicast2}], 0x58) r3 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x2, 0x8000) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000240)='tls\x00', 0xffbf) 21:19:41 executing program 5: r0 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r0, 0x10d, 0xeb, &(0x7f00000000c0), &(0x7f0000000080)=0x4) accept4$inet(r0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, &(0x7f0000000040)=0x10, 0x80000) r1 = accept(r0, &(0x7f0000000100)=@can, &(0x7f0000000180)=0x80) ioctl$PPPOEIOCSFWD(r1, 0x4008b100, &(0x7f00000001c0)={0x18, 0x0, {0x4, @remote, 'veth0\x00'}}) [ 433.585541] device team0 entered promiscuous mode [ 433.590589] device team_slave_0 entered promiscuous mode [ 433.596454] device team_slave_1 entered promiscuous mode [ 433.606132] 8021q: adding VLAN 0 to HW filter on device team0 [ 433.614531] device veth0_to_bridge entered promiscuous mode [ 433.629236] device team0 left promiscuous mode 21:19:41 executing program 5: r0 = getpgrp(0x0) r1 = syz_open_dev$sndseq(&(0x7f00000000c0)='/dev/snd/seq\x00', 0x0, 0x0) read(r1, &(0x7f0000000000)=""/28, 0x1c) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000400)={0xbf}) ioctl$SNDRV_SEQ_IOCTL_UNSUBSCRIBE_PORT(r1, 0x40505331, &(0x7f0000000200)={{0x0, 0xdd}}) ptrace$poke(0x5, r0, &(0x7f0000000100), 0x3) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0x408c5333, &(0x7f0000000340)={0x0, 0x0, 0x0, "717565756531000000000000001f00"}) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f0000000080)={{0x0, 0x989680}, {0x0, 0x9}}, &(0x7f0000000480)) tkill(r0, 0x1000000000013) [ 433.633934] device team_slave_0 left promiscuous mode [ 433.639504] device team_slave_1 left promiscuous mode 21:19:41 executing program 4: r0 = socket$inet6(0xa, 0x6, 0xffffffffffffffff) ioctl(r0, 0x8912, &(0x7f00000000c0)="0a5cc80700315f85715070") r1 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r1, &(0x7f00000000c0), 0xfd01, 0x8800, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c) setsockopt$inet6_int(r1, 0x29, 0x19, &(0x7f0000000040)=0x5, 0x4) setsockopt$inet6_buf(r1, 0x29, 0x3e, &(0x7f0000000080)="00000017", 0x4) sendto$inet6(r1, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000809000)={0xa, 0x0, 0x0, @loopback}, 0x1c) [ 433.691206] device team0 entered promiscuous mode [ 433.696291] device team_slave_0 entered promiscuous mode [ 433.702211] device team_slave_1 entered promiscuous mode [ 433.745105] 8021q: adding VLAN 0 to HW filter on device team0 [ 433.773737] device team0 entered promiscuous mode [ 433.778849] device team_slave_0 entered promiscuous mode [ 433.784622] device team_slave_1 entered promiscuous mode 21:19:41 executing program 7: stat(&(0x7f0000000040)='./file1\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) quotactl(0x1, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000240)="4f00d346c8cc5364f1c4ee5ddfc18e532b104236dd3354d1422bd8bf5f5f8f8f7359614bb0dca38d5dc6a2df8b1da45d7c4eb9827f5713ee05f4b5f477efa5d000b5e2fac5475111b5dee238ffea5885bf17ea7a11cd33c1d9be0163fb9023a78b8b5bef0ccf12bc6ee166aa90f6a5a7cc1108c3909d54009c07683b530d5aeb40d5e8487cc41e72771758b71d81870f8cb6ff50f3eb23a5ab883bbd6209947da0bf56dcf5768342ab107e01") perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000002740)={0xa, 0x0, 0x0, @dev}, 0x79) r1 = syz_open_dev$dspn(&(0x7f0000e5bff6)='/dev/dsp#\x00', 0x1, 0x0) ioctl$int_in(r1, 0x800000c004500a, &(0x7f00000015c0)) readv(r1, &(0x7f0000000600)=[{&(0x7f0000001600)=""/4096, 0x1000}], 0x1) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000340)=0x0) setsockopt$inet6_MRT6_DEL_MFC(r1, 0x29, 0xcd, &(0x7f0000000080)={{0xa, 0x4e22, 0x9, @ipv4, 0x2}, {0xa, 0x4e24, 0x80, @dev={0xfe, 0x80, [], 0x11}}, 0x7f, [0xe1, 0x7f, 0x4, 0x81, 0x80, 0x6, 0x25e9ccb4, 0x200]}, 0x5c) ioctl$TIOCSPGRP(r1, 0x5410, &(0x7f0000000380)=r2) pivot_root(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='./file2\x00') bpf$BPF_MAP_GET_NEXT_ID(0xc, &(0x7f0000000300)=0x7f, 0xfffffffffffffe10) [ 433.815801] 8021q: adding VLAN 0 to HW filter on device team0 [ 433.836367] device team0 left promiscuous mode [ 433.841091] device team_slave_0 left promiscuous mode [ 433.846596] device team_slave_1 left promiscuous mode 21:19:41 executing program 4: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000240)="0a5cc80700315f85070070") perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xe3, &(0x7f0000000080), &(0x7f0000000000)=0x6826a5205b11b66a) fchdir(r0) fcntl$getownex(r0, 0x10, &(0x7f00000000c0)={0x0, 0x0}) ptrace$getsig(0x4202, r2, 0xf6ce, &(0x7f0000000100)) [ 434.202170] device team0 entered promiscuous mode [ 434.207198] device team_slave_0 entered promiscuous mode [ 434.213098] device team_slave_1 entered promiscuous mode [ 434.222564] 8021q: adding VLAN 0 to HW filter on device team0 [ 434.231229] device team0 left promiscuous mode [ 434.235952] device team_slave_0 left promiscuous mode [ 434.241661] device team_slave_1 left promiscuous mode [ 434.276907] device team0 entered promiscuous mode [ 434.282096] device team_slave_0 entered promiscuous mode [ 434.287893] device team_slave_1 entered promiscuous mode [ 434.302514] 8021q: adding VLAN 0 to HW filter on device team0 [ 434.316809] device veth0_to_bridge left promiscuous mode [ 434.324883] device team0 left promiscuous mode [ 434.329665] device team_slave_0 left promiscuous mode [ 434.335268] device team_slave_1 left promiscuous mode [ 434.357490] BUG: Bad page map in process syz-executor0 pte:4e474007 pmd:1129f7067 [ 434.365364] page:ffffea0001d5ab80 count:0 mapcount:-1 mapping:0000000000000000 index:0x0 [ 434.373858] flags: 0x100000000000000() [ 434.377892] raw: 0100000000000000 ffffea0001d5ab88 ffffea0001d5ab88 0000000000000000 [ 434.385941] raw: 0000000000000000 0000000000000000 00000000fffffffe 0000000000000000 [ 434.394066] raw: 0000000000000000 0000000000000000 0000000000000001 0000000000000000 [ 434.402106] page dumped because: bad pte [ 434.406337] addr:000000004632ff49 vm_flags:100400fb anon_vma: (null) mapping:00000000fd89b122 index:77 [ 434.416730] file:kcov fault: (null) mmap:kcov_mmap readpage: (null) 21:19:42 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = syz_open_dev$mouse(&(0x7f00000001c0)='/dev/input/mouse#\x00', 0x3, 0x1) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 434.424832] CPU: 1 PID: 16017 Comm: syz-executor0 Not tainted 4.18.0-rc8+ #34 [ 434.432134] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 434.441511] Call Trace: [ 434.444172] dump_stack+0x17c/0x1c0 [ 434.447846] ? dump_page+0x5d/0x70 [ 434.451443] print_bad_pte+0xcae/0xde0 [ 434.455385] ? kcov_ioctl+0x260/0x260 [ 434.459243] unmap_page_range+0x2119/0x3b60 [ 434.463625] ? syscall_return_slowpath+0xdb/0x700 [ 434.468544] unmap_single_vma+0x445/0x5e0 [ 434.472747] unmap_vmas+0x241/0x370 [ 434.476480] exit_mmap+0x4d7/0x960 [ 434.478388] device team0 entered promiscuous mode [ 434.480122] __mmput+0x154/0x5f0 [ 434.480163] mmput+0xa7/0xe0 [ 434.485046] device team_slave_0 entered promiscuous mode [ 434.488425] exit_mm+0x6dd/0x790 [ 434.488477] do_exit+0xbf7/0x3890 [ 434.491746] device team_slave_1 entered promiscuous mode [ 434.497007] do_group_exit+0x1a0/0x350 [ 434.497055] get_signal+0x1425/0x1ef0 [ 434.517118] do_signal+0x120/0x2090 [ 434.520840] ? __msan_metadata_ptr_for_load_8+0x10/0x20 [ 434.526274] ? vmalloc_to_page+0x50b/0x630 [ 434.530590] ? perf_trace_run_bpf_submit+0x2a9/0x3d0 [ 434.535786] ? kmsan_set_origin_inline+0x6b/0x120 [ 434.540722] ? __msan_poison_alloca+0x173/0x200 [ 434.545455] ? prepare_exit_to_usermode+0x46/0x410 [ 434.550469] prepare_exit_to_usermode+0x273/0x410 [ 434.555389] syscall_return_slowpath+0xdb/0x700 [ 434.560131] do_syscall_64+0x1ab/0x220 [ 434.564084] entry_SYSCALL_64_after_hwframe+0x63/0xe7 [ 434.569309] RIP: 0033:0x457089 [ 434.572521] Code: fd b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b4 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 434.592212] RSP: 002b:00007f270f31ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 434.599964] RAX: 0000000000000000 RBX: 00007f270f31f6d4 RCX: 0000000000457089 [ 434.607265] RDX: 0000000000000001 RSI: 0000000000000107 RDI: 0000000000000003 [ 434.614576] RBP: 0000000000930280 R08: 0000000000000010 R09: 0000000000000000 [ 434.621877] R10: 0000000020000000 R11: 0000000000000246 R12: 00000000ffffffff [ 434.629179] R13: 00000000004d5978 R14: 00000000004c93ae R15: 0000000000000003 [ 434.636846] Disabling lock debugging due to kernel taint [ 434.677706] 8021q: adding VLAN 0 to HW filter on device team0 21:19:42 executing program 0: r0 = memfd_create(&(0x7f0000000600)='#securityGPLuser*\x00', 0x3) ioctl$RTC_UIE_OFF(r0, 0x7004) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000680)=0x800, 0x2db) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r1, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @local}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) sendmsg$kcm(r4, &(0x7f0000000580)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, r3, 0x0, 0x2, 0x4, 0x0, {0xa, 0x4e20, 0x3, @dev={0xfe, 0x80, [], 0x19}, 0x8}}}, 0x80, &(0x7f0000000100)=[{&(0x7f00000001c0)="4daadbe876a29580811576cb017ecc2bbc0ec6f493390a812ebf22b58903306a4f8d1a1a85893e2c5f77e6e56906447e8c68be42558e275477cbe20b327f00876504c348deb69aae374c159f0f5c26f1db84035178ad8d0146ea78835fd614d7fd6ff8332c5762d157d0142fdb059853e65d5bf5fb76267897262046afbc5bbe603d90fdbb1aaafb5e8bf0ffb8caf50dc8c611", 0x93}], 0x1, &(0x7f0000000280)=[{0x18, 0x115, 0xcf6c, "ede5d81fea02a31e"}, {0x100, 0x117, 0x1, "52aab22a9a93babe4a79591b5a106f2c6f52de98e5a0d821c361ab63fc1fdec13dfad5ee8c9fedfb460d73b331eb75c91e9b48a8a305e165e3dd3820cb18e173554f06d6f74e63b3db39cbd353e8be8e15ce232a68b0dbe39ca0c2f2b558df19807083b5c015868afd3db1d147ef69afa19ec8e771b17875366e8fd529ad9ef88828220c180bb06a1a2d71c0634693b9714e0240f754853feae4b50f440a3d1a0bd44477249b13399a4e05a557e0b0e1db84a8bb01cf14e23dca072b6b9988ac0b3755c221c6ece8ae124cc13a07370c60e522a02e87740038e9ddb1ca003e7243afc676ae6cb1bc393d7b767320"}, {0x48, 0x11f, 0xfffffffff3ad2512, "b94175d5b4d3396ac3a5bace07a2653dec7d404c2019a49356f9b576aeda696caad8ddcca11b2256010c7396d84473dc5ff5b65175"}, {0x18, 0x119, 0x120, "1d46ab"}, {0xb0, 0x3b, 0x2, "6ea2d5f6294d8e460fb4d15f9f80ced207c1c8c7897fa1ea7fda805a26afd1cd6014ef62786851722cbaed23f869b5f5cf3be8a17c0bbed37c65eb12d4aa1a6935e58275f46b876f720c3e22ce4fa5ac35e92a67f8a7f514198d94bf9e86e7a0bd9c204a1078a2683ff5a915f93890ea320f9ba65e4505ff7f31cbe422b0f4d8b40c831d3b2c280b6b7417d08e16c82e8b842bc82dd3ae87fc663cac259081"}, {0xd0, 0x0, 0xc96, "40ccee20ad9173095c27bd16c389de3a55362fda58478c8956a5b0ba6c8c502101afc97ec9ded5139e86fbdd7462f3938ab231c98565ca35c8dd856c10301fc81ec30034b8681ec83f7125b4374db6989fe4ee42e42d5406c065a2f7bfe7d0323d49710164f118550091bd084d90880dedb9b0effa41599f61ad2958c3ade185e457458d920b5aeaddee17554cb83a2ea054e4df7e136a83904482ec24b65a9d0bdeed8b8ebe84ec586c42cf3a4bacd81275b60d34c2030c55cfa883d8"}], 0x2f8, 0x4c884}, 0x0) [ 434.720829] BUG: Bad rss-counter state mm:00000000c50e8ef8 idx:0 val:5 [ 434.733422] device team0 left promiscuous mode [ 434.738275] device team_slave_0 left promiscuous mode [ 434.743812] device team_slave_1 left promiscuous mode 21:19:42 executing program 5: mkdir(&(0x7f00000001c0)='./file0\x00', 0x3) mount(&(0x7f0000000000)='./file0//ile0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='hfs\x00', 0x0, 0x0) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) write$FUSE_LSEEK(r0, &(0x7f00000000c0)={0x18, 0xffffffffffffffda, 0x5, {0x6}}, 0x18) [ 434.816460] device team0 left promiscuous mode [ 434.822295] device team_slave_0 left promiscuous mode [ 434.829351] device team_slave_1 left promiscuous mode 21:19:42 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x101, 0x10000025e) r1 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r1, &(0x7f0000cb8fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x47) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x6, 0x4) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000180)=0x7f, 0x4) listen(r1, 0x0) listen(r0, 0x0) recvmmsg(r0, &(0x7f0000000540)=[{{&(0x7f00000000c0)=@pptp, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/116, 0x74}, {&(0x7f0000000240)=""/246, 0xf6}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/111, 0x6f}], 0x4, &(0x7f00000004c0)=""/108, 0x6c, 0xffffffff}, 0x9a7}], 0x1, 0x2000, &(0x7f0000000580)={0x0, 0x1c9c380}) 21:19:42 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) socket$inet(0x2, 0x7, 0x10000) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) setsockopt$inet_int(r0, 0x0, 0x17, &(0x7f0000000080)=0x2, 0x4) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x1a}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7]}, &(0x7f0000000800)=0x100) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) ioctl$VT_ACTIVATE(r2, 0x5606, 0xcd9) ioctl$LOOP_GET_STATUS64(r2, 0x4c05, &(0x7f00000001c0)) 21:19:42 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x7f) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) r1 = syz_open_dev$admmidi(&(0x7f0000000300)='/dev/admmidi#\x00', 0x3, 0x2000) ioctl$KDDISABIO(r1, 0x4b37) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") r2 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0x10000, 0x8000) bind(r2, &(0x7f0000000280)=@nfc_llcp={0x27, 0x0, 0x1, 0x5, 0x4, 0xffffffffffffffc1, "92eb3cce37727a3eb95690c4a573d72fee4029ea4c0cb123a11f6ca265b620f278b0c88130452e82d8d1b01c288f0f5350cb04d988585d68e416346ce96bae", 0x36}, 0xffffffffffffff38) getpeername(r0, &(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000140)=0x80) setsockopt$inet6_tcp_TLS_RX(r2, 0x6, 0x2, &(0x7f00000000c0), 0x4) bind$packet(r2, &(0x7f0000000240)={0x11, 0x0, r3, 0x1, 0x5, 0x6, @local}, 0x14) 21:19:42 executing program 7: unshare(0x52000000) r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000000080)='/dev/nullb0\x00', 0x480282, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$rtc(0xffffffffffffff9c, &(0x7f0000000200)='/dev/rtc0\x00', 0x200, 0x0) getpeername(r1, &(0x7f0000000140)=@generic, &(0x7f00000001c0)=0x80) fsetxattr(r0, &(0x7f00000000c0)=@random={'security.', '/dev/usbmon#\x00'}, &(0x7f0000000100)='+\'[+\x00', 0x5, 0x1) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x9, 0x4000) setsockopt$bt_BT_RCVMTU(r2, 0x112, 0xd, &(0x7f0000000040), 0x2) openat$rtc(0xffffffffffffff9c, &(0x7f0000000240)='/dev/rtc0\x00', 0x0, 0x0) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) tee(r3, r3, 0xc8, 0x0) 21:19:43 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000)='/dev/vcsa#\x00', 0x3, 0x101001) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000100)={0x0, @empty, @local}, &(0x7f0000000140)=0xc) ioctl$sock_inet6_SIOCDIFADDR(r1, 0x8936, &(0x7f0000000040)={@loopback, 0x4c, r2}) ioctl$sock_inet6_SIOCDELRT(r1, 0x890c, &(0x7f0000000180)={@mcast2, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x1c}}, @remote, 0x20, 0x80000001, 0xff2c, 0x400, 0x3f, 0x1000000, r2}) sendmsg$nl_route(r0, &(0x7f00000006c0)={&(0x7f0000000340), 0xc, &(0x7f0000000680)={&(0x7f0000000640)=ANY=[@ANYBLOB="1c0000001800010e00000000000000000000"], 0x1c}}, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xd, &(0x7f00000002c0)=@assoc_value={0x0, 0xfffffffffffffeff}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x72, &(0x7f0000000380)={r3, 0x5, 0x30}, 0xc) ioctl$KDSKBMETA(r1, 0x4b63, &(0x7f0000000080)=0x4) getsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f00000000c0), &(0x7f0000000280)=0x8) setsockopt$IP_VS_SO_SET_FLUSH(r1, 0x0, 0x485, 0x0, 0x0) bind$alg(r1, &(0x7f0000000200)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_pr_sha256\x00'}, 0x58) 21:19:43 executing program 5: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(&(0x7f0000018000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='ramfs\x00', 0x0, &(0x7f000000a000)) mkdir(&(0x7f0000000100)='./file0/file0\x00', 0x0) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file1/file0\x00', 0x0) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000140)='./file0/file1\x00') 21:19:43 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x2, &(0x7f0000000080)=0x101, 0x10000025e) r1 = socket$inet6(0xa, 0x801, 0x0) bind$inet6(r0, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @local}}, 0x1c) bind$inet6(r1, &(0x7f0000cb8fe4)={0xa, 0x4e20, 0x0, @ipv4={[], [], @remote}}, 0x47) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000000000)=0x6, 0x4) setsockopt$sock_int(r1, 0x1, 0x2, &(0x7f0000000180)=0x7f, 0x4) listen(r1, 0x0) listen(r0, 0x0) recvmmsg(r0, &(0x7f0000000540)=[{{&(0x7f00000000c0)=@pptp, 0x80, &(0x7f0000000140)=[{&(0x7f00000001c0)=""/116, 0x74}, {&(0x7f0000000240)=""/246, 0xf6}, {&(0x7f0000000340)=""/228, 0xe4}, {&(0x7f0000000440)=""/111, 0x6f}], 0x4, &(0x7f00000004c0)=""/108, 0x6c, 0xffffffff}, 0x9a7}], 0x1, 0x2000, &(0x7f0000000580)={0x0, 0x1c9c380}) 21:19:43 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) prctl$intptr(0x26, 0x1) execve(&(0x7f0000000040)='./bus\x00', &(0x7f0000000100), &(0x7f0000001300)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x288500, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000080)={0x200, 0x9, 0x1ff, 0x6, 0x100000000000000, 0x50}) socket$pptp(0x18, 0x1, 0x2) 21:19:43 executing program 7: clock_nanosleep(0x54b030aaee1bd215, 0x0, &(0x7f0000001180)={0x77359400}, &(0x7f00000011c0)) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vsock\x00', 0x800, 0x0) getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000040), &(0x7f0000000080)=0x4) dup3(r0, r0, 0x80000) 21:19:43 executing program 5: perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xf1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = epoll_create1(0x0) socketpair$inet6_sctp(0xa, 0x1, 0x84, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000040)={0x0, @in6={{0xa, 0x4e22, 0x0, @empty, 0x3}}, [0x7, 0x100, 0x4, 0x5, 0xfff, 0x3, 0xff, 0x4, 0x2, 0xfffffffffffffffe, 0xcf1, 0x4, 0x4, 0xfff, 0xffff]}, &(0x7f0000000140)=0x100) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000180)={r3, 0x9}, &(0x7f00000001c0)=0x8) r4 = syz_open_pts(r0, 0x0) dup2(r1, r4) 21:19:43 executing program 7: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8912, &(0x7f0000000280)="025cc80700145f8f764070") r1 = syz_open_pts(0xffffffffffffff9c, 0x98000) ioctl$KDDISABIO(r1, 0x4b37) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00009e3ff6)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f00005befdc)) r3 = syz_open_pts(r2, 0xc000) close(r2) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f00000003c0)='ip6gretap0\x00') close(r3) recvmmsg(r0, &(0x7f0000000240)=[{{&(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, &(0x7f0000000200)=[{&(0x7f0000000080)=""/89, 0x59}, {&(0x7f0000000100)=""/82, 0x52}, {&(0x7f0000000180)=""/65, 0x41}], 0x3, &(0x7f00000002c0)=""/130, 0x82, 0x4}, 0x6}], 0x1, 0x40002002, &(0x7f0000000380)={0x0, 0x1c9c380}) 21:19:43 executing program 5: r0 = socket$inet6(0xa, 0x1000000000002, 0x0) ioctl(r0, 0x8914, &(0x7f0000000280)="025cc80700145f8f764070") r1 = perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000000)={0xc7a, 0x2, 0x8004, 0x8, 0x0, 0x8001, 0x9, 0x7, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x4, 0x4, 0x50257d54, 0x2, r2}, &(0x7f00000000c0)=0x10) mmap(&(0x7f00001bc000/0x3000)=nil, 0x3000, 0x0, 0x800000000011, r1, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) r4 = getuid() setreuid(r3, r4) mmap(&(0x7f00001bd000/0x3000)=nil, 0x3000, 0x0, 0x20011, r1, 0x0) [ 435.912755] device team0 entered promiscuous mode [ 435.917933] device team_slave_0 entered promiscuous mode [ 435.923662] device team_slave_1 entered promiscuous mode [ 435.931360] 8021q: adding VLAN 0 to HW filter on device team0 [ 435.938795] device veth0_to_bridge entered promiscuous mode [ 435.945158] device team0 entered promiscuous mode [ 435.950168] device team_slave_0 entered promiscuous mode [ 435.955990] device team_slave_1 entered promiscuous mode [ 435.969312] 8021q: adding VLAN 0 to HW filter on device team0 [ 435.978808] device team0 left promiscuous mode [ 435.983605] device team_slave_0 left promiscuous mode [ 435.989276] device team_slave_1 left promiscuous mode [ 435.997990] device team0 entered promiscuous mode [ 436.003184] device team_slave_0 entered promiscuous mode [ 436.008965] device team_slave_1 entered promiscuous mode [ 436.017154] 8021q: adding VLAN 0 to HW filter on device team0 [ 436.025578] device team0 left promiscuous mode [ 436.030335] device team_slave_0 left promiscuous mode [ 436.035925] device team_slave_1 left promiscuous mode [ 436.044636] device team0 left promiscuous mode [ 436.049429] device team_slave_0 left promiscuous mode [ 436.055054] device team_slave_1 left promiscuous mode [ 436.270128] device team0 entered promiscuous mode [ 436.275288] device team_slave_0 entered promiscuous mode [ 436.281128] device team_slave_1 entered promiscuous mode [ 436.295316] 8021q: adding VLAN 0 to HW filter on device team0 [ 436.303405] device team0 entered promiscuous mode [ 436.308432] device team_slave_0 entered promiscuous mode [ 436.314265] device team_slave_1 entered promiscuous mode 21:19:44 executing program 6: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000240)={0x2}) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) pivot_root(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00') ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/net/pfkey\x00', 0x292000, 0x0) getpeername(r2, &(0x7f0000000480)=@alg, &(0x7f0000000540)=0x80) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcc62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x20201, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 436.346154] 8021q: adding VLAN 0 to HW filter on device team0 [ 436.355484] device team0 left promiscuous mode [ 436.360180] device team_slave_0 left promiscuous mode [ 436.365727] device team_slave_1 left promiscuous mode 21:19:44 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) prctl$intptr(0x26, 0x1) execve(&(0x7f0000000040)='./bus\x00', &(0x7f0000000100), &(0x7f0000001300)) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x288500, 0x0) ioctl$EVIOCSABS3F(r1, 0x401845ff, &(0x7f0000000080)={0x200, 0x9, 0x1ff, 0x6, 0x100000000000000, 0x50}) socket$pptp(0x18, 0x1, 0x2) [ 436.405634] device team0 entered promiscuous mode [ 436.410825] device team_slave_0 entered promiscuous mode [ 436.416632] device team_slave_1 entered promiscuous mode [ 436.478656] 8021q: adding VLAN 0 to HW filter on device team0 [ 436.500961] device veth0_to_bridge left promiscuous mode [ 436.515954] device team0 left promiscuous mode [ 436.521132] device team_slave_0 left promiscuous mode [ 436.528972] device team_slave_1 left promiscuous mode 21:19:44 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) r2 = socket(0xa, 0x80000, 0x7f) bind$inet6(r2, &(0x7f0000000080)={0xa, 0x4e21, 0x8, @local, 0xff}, 0x1c) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x4) write(r3, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:44 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x1, 0x20) semctl$IPC_RMID(r1, 0x0, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r2 = fcntl$getown(r0, 0x9) ptrace$setregset(0x4205, r2, 0x1, &(0x7f0000000400)={&(0x7f0000000340)="be3c49cef1f926430703a36a6b09bd5451d356d931cc4ecabc65e19ee1747630b1ea457b0651d1f9cd83be25d9e4ace95daa29f99a2b3fdccc49341c81eb4c7dfaf89651db3ec0335b041ca0247e235c4c26dc43b7c24a7477e1307eb1d12205f64fcf89d941e26b8dde993c5a0afae255755b5621c1d2bd8dadb9bbaa8fe6918b34425cf8789d86292544fdefd1a4ec00639d", 0x93}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) openat$uhid(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uhid\x00', 0x802, 0x0) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x0, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000200)={0xc, 0x7e, "af7121981440beb6aa7d858e8d268fe0dd7ca657ab7997e028e7ee717378f7b784e8d6d27e219fabe9de4f10eaa7e7a87dad2f7166b246be6e6c5fcd4aca62a3e52947ffe0c09c07bd57ef858142c9d623a52255729b1d1be5189e3e23a6f230c2169d2068277d4d90e62c0376025b4b39ca5ade7d6135b1527b12273c8c"}, 0x84) modify_ldt$write2(0x11, &(0x7f0000000440)={0x1, 0x100000, 0x1000, 0x0, 0x7, 0x8, 0x3, 0x4, 0x40, 0x40}, 0x10) 21:19:44 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r2 = socket(0x10, 0x802, 0x0) sendmmsg$inet_sctp(r0, &(0x7f00000053c0)=[{&(0x7f0000000040)=@in={0x2, 0x4e23, @local}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000300)="40e6c40aa8b64f4e528624bb1f345964885e7690e04792ba418dfa45f45cda5ac04da41d95afc166292aabbdffafb0e83467130a84b62257c2c294bf5b8b02df4d10e94b8478cb13db703a681c9d2aabf35d30470f720c385128d1e1f97d8bc75484c1a924a90a38605d40aee76c6e4263ba4e7c3ae1c7978ec456d284b36ce2c4184e383d", 0x85}], 0x1}, {&(0x7f00000001c0)=@in={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000600)=[{&(0x7f00000003c0)="ffef09a34ddb514b9ba4cc709eff23b5360d5af7c6756f75b4be90407b281d9cd2f93bc5aaec8d9b1a9a786aecc8fcdd0ac3c11d280bd269debaed1e761d", 0x3e}, {&(0x7f0000000840)="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", 0x1000}, {&(0x7f0000001840)="162058737e07f624fd34a3639e3eef9d3da5d171366475b3966b7e6c623b6fd5d9cd6b71bbee67abc4b05baf23a0e9936a8d02dc7f597795aff5ab33d8ff6c0a89da679699dd0b526103d2bcc471616eebc910256aa991fe2765a87a9a0c77341275035cfa212ce8d563411fa9f8d31c27cf345c553cee469ed76b6fee4f98abdf768387af5bcad7b5ae3fc4d3cac01eb9f24083aeb05b6a959d5ef228176ad052ebe6d06fc2588ec1f71dbaea008fe8eb49a08a29f1f52c29d83ee893bc3bb4d43577938574b9e13f2b2ed5485ab7bf47d52622899c8b6ba76bdef387235c46bff0a88326e0f7a1b9f13e148303f12ad1500332fcabbd66fbc1a51b7cf2681b517eb4213c3ab87775b794e15bf81a2c4a07f812caacd38138e715e3e1061c1bce2a92141b45fdd61f19fc8c953f29ee5aae3f44eda43ecc41a9f3d89ef2c7c5c90bc68b5f0c659c25c7ef60b06224be673819aacde64909e0dbdba4f2aed974e82cea3c508690f1e3b941295af78ea49516bb9c1ca2a162b124815927420149681586ee434f9c561852c358bda370fd95ba6bea55594942f3fcb5fade35f8bef97a59b3d9428c40fef555b7d4886fc775ca59a114117639d93a6e6b7ea3ec835fef8430038f680a194e490dda34aade2a7540b53cd789b77fc9a05899bfce7eef63ccba94bf0b4963c04c858127d65c5ddde9ff82fdd4872326db392124731f41248bd8b71f730177ad64054566bb9f501ddff62ee1483bcb83411219997c6aa16178bb058fb71d98050810db3ac4861d256cfb7707482fe2910f3308c6769b8a90b8ddf5006ac76598a7ba8b32919294968efa88a29591172dab55f73d7e3bdfbfab97b2c30b463e833e7ae2e14b1619b99d20a0c53a265d6125a365c9cc67720187778a834d65130dd4a4f911d66cd66bf10647bbe44b4bc3869b5729adfad8fd5105c860abab45c6b8796c3fa4e487099fc45c6a40b4a6a670f0c44cbc813c782753c241fa4b9d1b59186351bf1352934bda6cf2d507e185be375d73e08a54aefdf01106af3e66bf8e73235ade87712fe77b6af02aa1e7c2b3759cecf7284744ad58c1da8c957e40e0c63ab00d5e68e2aeb4caac4b9cdab695f7c1801b8fd4c7b1656be7c38867fa58896cd058c43fc883025891fb5e8877f98f3437808377c6a992dc6ea8022120a59337f9f047ec8ec2b588b26666880ab324adf34ee21148b7ca3440190a48ab0f074d1269c843d7d276438544432e54671f80fffd1a40abcdb9669e9b594059eebbe38eb72616b146751cc8508f0e06e57296c1d69f779cf75112ac5809133a2336fd7ce81533f1a71feb116a8c86216aaa2745b48c107246ef4aec5c246de7d0cae752f15298f71543f663a3ab6f1e74815a659a2828d9818f290848ed59a4dd7bdbce707645c09952495b49a33a1bba6ca91b18d702cbe3c0bdf73028973c7988fd0bb36cf2a1e5c26a381466cfecac5e6926336c4ded12b24432b665eb23c3702c6c5f4605157ded3cf49f43510853f2493b4f48270c8218c163db5f1fd5fc7bb60a93de6160c62b90b0f5cc28fd5ac6b8aa18326c77667ad4fbb4de13ec0ff98a68929e00f03ee5ac7d7ce58d8abd28a0ca7c0b2abc92d805fba2dd493764425945851b3faca744c0aece7dea508df681592942b7cf8e3c75868fb527b5c170a528536a3506967ff3a73e6f37be8f1b747cb7c7d5de8959e3f657a90fc49b4d8c735ccd45ae92e7b58413b985938a3593b4ba6353206e9fc744c8b7b844c26e9330d271931adfc94a0e5493b1df4034a588c8497396c561b3f5068f69f39526ac4dffa0e0a18f3f2bfeabd6ce072d3ed4ba8defe51af4a8036483b182290510b0283a85ff99c87fa4193998eba95b21e30cf6b4f402058ef4ec330502df7c764c27c3c0780e88ed08eb05c221d24a9967ae33db230eb988061d45730c09c49477c50881151b2c312620978f94a8e4d17aa6f86666b155aacd7005e4dfe6132af8f98fbcd4adbeeb6a01592b5543c69879dac9fde1e83f83b269b1ef9e90e3c4f072a115d07a8417efdcec18c0dbda6e63f30a65b3edd0cbc00db2871b46c5dd2edd44fb9ea754cddf283a86fd77e41c4c898d9d791268f98550dd5413744e6ec34bdad11599958b6818d3d6bd9eb6592f69d0490e8a6bf176a31767cdd5163db18d9efc3b1ab6b1721e818cb0d49ebd6c60d90f122791da2b872219be9ed11590c50c25e6fa5eeb0ba710f2cff6ab60754b50635e8028f188ec07933cc82436ef54823b748e554ee93d8f6e21bd4b259164fec58c5bcf45e438149cff9b5a48a41a1b267c09d123c01b841560b9672ebaaa31566e28cd7064dd8682b25819103dd9ecfd7ce39f929f6cb357ec32d85d654841b6c956c6804f4560790051be7da30db92a5da714d034a735daedf8579b6f08a50e8d37f45812a3ba0005d0d465d6f5920b55f2d37d493df24011d86f66a8aae96fb731805ac8820584bd62b93d61d2a4cc4a215729a853cec8a4a06acfc8ec8d92a0a4d60b11f8cefb8c7e0e5b8183d40550a50a5e99b4124f265df18aba695473dac57499a8cac891514c212a30c82e1ebda50e465e3f41a8ac49d365c94b296046559a2530d45ec93692653e9147bce47d3e4a73ffdd7fb9737cfdc9bfb89df6d23aef0943f0cdf962b6e4f8729005df671b9afa43900fe2a42cd92f023209004071b1d48843cd063e65c91857f52f30ef36a8718a9e76712c0e79fc1d338ee1008172937fd272b63769a824842908b9c55144ce6c5407814b4beb262cd6e8dc3917301aed7a1b42e3b18cce617789ba29b9681b79aa334fa9e9a14f0bcf5cf8bdab9ca0ed4f21d1262503675f3767bd1d761cea5b22ad5bc784fb33182bcf86b489a5099259436d5888655b4169025d0c24bbc5e7fe118ed667ed724f8ce887f32170ca6b4b3b2e96eb3b2068fe64f21b2f9253c1e351c50835696eb4bd65a731269e93973c93541cfbb797b0a41c3efadbe1023e04ab1b67edeb94a76191cb6ee82fc01617444d8f89baae565db4d91088eb6228c57c7ecd007350584ca01706f9f5c68166aacd8076426af40f58f0fb9e5cbd7b98369dfde9c63f63a8588eb11828305d9131b23a504568509f6e026f56d05cd10e419374828e398983ee95149497290780f1071ca6938f4147fc64e60a3af036718f7bfb4bdf477892cef8e3f62accf9ff2ce6a7c2fadf29f7ccd8dc5c3e3b0da1a60e04fe8269b0a0ee3013e3f66b2fbb9baead86029e40d2552c2ec85ad9b1c7333065b024d463e6789094007dcd68a1fe165fabccc468e1973e79c79eba085d8c4d070551e3ca516e1b239b8a5ad6c7670e28c173cb40588ab0c9884f46e7660437f587ca7f843e36bce2d0e6f2fb0cff389a76496d187c67e2707947c97529676aaa80147417aad18f9e8522942df056cdcaee2aa419866a5ebd143f5405c30e571654dc0bb51d709e4695c48d92da626c2f62285787208cd5ccfb8b280ddc4ba42f371a0521ee96403c5f5f134c9e07a44a587a01ca8e6356b0af8fdab916639634f5d596c24b473cd597dfc3330377cee1c563363ca8c3bd2f8b68b46b6f7159f420be1713b7d8cd5a4ef0be0e7f58dd77ac220792b859b38258b163bf373de7f998ad2e7528af8f435ee34754cc0a16e2f27e854ceda1a14afd1cf6779cf0a80000fad793c4da54ea16678c09292fb2720a6db01a320f8b913f85e57d84222f9323f48bf60fdf3f3a6e92e1a02bd35dbf5ae20ce9869b42e19d95cef10c9ad69f87e898f901035a03e144b315b157fd56e5a07d737c9decbf30d9e3777eb65e03345cde627f2e9c845ba8d79198182b52ceeb8db0d25c6a7a279802913df6c95a1bf7d0b819ecfbbefcbca23f5229da2eeae67063d5c7a7c928c188d9c91dd5a4bea9d34e6aa6694fa675104164e4e40c7660caa61a3b43db32555a5b69a174b8a704c7de943774d558bbc5469c22aba93a890eb781b948232aabc2cc5013cc6006e6ac8a814d6e481981b8e3b13f598e8d28ee75718d95997e4e1ab9e4470661c13af7171ae5849874ca15f6a482986afbe024cf5f9db7b12851752daf3734b0f5731d510863236e88abb5a11932d0b595c2345e4b3c0d08944743a9d35c390de32e45f3611630435e6bfe70f023f9816b4b5179913f7d21a19b4c11a1fe5f02a8c96bcfe297c087498bafabdf8dde1f76ff9c37ec2ff724d3a2903d95d00db21d4d6fcbe68f3e3a601a930e91769040a3880f4c1ffb5c7406c531cca6bdd45b435ffe1b3464652cebbdef782f97e7c3cf62c259b9c9637e8efb7ad44fbcfb38e88215e816b882d99fbfe735bed6d0d7e0fe8ce86a6a04706180c9a2914152e3c33faafc4dc2f6a7833df761d4f45d24db08b13aedd7fe1dd7f43bcf4747734f6323ea39bdae622d7841821e30b229cbc5f8769fdad7150f0029358568fd76b92812f3dba82df706a2e660f5858dafe1d3fc06d6abbce57b20eb6aeddf002b6863c3375d0ddb806becdb9b0fb3ea3e2c8c687a339503612d6055e39a619824fa7c43df1554e52993892da475405371697059e39ede6d29000d2f0933ce0e20011402f5ac162c6965b6b542bb11f38f68952a37f6672970dcd02f0ca0a8671518293b81114f7afe3eb8b9dae224a414bafbc1d37ab820239606cf346e2e8d9a1b20aec44188554dbe27668c13ec7a0ec9247532e8448032aa71a151252b8730ecceb1b7a5d46629002d04bf1bcc6b703dc934a280c4f48c1f680b16c07ea9991bcdae561ce15726a592e8359fb42b54eaaf2eca047501899582d39debbfa56bd0d08cd60bd64fad6dcbc56fd1a713a7b14337c97595f05021b164b3b00852edb5c8808787241904fffcd9cf1c2c388eb9905139a9eaa274feba06947f57ba4c006683809419199bd5f8754b881df9021fdba0123eb30b9752e5ff5b54ad750466dd8daaeb0102dcb2abc2d122669ec4b6c3486041e82434fdadfa5f15174b007396da1e990d976dcf47cf9ffcc3a2e981647ab51250cd9ba0d904ca7ce183a7bc836790b51279a76d22b57b13fc0cad111bbde6b170807a2160b7a322e3fa2d2c179441197783bb93c505afe29bbcc8d474defdd7a030da2fc65fd066d9a0c6b49cc74fd6e52a2178dc58834657656d687e90080fe544d6b5a00dbd855baf633c6cc517e0bdf8da29556a085bc2907d4ccf5c754176dbbf0eed95680113faf66bf0ee3417388b97d35fa8c588a46677c8be79ba755e2336dcf437a81663a088f2dd7b8af7584dcfed403c24c532818511f8dd225a6c2e299bff2dfbb38694b22b32ce7cba6baa11393945f4e1e15c56d863e36455a8e77dfc9e16b0b02392072779fba56d1c689021d9490a130056778cdc110eb39c6ec5cd242b690094e89d66c543900af87a6125cd7e7a0bcf52ec171666056f223c79b49c2be949221d0ec113106afddedae530d6a373b5157362c2574f8aa842e8608cc2d1a55849b1d4f110f6ef4d519f6f93e8a141f40bed5bc2756f4108f609c0274711c6b2d3f2818e1743d190653303fe1b2c21a9006a7887b29ead5c61efa24ccaa68f34e3f37c4bfd870149a89fdbec13adb1346d8437c09f936ef80bc4ab00df766943323e82457714969bcd84c8c9c52ad75c41b78a3821a77f00f8e1e251c1de28e46b9e51559ecfe8f9a9199bf5616effa2c72d45f662fc4311aabcccc29eedf6fd33ce121e58eb6b886fade67ad66e32dde9b24b9778b3a4901091674a276dc961cd4c56de105ca627cc3844", 0x1000}, {&(0x7f0000000400)="70b386f997077807d882431590cd462429d22780d4b9caa5c1520671ffee24776d4d4fe7e6d3d1097451522113d7932b36b98a0116e6f99d75e89740b0b7a85b61cd69", 0x43}, {&(0x7f0000000480)="33396bc608401aed3f4898b21d2377b2aade2a062554819e76e2dcc224c3be80039c4cfdf54211df5564b5bf4e04a32d97901b", 0x33}, {&(0x7f0000000540)="24df1d83675179882af0abc7f12afa5ea27a83cea24be3148ad53438d488ef6953222c3c875862bcc1a9a0a600d57f247ce0a43a68d782af330ca5f4f6fd38883df8d20b37bbca39eb74e8ea21b113115ed46928898ac970129dbe9835e496137c9d42902b6b63769b63ab97d0981360c9aba58adab17e85967d72a5281203aafcdddf7ea8874c33fce2525e4fbb33b71255f6d343eb3e24391aacc239468393eeee27ca078c180bb484d6ad1dae0a17fbeeeffc8d3b28", 0xb7}], 0x6}, {&(0x7f00000004c0)=@in={0x2, 0x4e20, @local}, 0x10, &(0x7f0000004b00)=[{&(0x7f0000000680)="49b9e179a3c20aab288406067ddcd3c56162519899f87dfbd001bb7b120dc712beed7564cac0452f754890fb53130ec60b47e0cc41", 0x35}, {&(0x7f0000002840)="b6fad31df7102c072875637706f0eedfa69bfa0c40a94539f7d2d1dcc59dd8e71a47b041e916b6438dd71f7830f7ae44caf7605ce35484981f1590b32b2ebe44a71089afe3a25695f82cb09e852da695ab95e92c9a1fd5dd4bfe1ddef134e7a9b35db9feb0563b363bfede97d47e38c8528f1f4048426fa2d4a7a8d9e5f00ee42eaf2e4e746f4f0489dbc74e07aac6d09203a2debf314086b0309e9a34a7fd1ea42c602cf1eb35b2eae1eb6760", 0xad}, {&(0x7f00000006c0)="358a943eabbae968f582153f8296f40508199286a8d469d2fb6d0507222d868700713ff2ff", 0x25}, {&(0x7f0000002900)="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", 0xfc}, {&(0x7f0000002a00)="32af1a5081048279c756998aaa6e1cd17ecb83a852a37a68648713e6d6c228eb908dafff71c06607bc935624", 0x2c}, {&(0x7f0000002a40)="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", 0x1000}, {&(0x7f0000003a40)="1b1c88368f361cbd032d2373d836f2445ecbf6ee99022a5194aec93020fd177ab834ef7587abeea8c021083f467b488647e527e4076f3913371ddd1e87ee1b64e1057246e7411b97de732d8b1ac54767c8822984a089693accf0227705f8ddfb7a4f66d7a2a5413ed5a15de6e59ed1d5bc6b70457dfe761fab4986344f8d30ae99d2adc56466a89cf0351a1b52268857521919a389d741dc35b7f84a543c1431", 0xa0}, {&(0x7f0000003b00)="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", 0x1000}], 0x8, &(0x7f0000004b80)=[@init={0x18, 0x84, 0x0, {0x9, 0x56a, 0x3, 0x7}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x8}}, @sndinfo={0x20, 0x84, 0x2, {0x338, 0x8001, 0x3f, 0xfff, r1}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x7}}, @authinfo={0x18, 0x84, 0x6, {0x7fff}}, @init={0x18, 0x84, 0x0, {0x2, 0x7, 0x4, 0x81}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @authinfo={0x18}], 0xc8, 0x4000000}, {&(0x7f0000004c80)=@in6={0xa, 0x4e23, 0x9, @loopback, 0x5}, 0x1c, &(0x7f0000004f40)=[{&(0x7f0000004cc0)="57317fe239e18479832ea819ed9d4a0043e512bb5f8a928009c51b7e8f8420f5580ef386fa057f961ca6a7f58a1dad858b60990ae30b", 0x36}, {&(0x7f0000004d00)="efff00bd209823e2164a5ec2afeb17b784ddd2bd8d9271828a21687c318326a31ec1b935b538373773d63ec19a67d9c68de2052fabd9d73906fad171522cfb6ada6542fd75c00737ef209819bd6edad9862c0168bae21575ef9c7c50f2a013", 0x5f}, {&(0x7f0000004d80)="5dde34a647c67c27a85151a7da1bbae930eb58d58e2e4fb179c1fe792e7f511196f93e5136974417a6fd25203613d91d8f8881657dc84f256dac35def8d488b613bab45bc7937e6a92cd2afbdf052a9e33affd06ccbb2c2a102f6af6a8d39c33a4b51dba07566b1036fcac5bfedf1edc5cb101f77d6f58d075b75e7737b3db2850dd5238412c2b1d82b919848e84902a15105478ce1317339bdf49d132eeed41f684a4bf0fa75397aede98d5b532c947ac433ccc202a1d3780730fbe1a435ca725997f1c9ebe676e61c7fe39ba8fdfd89d7796158881fcf86f78f02db5f16ff175005fe66c77bef35099345add105d91", 0xf0}, {&(0x7f0000004e80)="265906e0115cae061ffd264b2897985db5f09a268509ef1fed2d6c4cb4e12e2cd2f92ad25bbc81760274ad5d3ea38e09ec89395ab646be579823006625dac84c0fca191ee8f93add1e92f707c6b1a1db94464152a8ef3814c8dd81c028fe05de2e837c6fc1f03e71d0443bf6d34f8dd738f5b3dc265b96d063af37e2764af66c824a2cfa86a7eeb1d52625e26a8f7e7d", 0x90}], 0x4, &(0x7f0000004f80)=[@dstaddrv6={0x20}], 0x20, 0x40}, {&(0x7f0000004fc0)=@in={0x2, 0x4e22, @multicast2}, 0x10, &(0x7f0000005280)=[{&(0x7f0000005000)="8dae1a16b414ef5baad18296e76f24e19b1939f1a12f20c380271c9025c332b08d8dcb518f2355896fca57857bfa7856824fb763adf14294c78a4f3f871c679f024d811d2789cb3a98a5f41c061a357ed90becf672f6ac4b0e16986b8a7c94f2031e8d5b7d40253c005c92f9b0be7de8f65cba71b60b14ddd0066956ea48611cb1", 0x81}, {&(0x7f00000050c0)="6b517054106a759b63e20a31614631fa43116a4d74eb20a9beb4c5617361b0182fa9c51e6b418a1cc6c2cfd1500d0891549b8c6cd08ef3b20996775bb641446c890769f039b186dd3984764af9976a419018aa60f5df043ae6acc624038da01d954a912f88f30d4334bdb8e171122da514", 0x71}, {&(0x7f0000005140)="3aff00fa1800e3c6d32e0ee7", 0xc}, {&(0x7f0000005180)="21474ffda8cb5769a68b3790ec207b451293191afadd81809db42b500bab48a4e84a03bcf725dd394a2c1a9dc1c38a77ac8e027365cb7c587df86ad026f70715dbe4a51dbc1768a278c84892bc84069ba1b60d5c65adb54994d52e4cb275ea35c7a5e59a8d059a3d2a9924e789b1fd26303273ef83aca0cec6d0e99b2076cfca2fd14e7185f6a0e8728906c98b126e6fa40bff34e908ec31786b8c2e59b5aaeb70c65bbd66", 0xa5}, {&(0x7f0000005240)="08a5203d1f66b24a4d8a87d67bfc7d1b4220c8b0e3adbc0fb151c1d895672750", 0x20}], 0x5, &(0x7f0000005300)=[@init={0x18, 0x84, 0x0, {0x8, 0xffffffffd221ae10, 0x2, 0x8001}}, @dstaddrv6={0x20}, @dstaddrv6={0x20, 0x84, 0x8, @ipv4={[], [], @remote}}, @dstaddrv6={0x20}, @authinfo={0x18, 0x84, 0x6, {0x5}}], 0x90, 0x10}], 0x5, 0x1) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:45 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r0 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 437.496141] device team0 entered promiscuous mode [ 437.501350] device team_slave_0 entered promiscuous mode [ 437.507209] device team_slave_1 entered promiscuous mode [ 437.517151] 8021q: adding VLAN 0 to HW filter on device team0 [ 437.526253] device team0 left promiscuous mode [ 437.531098] device team_slave_0 left promiscuous mode [ 437.536748] device team_slave_1 left promiscuous mode [ 437.551767] device team0 entered promiscuous mode [ 437.556883] device team_slave_0 entered promiscuous mode [ 437.562708] device team_slave_1 entered promiscuous mode [ 437.578303] 8021q: adding VLAN 0 to HW filter on device team0 [ 437.588973] device veth0_to_bridge entered promiscuous mode [ 437.596936] device team0 left promiscuous mode [ 437.601738] device team_slave_0 left promiscuous mode [ 437.607283] device team_slave_1 left promiscuous mode [ 437.615838] device team0 entered promiscuous mode [ 437.621097] device team_slave_0 entered promiscuous mode [ 437.626931] device team_slave_1 entered promiscuous mode [ 437.635141] 8021q: adding VLAN 0 to HW filter on device team0 [ 437.645582] device team0 left promiscuous mode [ 437.650405] device team_slave_0 left promiscuous mode [ 437.656065] device team_slave_1 left promiscuous mode [ 437.840527] device team0 entered promiscuous mode [ 437.845530] device team_slave_0 entered promiscuous mode [ 437.851335] device team_slave_1 entered promiscuous mode [ 437.858904] 8021q: adding VLAN 0 to HW filter on device team0 [ 437.866792] device team0 left promiscuous mode [ 437.871695] device team_slave_0 left promiscuous mode [ 437.877280] device team_slave_1 left promiscuous mode [ 437.891682] device team0 left promiscuous mode [ 437.896603] device team_slave_0 left promiscuous mode [ 437.902214] device team_slave_1 left promiscuous mode [ 438.106602] device team0 entered promiscuous mode [ 438.111778] device team_slave_0 entered promiscuous mode [ 438.117611] device team_slave_1 entered promiscuous mode [ 438.126238] 8021q: adding VLAN 0 to HW filter on device team0 [ 438.134329] device team0 entered promiscuous mode [ 438.139400] device team_slave_0 entered promiscuous mode [ 438.145235] device team_slave_1 entered promiscuous mode 21:19:46 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000040)='veth0_to_bridge\x00') r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0xa0000, 0x100) ioctl$TIOCCONS(r1, 0x541d) 21:19:46 executing program 5: r0 = socket$inet6(0xa, 0x3, 0x1) ioctl(r0, 0x8912, &(0x7f0000000080)="0a5cc80700315f85715070") r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0xaf, 0x0) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x0, 0x0) ioctl$VHOST_SET_VRING_CALL(r1, 0x4008af21, &(0x7f0000000200)={0x2, r2}) ioctl$RTC_PLL_SET(r2, 0x40207012, &(0x7f0000000240)={0x8, 0x1000, 0x40, 0x9, 0xd09, 0x0, 0x3f}) perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000003}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f00000002c0)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r2, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x80080011}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0x90, r4, 0x400, 0x70bd28, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x54, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0x2}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3a}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@broadcast}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3b}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0xff}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x76}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x800}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x8}}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x33}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3c}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x40000}, 0x1) setregid(r3, 0x0) 21:19:46 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$admmidi(&(0x7f00000001c0)='/dev/admmidi#\x00', 0xb20, 0x10080) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(r0, 0x84, 0x8, &(0x7f0000000200)=0x81, 0x4) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) getrlimit(0xf, &(0x7f0000000240)) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:46 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0xfffffffffffffffd) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000001c0)={0x0, 'team_slave_0\x00', 0x3}, 0x18) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 438.155507] 8021q: adding VLAN 0 to HW filter on device team0 [ 438.166635] device team0 left promiscuous mode [ 438.171347] device team_slave_0 left promiscuous mode [ 438.176916] device team_slave_1 left promiscuous mode [ 438.187417] device team0 entered promiscuous mode [ 438.192422] device team_slave_0 entered promiscuous mode [ 438.198302] device team_slave_1 entered promiscuous mode [ 438.243397] 8021q: adding VLAN 0 to HW filter on device team0 [ 438.289067] device veth0_to_bridge left promiscuous mode [ 438.302329] device team0 left promiscuous mode [ 438.307092] device team_slave_0 left promiscuous mode [ 438.312604] device team_slave_1 left promiscuous mode 21:19:46 executing program 4: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = semget$private(0x0, 0x1, 0x20) semctl$IPC_RMID(r1, 0x0, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r2 = fcntl$getown(r0, 0x9) ptrace$setregset(0x4205, r2, 0x1, &(0x7f0000000400)={&(0x7f0000000340)="be3c49cef1f926430703a36a6b09bd5451d356d931cc4ecabc65e19ee1747630b1ea457b0651d1f9cd83be25d9e4ace95daa29f99a2b3fdccc49341c81eb4c7dfaf89651db3ec0335b041ca0247e235c4c26dc43b7c24a7477e1307eb1d12205f64fcf89d941e26b8dde993c5a0afae255755b5621c1d2bd8dadb9bbaa8fe6918b34425cf8789d86292544fdefd1a4ec00639d", 0x93}) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) openat$uhid(0xffffffffffffff9c, &(0x7f0000000480)='/dev/uhid\x00', 0x802, 0x0) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r4 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x0, 0x0) write$UHID_INPUT2(r4, &(0x7f0000000200)={0xc, 0x7e, "af7121981440beb6aa7d858e8d268fe0dd7ca657ab7997e028e7ee717378f7b784e8d6d27e219fabe9de4f10eaa7e7a87dad2f7166b246be6e6c5fcd4aca62a3e52947ffe0c09c07bd57ef858142c9d623a52255729b1d1be5189e3e23a6f230c2169d2068277d4d90e62c0376025b4b39ca5ade7d6135b1527b12273c8c"}, 0x84) modify_ldt$write2(0x11, &(0x7f0000000440)={0x1, 0x100000, 0x1000, 0x0, 0x7, 0x8, 0x3, 0x4, 0x40, 0x40}, 0x10) [ 438.379637] device team0 left promiscuous mode [ 438.385184] device team_slave_0 left promiscuous mode [ 438.392174] device team_slave_1 left promiscuous mode 21:19:46 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r1, 0x1, 0x6, @local}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x4) write(r2, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0011000100f5fe0012ff000000078a151f75080039000500", 0x27) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r3, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) socket$pptp(0x18, 0x1, 0x2) r4 = getpgrp(0x0) getpgid(r4) 21:19:46 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r1 = dup3(r0, r0, 0x80000) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x40010, r1, 0x60) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$KDMKTONE(r1, 0x4b30, 0xdb) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) execveat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f0000000480)=[&(0x7f00000000c0)='(&cpusetcpuset\x00', &(0x7f00000001c0)="7465616d300000ffffffc000", &(0x7f0000000300)='\x00', &(0x7f0000000340)='[vmnet0trusted(cpuseteth1\x00', &(0x7f0000000380)="776c616e31776c616e30776c616e3111766d6e657431766d6e6574312b766d6e657430d62f757365725c6b657972696e6774727573746564657468302d256b657972696e674265746831b06d696d655f747970655d656d302600", &(0x7f0000000400)="7465616d300000ffffffc000", &(0x7f0000000440)='}./vboxnet0*)\x00'], &(0x7f00000005c0)=[&(0x7f00000004c0)="7465616d300000ffffffc000", &(0x7f0000000540)="7465616d300000ffffffc000", &(0x7f0000000580)='cpuset}mime_typeuserlo\x00'], 0x1000) 21:19:46 executing program 7: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/177, 0xb1}, {&(0x7f00000002c0)=""/133, 0x85}], 0x2) r1 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x79a2806f, 0x80) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x80000000, 0x1, 0xfffffffffffffffa, 'queue1\x00', 0x6}) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f00000004c0)=""/74) bind$vsock_stream(r1, &(0x7f0000000540)={0x28, 0x0, 0x0, @my=0x1}, 0x10) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/28, 0x1c}], 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc004240a, &(0x7f0000000580)) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x1c) lgetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'osx.', '#self*vmnet1wlan1%@+\x00'}, &(0x7f0000000380)=""/18, 0x12) syz_open_dev$rtc(&(0x7f00000005c0)='/dev/rtc#\x00', 0x5, 0x40000) 21:19:46 executing program 5: r0 = memfd_create(&(0x7f0000000200)="00eb000000000000", 0x0) write(r0, &(0x7f0000000240)="0650ceb236d32bff186648f023ce010e7ed0d4d7b2628b739ef98ce5b0878c8a103c4e56c705456051d3e4b393758a54200910e11d3e411db4508ae1d3aa7763d028ba50bbd491ffb905fbef", 0x4c) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={{0x0, 0x2710}, {0x0, 0x2710}}, 0x0) io_setup(0x2, &(0x7f0000000080)=0x0) io_submit(r1, 0x4, &(0x7f00000014c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x3, 0x0, r0, &(0x7f00000000c0)="ad0e72b057fcca68b2081d1af86b64a237bd41217b309e2fa5e87c4483e1136fea0cf0866782bf66e5136246eeb655fee296402bdf57e8ca7519b59aa6c6d0b91b19ca9eaa06b5422912938176abfd84fdf6753b685724e0bce5c3c6c51130cabf3dcadb8480a2ed860cfa", 0x6b, 0xfff, 0x0, 0x1, r0}, &(0x7f0000000180)={0x0, 0x0, 0x0, 0xe, 0x2, r0, &(0x7f00000002c0)="62b729ae1f450802576e99dbf18c7dbb018474fdf5781c65c71fac4a61a2e33379a68e4e8f916e2c1f39d9d57deaa1419f6ef151ad444dce1bfdef32f8e7e7e652f11de134fa6062225c282f2b6a423104f619e9ed27ad81e56a26e1025bb31ac2d715e1acf0ddc72869d1140436d075b042c38c35f3249e6ce783d771e338b1fb638867587130846f6476f9a67802e0a7dc34b0", 0x94, 0xad, 0x0, 0x1, r0}, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x1, 0x3, r0, &(0x7f0000000380)="c8d68f03117b6dab2e5cea938d8ee66d6581f6c4f6db2d17c5d9cfc421982bc4e78c25f5682021a0cedb571e4ef13fd7429e3fd17244f546385f81a41d99349ccc9281cdc690ac3c5359c797f9f57ec6e1082f988bf7d0974426429f768df2f94609c8934b2ca6378a512c6e7ddb4de2edf6880fa9f6ac2cdd010b7dc898526b568d2a218de409050ce65384adc022c1f42e23afa30bef2827a3920a137ff9c16cce825a8964feb9aff58fa59e450842daca97021f88a7945cebf7fb31f32747f22229abed389cb7d21fd9061fcfedaaf42c37a07d4913e896a23f4355a04546730c24c4", 0xe4, 0x8, 0x0, 0x1, r0}, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x7, 0x4, r0, &(0x7f0000000480)="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", 0x1000, 0xa4, 0x0, 0x1, r0}]) [ 438.662770] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 438.669799] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 438.677158] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 438.683983] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 438.690915] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 438.697718] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 438.704673] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 21:19:46 executing program 5: mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = userfaultfd(0x0) ioctl$UFFDIO_API(r2, 0xc018aa3f, &(0x7f0000000580)) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) r4 = getpgrp(r3) sched_setaffinity(r4, 0x8, &(0x7f0000000380)=0x9) ioctl$UFFDIO_REGISTER(r2, 0xc020aa00, &(0x7f0000d62fe0)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) write$sndseq(r1, &(0x7f0000011fd2), 0xffffffee) vmsplice(r1, &(0x7f00000002c0)=[{&(0x7f0000000340)='a', 0x1}], 0x1, 0x0) read(r0, &(0x7f0000000000)=""/126, 0xfffffeab) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, &(0x7f0000040000)) dup2(r0, r2) [ 438.711516] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 438.718334] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 438.725161] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 438.731963] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 438.793895] hid-generic 0000:0000:0000.0001: hidraw0: HID v0.00 Device [syz1] on syz1 [ 439.393789] device team0 entered promiscuous mode [ 439.398973] device team_slave_0 entered promiscuous mode [ 439.404732] device team_slave_1 entered promiscuous mode [ 439.412793] 8021q: adding VLAN 0 to HW filter on device team0 [ 439.426248] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 439.433169] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 439.439990] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 439.446837] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 439.453627] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 439.460463] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 439.467290] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 439.474171] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 439.481047] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 439.487846] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 439.494674] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 439.505781] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz1] on syz1 [ 439.519473] device team0 entered promiscuous mode [ 439.524553] device team_slave_0 entered promiscuous mode [ 439.530324] device team_slave_1 entered promiscuous mode 21:19:47 executing program 7: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/uhid\x00', 0x2, 0x0) write$UHID_CREATE(r0, &(0x7f0000001080)={0x0, 'syz1\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000000)=""/11, 0xb}, 0x120) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000140)=""/177, 0xb1}, {&(0x7f00000002c0)=""/133, 0x85}], 0x2) r1 = syz_open_dev$dspn(&(0x7f00000003c0)='/dev/dsp#\x00', 0x79a2806f, 0x80) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r1, 0xc08c5332, &(0x7f0000000400)={0x80000000, 0x1, 0xfffffffffffffffa, 'queue1\x00', 0x6}) write$UHID_DESTROY(r0, &(0x7f0000000100), 0x4) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f00000004c0)=""/74) bind$vsock_stream(r1, &(0x7f0000000540)={0x28, 0x0, 0x0, @my=0x1}, 0x10) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000040)=""/28, 0x1c}], 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc004240a, &(0x7f0000000580)) ioctl$TUNSETOFFLOAD(r1, 0x400454d0, 0x1c) lgetxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'osx.', '#self*vmnet1wlan1%@+\x00'}, &(0x7f0000000380)=""/18, 0x12) syz_open_dev$rtc(&(0x7f00000005c0)='/dev/rtc#\x00', 0x5, 0x40000) [ 439.539382] 8021q: adding VLAN 0 to HW filter on device team0 [ 439.554402] device team0 left promiscuous mode [ 439.559269] device team_slave_0 left promiscuous mode [ 439.565287] device team_slave_1 left promiscuous mode [ 439.635706] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 439.642665] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 439.649525] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 439.656339] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 439.663160] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 439.669958] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 439.676823] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 439.683638] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 439.690483] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 439.697311] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 439.704145] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 439.738506] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz1 21:19:47 executing program 5: r0 = memfd_create(&(0x7f0000000140)="70707031707070316565311eeac102c27d00", 0x800000000) write(r0, &(0x7f0000000040)="06", 0x1) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) r1 = socket$inet_dccp(0x2, 0x6, 0x0) getsockopt$inet_int(r1, 0x10d, 0xb1, &(0x7f0000000640), &(0x7f0000000000)=0x4) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000080)) openat$ppp(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ppp\x00', 0x100, 0x0) [ 439.943697] device team0 entered promiscuous mode [ 439.948746] device team_slave_0 entered promiscuous mode [ 439.954572] device team_slave_1 entered promiscuous mode [ 439.963324] 8021q: adding VLAN 0 to HW filter on device team0 [ 439.971454] device veth0_to_bridge entered promiscuous mode [ 439.979640] device team0 left promiscuous mode [ 439.984492] device team_slave_0 left promiscuous mode 21:19:48 executing program 5: capset(&(0x7f0000a31000)={0x19980330}, &(0x7f00009b3000)) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ppp\x00', 0x260041, 0x0) bind$alg(r0, &(0x7f0000000140)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff) sendmmsg(0xffffffffffffffff, &(0x7f0000008600)=[{{0x0, 0x3dc, &(0x7f00000005c0)=[{&(0x7f0000000040)="6402527a303f4c4e69f28fbeb9d20dffa6c7e4ebf522654b58edf03f63a91fbf6bebdea394059b408777e7f421360b8187ac12c08268f8a998"}, {&(0x7f00000000c0)="3a2e74c311081ca52547b4d8c489e5d4bbf53e79fb43e7cdd0f43f24735ba5e0501b6cae636d26de392db828f0278af10f776e592814b1bc7987348c"}, {&(0x7f0000000100)="dea64b64a3cd965be88f6301cdc090365492c0e3993af0119977693a484c0984e49c8988146132605ea3"}, {&(0x7f00000001c0)="fdfce0234878de4cb35b62abb01cc6add46911c879a00bf7463a86051573205b64e17e2058a089f24b9e90ec12a19c5e7900cac6a43176aa64562b26379e50db171205ef49bc6407eb12366fad1d688f5a7c74f9e61fb2d827cf8aedf000e0c2ef0f7ab1f4cd26408c708b1024f2803dcfa22ad5c66f19668041b5a7c32de106f41ec281d89862dab6c1af1f4138eba520df3834c34b086ebe1fc7d150d2b2813bcd0e83982fcbd0640e79f9dbfc31dc2ef4889ce5d6a5ce496e5f0081b0ef0d72d4d89771827d812a7ecdb53d619a53bf0c006de9572d8ad52d2f15d09bfc48d17db7ae2e7c51b5b23aa9fde3fd7912c3c9350d38e3760c"}, {&(0x7f00000002c0)="e84a38164971637295132eafb47774c7a033df029e486a772ec7a8a698a12777bee999e4718a433b55c24188421676eaaad0a5fb8a721a825d3ccea4472a3675ae0c792ab848889a637eddca7ee7acbf19ff64d15566d4825e2e435f5fff8c262f80aafcf29d5f1abbe244ce30fe00547ea114c8155ae1d9d17c73d03d37fc38c94dcc7ee96ba580cd02f8172e26e329cb09820d7b4d7470f7eba64b3f220dcb21d416d728afcd5edfb168ddfe61975ad33c9b1f9a598703cae4e5a9c4a8d09e737b4b552d70287d5d7b2ba38f78db491426e46ca61272bd2cc587b0e626a1"}, {&(0x7f00000003c0)="b894e0f5a0ee00937854dd79649556b4db27911d64407b158cea68aac679c342c5a208442dea87531be2f4d9b4862223d018080b8995d6ce3af47ecb2126d735c711183057715b9eb9b8b81e06fa508c6fa6126ba6168b6533688cede6e30d45925f08fd5732aab8b2ce8e87e06527864784e3650094921f471a67539349df1f77a242ca5362b5a5a7a621ac135aefd1e09c71a9c70770e334834fc57638865993153423793b5ffa291cfcc289d68d24dbee68dc626c704671346ec1927d0f4f03a7d3e8925f796041a80a522b34433bcff27f66822c4258c5d11bb626312247c43d7ce2896901b5beb1", 0x124}, {&(0x7f00000004c0)="50185bae976ecc93fc13525224eb450a0fba91f1d754c6739b30353f055ee98b9de8500a2bf07f861680273457c45d4c38835c2804adda1359324fffadbbb6390ed5f2bd1ec1d4e47221732338f288c22322e522a58007157d5d6d6e3fbd7200f59ff38d7328ac6bef6372c88711e642f43429655c0aa25a3d23cd3a94afba429f208c0b288fd91bc02168b8f196449baec04e72be5ecd55c8732aa64df6cedfc75be912ff79408b34ca917d4e4d3fc2d38b19d86bc40efbec035c3224bdc6663c60e257ff8f9fa73efb989bc8ce6327f9fe84999d06a7b164fdcfee233cb2566e52960eb3d5fd39bd14"}]}}, {{&(0x7f00000072c0)=@un=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000007380), 0x0, &(0x7f0000000600)}}], 0x2, 0x0) [ 439.990061] device team_slave_1 left promiscuous mode 21:19:48 executing program 4: unshare(0x20400) r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000000)=0x8, 0x25) setsockopt$XDP_TX_RING(r0, 0x11b, 0x3, &(0x7f0000000240)=0x40, 0x4) socketpair$packet(0x11, 0x2, 0x300, &(0x7f0000000080)={0xffffffffffffffff}) r2 = fcntl$getown(r1, 0x9) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r2, 0x10, &(0x7f00000001c0)={0x7ff}) r3 = openat$cgroup_ro(r1, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x0, 0x0) arch_prctl(0x1007, &(0x7f0000000280)="424b81fa0508768616eaa4e06ff544e48ce83458ea3c38e48445b7708c0f7bf986ff6a0a104d6f14ad27ac33275360da4db99b4aa3e0194524508b2f4b697bcb949c") ioctl$BLKRESETZONE(r3, 0x40101283, &(0x7f0000000180)={0x1, 0x4}) setsockopt$packet_buf(r1, 0x107, 0xf, &(0x7f00000000c0)="e95b69925c5851b97c977bc741691ba69cd4b58fd1d059da049c1293c3a8347608d4767e0e38d97ddb3ea30967c65f67da2308c057d91cd28f3cf257b09bca13ebcf10a6b3ed7cc7081abfcd4a7df1c5b78cf6e7fbbb13c2800ac91b767686d00cf3310bbe006d66d94f385d90809855d26f49c40f175d6bb8", 0x79) r4 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x0, 0x0) ioctl$TIOCNXCL(r4, 0x540d) [ 440.019647] device team0 entered promiscuous mode [ 440.024735] device team_slave_0 entered promiscuous mode [ 440.030607] device team_slave_1 entered promiscuous mode [ 440.058730] capability: warning: `syz-executor5' uses 32-bit capabilities (legacy support in use) [ 440.072166] 8021q: adding VLAN 0 to HW filter on device team0 [ 440.090568] device team0 left promiscuous mode [ 440.095372] device team_slave_0 left promiscuous mode [ 440.100949] device team_slave_1 left promiscuous mode [ 440.133130] device team0 entered promiscuous mode [ 440.138155] device team_slave_0 entered promiscuous mode [ 440.143968] device team_slave_1 entered promiscuous mode [ 440.151650] 8021q: adding VLAN 0 to HW filter on device team0 [ 440.163315] device team0 left promiscuous mode [ 440.168121] device team_slave_0 left promiscuous mode [ 440.173614] device team_slave_1 left promiscuous mode 21:19:48 executing program 3: r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000240)='/dev/vga_arbiter\x00', 0x2002, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x2000000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x660, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, r0, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r2 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r2, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={r1, 0xea5f, 0x20}, 0xc) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000200)=@assoc_value={r1, 0xc7d5}, 0x8) 21:19:48 executing program 5: r0 = memfd_create(&(0x7f0000000200)="00ac3d9dd2dbe6bfb408ed634a8e84d44e129b1f09bd112b865416a3b3ae309f393fef6fa46b01323ea19c86781c9f841935de975f097ef3591222705ec10f", 0x0) write(r0, &(0x7f0000002000)='/', 0x1) ftruncate(r0, 0xb2c7) sendfile(r0, r0, &(0x7f0000001000), 0xfec) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) openat(0xffffffffffffffff, &(0x7f0000001000)='./file0\x00', 0x0, 0x0) [ 440.553741] device team0 entered promiscuous mode [ 440.558872] device team_slave_0 entered promiscuous mode [ 440.564641] device team_slave_1 entered promiscuous mode [ 440.572235] 8021q: adding VLAN 0 to HW filter on device team0 [ 440.579485] device veth0_to_bridge left promiscuous mode [ 440.587305] device team0 left promiscuous mode [ 440.592112] device team_slave_0 left promiscuous mode [ 440.597605] device team_slave_1 left promiscuous mode [ 440.607390] device team0 entered promiscuous mode [ 440.612524] device team_slave_0 entered promiscuous mode [ 440.618282] device team_slave_1 entered promiscuous mode [ 440.629556] 8021q: adding VLAN 0 to HW filter on device team0 [ 440.647631] device team0 left promiscuous mode [ 440.652406] device team_slave_0 left promiscuous mode [ 440.657974] device team_slave_1 left promiscuous mode [ 440.685948] device team0 entered promiscuous mode [ 440.691152] device team_slave_0 entered promiscuous mode [ 440.696981] device team_slave_1 entered promiscuous mode [ 440.730904] 8021q: adding VLAN 0 to HW filter on device team0 [ 440.757610] device team0 left promiscuous mode [ 440.762424] device team_slave_0 left promiscuous mode [ 440.767898] device team_slave_1 left promiscuous mode [ 440.776309] device team0 entered promiscuous mode [ 440.781284] device team_slave_0 entered promiscuous mode [ 440.787162] device team_slave_1 entered promiscuous mode [ 440.794549] 8021q: adding VLAN 0 to HW filter on device team0 21:19:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCBRADDBR(r0, 0x89a0, &(0x7f0000000000)='bcsf0\x00') socketpair$inet_sctp(0x2, 0x1, 0x84, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@remote}}, &(0x7f00000000c0)=0xe8) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) setsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f00000002c0)={{{@in6=@remote, @in=@rand_addr=0xd2, 0x4e23, 0x0, 0x4e22, 0x0, 0x2, 0x80, 0xa0, 0x5e, r2, r3}, {0x81, 0x2, 0x200000000, 0x3, 0x80000001, 0x4, 0x4, 0xfffffffffffffff7}, {0x2, 0x7, 0xfbf9, 0x78}, 0x0, 0x6e6bbd, 0x0, 0x0, 0x1}, {{@in6=@dev={0xfe, 0x80, [], 0xa}, 0x4d6, 0x2b}, 0xa, @in=@multicast2, 0x3500, 0x3, 0x3, 0x0, 0x7fff, 0xfff, 0x4}}, 0xe8) kexec_load(0x101, 0x1, &(0x7f00000005c0)=[{&(0x7f00000004c0)}], 0x30000) ioctl$TIOCMSET(0xffffffffffffffff, 0x5418, &(0x7f0000000080)=0x39f) ioctl$sock_SIOCBRDELBR(r0, 0x89a1, &(0x7f0000000180)="6263736630000000000020001100") 21:19:48 executing program 4: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) listen(r0, 0xffffffffffffff7f) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000e33fe0)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) setsockopt$inet6_opts(r0, 0x29, 0x36, &(0x7f00000003c0)=@dstopts, 0x8) openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x0, 0x0) ioctl$int_in(r0, 0x40000000af01, &(0x7f0000c97ff8)) accept4(r0, 0x0, &(0x7f00000001c0)=0x203, 0x0) 21:19:48 executing program 5: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) keyctl$set_reqkey_keyring(0xe, 0x2) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$netlink_NETLINK_CAP_ACK(r1, 0x10e, 0xa, &(0x7f0000000140)=0xffffffffffffffff, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) request_key(&(0x7f0000000080)='big_key\x00', &(0x7f00000000c0), &(0x7f0000000100)='proccgroup%\x00', 0x0) 21:19:48 executing program 7: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001380)={0x5, 0x100000001, 0x1000000000000005, 0x1}, 0x2c) syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x4000) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r0, &(0x7f0000000240), &(0x7f00000001c0)="b58f717c4fcc44a85ed79c84ff6213fc84b0c4ff8b2a76db5cf02d2a4a5ebc98a7a1cb4c806dfebfc4fc56697ca78f48d1e166e7df5c6631edea377fefae6fa70da0fc5e1c9cef54697eb10d72862bfe5d405aedb229b871dcbfffed121d0c1e689386d13fb815c1a8f433d30089520c68eb36de3790afc9"}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000080)={r0, &(0x7f0000000040), &(0x7f0000000100)=""/156}, 0x18) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x9, 0x400000) write$P9_RXATTRCREATE(r1, &(0x7f0000000240)={0x7, 0x21, 0x2}, 0x7) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000280)="a9ffcfce18a9cdf066edf79ed046b52a384ef9bfb16f6b548717eda3032e28887774a76c1f4d59c14713eb528957adccb89bf32d9ea91426f3ebec81bbf001d133fa6573df8cf99cdb753a855ba50ce559d0a069b494796c60e92f905b8c54e6ca12fdb1744d4b0c959a056a42ae0ca8547a90c6343a8e172797e1ebaedfe2fd286d4ebdb41e97ed4289abf9e6f8198c11730c62b7e18a4b7b6828205f7eaf5dd2616fccf6525cec4b6ebb433715ad4cdc", &(0x7f0000000340)="220e5e1c8782cd47591a64374d4e51165600797fe3d9268426d31dcd3aff7f4829f3301bc897c1646fdff7dd9905ad1edf1c0742866cb8b8ba51e653b2274f979dbdaa66f0682cccbab6692a3f119c535df973816cd36498dcf90ebb79b29636b0ed8f46f7ba593dd8c73a047f9fb4e78bd2c3021c7f7539ca9d1112c2042a5faa53d68efcdf7de674085b023ff957f70a7b9e10be1d054cd360", 0x1}, 0x20) 21:19:48 executing program 6: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000000440)) sched_setattr(0x0, &(0x7f0000000000)={0x0, 0x6, 0x0, 0x0, 0x0, 0x9917, 0xffff}, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppp\x00', 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r0, 0xc0bc5310, &(0x7f0000000540)) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000380)={'HL\x00'}, &(0x7f0000000480)=0x1e) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, 0x0) r1 = add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x1, 0x70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f0000000700)=""/71) ioctl(0xffffffffffffffff, 0x100008912, &(0x7f0000000000)="025cc80700") accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) r2 = request_key(&(0x7f00000001c0)='ceph\x00', &(0x7f0000000200)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000240)='keyring%\x00', 0xfffffffffffffff8) keyctl$unlink(0x9, r1, r2) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x10, &(0x7f0000000640)=[@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x14}}]}, &(0x7f00000006c0)=0x10) r3 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f00000002c0)={'team0\x00'}) faccessat(r0, &(0x7f0000000340)='./file0\x00', 0x10, 0x400) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) 21:19:48 executing program 1: sched_setattr(0x0, &(0x7f0000000000), 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(0xffffffffffffffff, 0xc0505405, &(0x7f0000000100)={{}, 0x20}) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000700)={0x0, @in6={{0xa, 0x4e21, 0x6, @ipv4={[], [], @broadcast}}}, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}, &(0x7f0000000800)=0x100) r0 = socket(0x10, 0x802, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x400000, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r1, 0x80e85411, &(0x7f0000000300)=""/102) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) write$P9_RGETATTR(0xffffffffffffffff, &(0x7f0000000200)={0xa0}, 0xa0) 21:19:48 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) r1 = openat$userio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/userio\x00', 0x101000, 0x0) connect$bt_rfcomm(r1, &(0x7f00000000c0)={0x1f, {0x0, 0xff, 0x0, 0x2, 0x2e12}, 0x8001}, 0xa) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000140)={'veth0_to_bridge\x00', 0x0}) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000000)={r2, 0x1, 0x6, @local}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x4) write(r3, &(0x7f0000fa8000)="2700000014000707030e0000120f0a0811000100f5fe0012ff00000072558dd6e239df2000954b", 0xd8) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cgroup.controllers\x00', 0x0, 0x0) ioctl$KDGKBSENT(r4, 0x4b48, &(0x7f0000000180)={0x5cf4, 0x0, 0x8}) 21:19:48 executing program 3: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/fuse\x00', 0x2, 0x0) fremovexattr(r0, &(0x7f0000000200)=@known='security.capability\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$user(&(0x7f0000000140)='user\x00', &(0x7f0000000180)={0x73, 0x79, 0x7a, 0x1}, &(0x7f0000000200), 0x0, 0xfffffffffffffff9) perf_event_open(&(0x7f0000000040)={0x0, 0x70}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl(0xffffffffffffffff, 0x0, &(0x7f0000000000)) accept$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000500)=0x10) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)}, &(0x7f00000006c0)=0x10) r1 = socket(0x10, 0x802, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f00000002c0)={'team0\x00'}) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000100)={"7465616d300000ffffffc000", 0x4bfd}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) [ 440.929233] device team0 left promiscuous mode [ 440.934080] device team_slave_0 left promiscuous mode [ 440.939640] device team_slave_1 left promiscuous mode [ 440.983331] device veth0_to_bridge entered promiscuous mode [ 440.992347] device team0 left promiscuous mode [ 440.997250] device team_slave_0 left promiscuous mode [ 441.002770] device team_slave_1 left promiscuous mode 21:19:49 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x7, 0x82) socket$inet6_sctp(0xa, 0x0, 0x84) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, &(0x7f0000000000), 0x2000005) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000300)={0x0, 0x400000000000000, 0x0, 0x1, 0x7ff}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) sendfile(r0, r0, &(0x7f0000000080), 0x7ff) [ 441.031636] device team0 left promiscuous mode [ 441.037156] device team_slave_0 left promiscuous mode [ 441.043811] device team_slave_1 left promiscuous mode [ 441.351836] print_req_error: 12 callbacks suppressed [ 441.351914] print_req_error: I/O error, dev loop7, sector 416 [ 441.379680] print_req_error: I/O error, dev loop7, sector 0 [ 441.385780] buffer_io_error: 7 callbacks suppressed [ 441.385801] Buffer I/O error on dev loop7, logical block 0, lost async page write [ 441.422216] print_req_error: I/O error, dev loop7, sector 168 [ 441.429756] print_req_error: I/O error, dev loop7, sector 928 21:19:49 executing program 7: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x7, 0x82) socket$inet6_sctp(0xa, 0x0, 0x84) r1 = memfd_create(&(0x7f0000000100)="74086e750000000000000000008c00", 0x0) pwritev(r1, &(0x7f0000000340)=[{&(0x7f0000000040)='\'', 0x1}], 0x1, 0x81806) ioctl$LOOP_CHANGE_FD(r0, 0x4c00, r1) sendfile(r1, r0, &(0x7f0000000000), 0x2000005) ioctl$FS_IOC_FSGETXATTR(0xffffffffffffffff, 0x801c581f, &(0x7f0000000300)={0x0, 0x400000000000000, 0x0, 0x1, 0x7ff}) ioctl$LOOP_CLR_FD(r0, 0x4c01) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) getsockopt$inet_sctp6_SCTP_CONTEXT(0xffffffffffffffff, 0x84, 0x11, &(0x7f0000000180)={0x0, 0x8}, &(0x7f00000001c0)=0x8) sendfile(r0, r0, &(0x7f0000000080), 0x7ff) 21:19:49 executing program 7: r0 = socket$key(0xf, 0x3, 0x2) r1 = gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000007180)={{{@in=@broadcast, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000007280)=0xe8) getresgid(&(0x7f00000072c0)=0x0, &(0x7f0000007300), &(0x7f0000007340)) setsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000007380)={r1, r2, r3}, 0xc) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[]}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300090e000000030000000000000005000600000000000a000000000000000000000000000000000000020000000000000000000000000200010001000000000000020000000005000500000000000a000000006a2301f229cf81007fc90eaff52ab97710aa000000ff1700000000"], 0x70}}, 0x0) getsockopt$IP_VS_SO_GET_DESTS(r0, 0x0, 0x484, &(0x7f0000007100)=""/128, &(0x7f0000000780)=0x80) sendmmsg(r0, &(0x7f0000006f00)=[{{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000200)="af38096586894b199490a2684cbf9e4e07eb43c0670ed0bae58e0fcecb8ec33ea864ec43ddbe993afabac3e7f2bba64b1132fca087264c843a7978b0f892b7d7fddfef199d96c4c98843e0309001ce62669e1b666627855a6108b3cf40541e4f9fea39020c3b7c0c5cab041ec52a407ce4b0f2823d49c6751c42af6719df57c28893d3976d92160e342a60073799664b1a2464e8756e419d588b69"}, {&(0x7f00000002c0)="67b0cd83dd9ed394e1cdf3614d9ec7e4592c5389883d54c293415ee014c4349e27ba3119c213965cf9853a638f43304432e7689bc2f636d1072443d6b325e7024080e9d0ef7cfcb087ef9c7ed5d348bdc5caa6ac771edf5360dd38b648c88520756a71d3ac19ef18d966ff3c3f14661d23b7406ce3336ed8661544b56f06dceea765aa3360bce4291ca34a2646773f5e271a17247376eaf5520be5478f55c9523569b2f366ad8d67bb60da9b6211599ba7719ad4254c3ed752b45bb6cbcd8c2a76f9e8ef771228c81e0910a5dd71dbf0a0d2cdac714ca9ce028dd8f9a719c062fd40edc9c0388da4"}, {&(0x7f00000003c0)="e3fd9f10f7c134448f10d6e5e9ee6d0c96f20e50e52e0ab7338619a4ac11699e5c66ef4ccd5fc85e8e66898abdb3b1e91079ce055781353f8005b1d8d5f27f3ea74f484191ee5590e5712a5e66f3566c07a737f4dc0d3d40a3e14d582ce6bf966a3a910c63c0ca7a85696fa36387824bf2b9fe4b0c135ad7dc68b1a27e8aa7366b3596c6aef929d16db0cc0411fa947777bd5a44613a7d0dcf37d3e721e94e4c617ca5d37617224d"}, {&(0x7f0000000480)="365192645a46f10682603adbdc4a1ac15c5ab87ad3480c9ae05d41dc163c5e30ef51e84a51d1ac0416fe791fda4220d2dd8bd3c7236b49ec59331a4cc8c401d43338793799d8ef9eb4ab3d69b3de7b3299b52a67673d8893bd8f0c7b09485220c661bfb3f0d0e25d764f0989790b416efff0827fb23795dad33fe1e7fd6d1ed2a27f0bd497c3006519bf8c217e18fd78a08b97f830be45bb7eedcb81c1b12330f733161fb8f55aeafeb05b704617187945c1ccf90a64a131083e2b7673895bc74636ce9a275deef5a380f5ca7197fe62074338455575ac3f57"}, {&(0x7f0000000000)="6540ad6065a5056412cb051780f9ca64d6b45bea2fc463600b7fcfda07008b899322e5a9912d0ab8290d912314a18c"}], 0x0, &(0x7f0000000580)=[{0x0, 0x11f, 0x4, "c7daca1dffa683f691e03cae18580bff5462657eb747870f0a4adf6ac2b0500eeb187d1b9dd61aaf04054c6439dc6721b9f23622c2b173f86190176195dae3ff3516f30a6484ca03eea884aa7d724c8417e886e141e5bb3cb8ce53c87b14cb6c446ecfebb0fa13e066bb3ec8d5340dee60a75f6957e0e65d96e4ca4729dea868ddd7f5af2df44bc56fc4495a998608b7ecd53f50c8c2af7be46984d761c79bf3f9faf5718fb4d528ef5e2eb03a05a057af82ee6d362ea70f746cf348373884c3de4171e0bd"}], 0x0, 0x4008044}, 0x68}, {{&(0x7f0000000680)=@rc={0x1f, {0x7, 0x3, 0x140, 0x800, 0x3, 0x4}, 0x4}, 0x0, &(0x7f00000008c0)=[{&(0x7f0000000700)="f078c078cbb520044ca0311d758daebaba836647b0c312e6de78d682eba7335fc6554fc440951a115fa888b438dc0e5cd9fe3a280e69307ab799aaa65182eb2735b2863ee3c68d694d4510cd4d2eb3237cbbdcccea819650ce"}, {&(0x7f0000000780)}, {&(0x7f00000007c0)="604961ff7ec57fe764752a62f87d43ec2c0ab79e1a4dc0d08243e7eec5f21be6bef18e05eb407df94794c2ab321ce2ba90ce5d02e002cd471d89145e620c6f7d5e24eeb0c2d70e9c757be1bb591114cf41462838c832aaf86948047fea9bf54428e0e1ad62719a7a2bef63d56aa34c79b1f478c7dffa38eadd9dce935ed526779e1384bd27a874216d681130"}, {&(0x7f0000000880)="c9f0aa45549ab0d8aa5d540f1dfaffd27f1311d65a24"}], 0x0, &(0x7f0000000900)=[{0x0, 0x112, 0x4, "8d0d2db9f318d6ae6e6f3515cebd38307f7dd0e6000ff912870889414c1e2537e891ad9771915b66453a607fe7130372"}, {0x0, 0x10c, 0x800, "b90dd97f54387e8da4514343aa538453631fe5512dd8a461b43ed0b2a194c44cb450756aa6306d9cf779578ac5d34acaf4e1a9808d4e370b74794e6b5bace8ff5e84c5dfa11fec0a55c7e2536236ec7db6855da514434ba830f3ddc401035d119379e32d0f5e26e2cf6c230f5b2685fb5d23a0154dcd9e950ea44c949eee673833b479fe7c5cff66a9b6e27060fb228a58bab65000e25d7c3ba1a6876316c1d24dfc87aa9a963ce76d1e44306061f6acb8d9f3b791ad5a2f1db6614ccba4584a81adafd5fa6f714086942a0173c93a6cbd5d81b460a4f90075f02c9d998db0e116d3f7bc36b86c42c7d02f74e88eccb7cfa6f1ded8"}, {0x0, 0x107, 0x8, "4eadd08773299726e0df44262bec8e80e29f464b23d77e1c11bc0f5f73899f045102c7ba865e1b38a4176365a6ab2b2c26f8564d63cd624cc9"}, {0x0, 0x114, 0x3, "b96a5d93e573b37779c5dd62b7f82f6b30240a1440074e213729c355cbfb952af342f76f24ebcfa9af839aaee07b2981ba6fa887e14d31a2f6bf9baf5e55a1e40279d7553329f10d6420314f27f9a794e53a4e8d6c95f75f6aa88fe4368a"}, {0x0, 0x105, 0x2, "73cf809fd631af08f728f9bb2b982ff553ccd5ddd86712eb0887d3f38267e6e80b4534ed5cc96c49a419224f52eee906c57b9eb89d422801ce2d129871c855ea6587762b7f7474a91e34d4cbf000ef79a49555f6dde8d8bcbacf838f7ba755536d6204d524bf190ccec0e25dcd4ef841fa97c377523f9bd1122c5478dccb96f3c02a7f9589575d3c8182448b6d5e2a31b79f6beee8f749525ee0e8fbfb3ff4a8306105"}, {0x0, 0x19a, 0x80, "c8a688ba9670917784a3aeb2af65844bf874bc7c2775b04dc20297a4abadf59e713d74d04efe55e6cfb1270c9f0139d7f67640898f9108d62e3339854bce82944d"}, {0x0, 0x10c, 0x5, "d145a4554ee85a96562646699330ebdc5639e1af5ce1a5772c91335014dd17564fdc8a97bb3f507951d13bfb082738d525690227b47a86faac6d2011426ac5011889f909d05967c09d291157f87801b18b8fd4136edd4e7b4949787bfc1f44b470bb390f441fd9068c02afb7db8f4e6829b2ad3109a21f11bb4e57d16eee063d3222e46278fab5c4d13035afc14f31b72654eeccf8338d4dda60ab5d4e1a7239ee87533d8e9f19456b22be8ee9272ba707f5a176"}, {0x0, 0x115, 0x6, "ea7064b6e042f2dc1d86efd17449165330becfc78630cc77405a57e8451c2cc6b3147d88f5bfe3510d01d6e41ffb7b254d3d1d15f56eeccb55a251649cb32cfb668f9990cd6abf82f90d1296b0d7880358086ebfe585aca37020835aacf141febd232dd3c55dcd7f06902911db71af79959787fed7bed8c95e351014012f909ced29b2ac7a9c2c18c1dea72cfb941ab8d7"}]}, 0x1}, {{&(0x7f0000000dc0)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x4, 0x4, 0x3, 0x3, {0xa, 0x4e20, 0x401, @dev={0xfe, 0x80, [], 0x16}, 0x2}}}, 0x0, &(0x7f00000010c0)=[{&(0x7f0000000e40)="725db08f7d4350971c43b75dbb04785ad520066d4e4705df8742b733356f3b490b964aa4f7ae37829df6ca6f5b5dcc8c89edb35faa52c2842e3a34d6b4496623b4e4e7665c1248a352c6bf376ad9ec719c796947355909f554e91509ac6dc5cc1745cd832d261811346394fcb6a7"}, {&(0x7f0000000ec0)="dff0ccd9aa45435dc9a8014aa095cd2d21680087fcb7206e4b09f79be4dcff8221a28ec1c0bad27f72526bf04305fa5fd9c6954847bf939ed9f7afbfd4769aa4923867cb206337f8491ec0657b2bc7bdcf81f2018b2145f3fb44765bc61a3695ecf2cb196ddacc44f66ad25d59d8604e708e059b4a961afa3210a855113d801e5f73e8dcb83d8b5fd3ce0e9f0f93c01f295a2de01421b3868ee026d0fe147c8ec66ad6b24009d225ab8b2005d9044df1d5d23f4b21be033fefcc629139c171eb01e626990c2060e4b3a699e98016ab235e"}, {&(0x7f0000000fc0)="ba9ddd75a6e6a735e99b86799cd37534191e8267366f4afa4c84453998cfeb93dc8124e15d33e3882e4e1890835b006df82b351cb987365cedf31e71df7971da3d3d60268550a5c6873a710916447499bf57c33e503ac24a51f3cc211baee856a33f48b09162c4606dc72825f5dbfe13d3655cb4028ba44d521138124dd18e9ef664b130a2b7cb18cd7812db9f46d3d9fb6f4b06cb9f9fb497de20c628d7ebb0ef47409f2911757063866ab4d2fde9239c23496ed9d2fc6ede65253fb0affc60128e65b7278bec90ec473c8f5539e1317de064c7a8149010eae04e"}], 0x0, &(0x7f0000001100)=[{0xffffffffffffff42, 0x11b, 0x6, "c71958c68789915a57a8f3644e401d26dbaca5ca3dbb69cd7b78ccbb803d7f2ec3e7790c"}, {0x0, 0x18c, 0x2, "f4ecf98405b25d6f1a837926a7b5503182090a854aa53786"}, {0x0, 0x1, 0x1f1, "a564a662b7b9b052a5b84ac0abfbcc2dd0859000e454c0857c7bd1a195bdfa2cdbf5d29f669016f9f9b42ae03ebe9517308bfd493e057a77cd0cdb8cf53c3ba88141f97e6de8661fa103fa1d0af13d9e67493ca80ff94bb816b863453ffc07465bd5b38fb951d5973b9973dda2e7ca66ac70a919bf127c7d66b46980ca8d9893326b5bb7e847d182bc4254ffcad1e816c78175c65d01464b510b180ef95ed62ce2bd9e2558c3"}, {0x0, 0x11f, 0x10000, "11e7474be9c0c6a5344395551ef4111ea38c8d675149758cc13c854e9581837b46c8a149866cca13fd9f571d1459200496b1f167"}]}, 0x8}, {{&(0x7f0000001280)=@l2={0x1f, 0x0, {0x10001, 0x1ff, 0xdb3, 0x6, 0x7, 0x81}, 0x8, 0x3}, 0x0, &(0x7f0000003440)=[{&(0x7f0000001300)="6205a6cbfbf66e17014a3d69332f45fa7839d5d6db11467efa64780daa28f4b1afdea672e803a61b246c0f503da8a1ac761538f51ec20c94226cfc836217dba5a9622d5f9e1240502a6d5b8471a106b299f1dff4141fe82e6595f951d0210aecb95aaa22d6ddeb2ddc8e76a58cac"}, {&(0x7f0000001380)="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"}, {&(0x7f0000002380)="8999a9d41301d3b696852cd2051dd2fe348b8bbf57c2ea913843f1fc0d3a22420b6277754daa88bda6eae472d35322d48d67447efff7d2d8b718f787ed9d3272af9e675c28e3b9c0ef15d42e9fab7f615ba7b503d971d14ffaa72d05c37dbecf2d3b22992ee4b064ba34c918e9258c2de8a9475c96b4233de54bffc567deda01659892f4caf21168908ece87bf33e0fc35481113f69de62a482306184ca9"}, {&(0x7f0000002440)="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